Analysis
-
max time kernel
12s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 20:30
Behavioral task
behavioral1
Sample
lunarcracked.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
lunarcracked.exe
Resource
win10v2004-20241007-en
General
-
Target
lunarcracked.exe
-
Size
12.0MB
-
MD5
3c516b9365ebe27f3aaacc2491955e06
-
SHA1
39339f154a15e78e6f760af3fca73ebca22da296
-
SHA256
6606e3850e54c7054e9695f2b810bcf340e53c5aea1c673bcffdda04a82528af
-
SHA512
c7f8b891083934127d582dad2500f427846f233f1481056a32347e7d3901c9f4c60c92ed1dc61b91d5a57dbcd082f8b32bcda869f7d0301c1b798b64d59d20ac
-
SSDEEP
98304:asMcriurErvz81LpWjjUlLkvzgXO9hAlaYrzzuJZYJ1JIuI/KU73bcgVowjMG:a9urErvI9pWjgyvoaYrE41JIuICoxJ
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2972 lunarcracked.exe -
resource yara_rule behavioral1/files/0x000500000001960c-21.dat upx behavioral1/memory/2972-23-0x000007FEF6820000-0x000007FEF6E10000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2972 2108 lunarcracked.exe 30 PID 2108 wrote to memory of 2972 2108 lunarcracked.exe 30 PID 2108 wrote to memory of 2972 2108 lunarcracked.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\lunarcracked.exe"C:\Users\Admin\AppData\Local\Temp\lunarcracked.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\lunarcracked.exe"C:\Users\Admin\AppData\Local\Temp\lunarcracked.exe"2⤵
- Loads dropped DLL
PID:2972
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5b167b98fc5c89d65cb1fa8df31c5de13
SHA13a6597007f572ea09ed233d813462e80e14c5444
SHA25628eda3ba32f5247c1a7bd2777ead982c24175765c4e2c1c28a0ef708079f2c76
SHA51240a1f5cd2af7e7c28d4c8e327310ea1982478a9f6d300950c7372634df0d9ad840f3c64fe35cc01db4c798bd153b210c0a8472ae0898bebf8cf9c25dd3638de8