Analysis
-
max time kernel
476s -
max time network
421s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 19:31
Behavioral task
behavioral1
Sample
MoonHubLauncher.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
MoonHubLauncher.exe
Resource
win10v2004-20241007-en
General
-
Target
MoonHubLauncher.exe
-
Size
905KB
-
MD5
741337449426e923274848296676e672
-
SHA1
e382a890ff9c0af6235c2c4b4af160eaad9d7141
-
SHA256
9950cca92e19b3b7d6a9fd60fa744466f947e44ef4e8133a18a7c1d1b664d93d
-
SHA512
7e3e88652c6d088954fdcdf5407e7b9c5bee9307f9aa72fd830955e9e86397f1d4fe032bef23648a16c2f4e42e601983584c9cef96c703e1cf042ca9099ccfc5
-
SSDEEP
24576:HxdS04YNEMuExDiU6E5R9s8xY/2l/d2tnIbt+r/:RP4auS+UjfU2T2dIbt+r
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation MoonHubLauncher.exe -
Executes dropped EXE 1 IoCs
pid Process 1304 AudioDriver.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini MoonHubLauncher.exe File opened for modification C:\Windows\assembly\Desktop.ini MoonHubLauncher.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly MoonHubLauncher.exe File created C:\Windows\assembly\Desktop.ini MoonHubLauncher.exe File opened for modification C:\Windows\assembly\Desktop.ini MoonHubLauncher.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MoonHubLauncher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AudioDriver.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1304 AudioDriver.exe 1304 AudioDriver.exe 1304 AudioDriver.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1304 AudioDriver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1304 AudioDriver.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1304 AudioDriver.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4220 wrote to memory of 1304 4220 MoonHubLauncher.exe 84 PID 4220 wrote to memory of 1304 4220 MoonHubLauncher.exe 84 PID 4220 wrote to memory of 1304 4220 MoonHubLauncher.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\MoonHubLauncher.exe"C:\Users\Admin\AppData\Local\Temp\MoonHubLauncher.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
905KB
MD5741337449426e923274848296676e672
SHA1e382a890ff9c0af6235c2c4b4af160eaad9d7141
SHA2569950cca92e19b3b7d6a9fd60fa744466f947e44ef4e8133a18a7c1d1b664d93d
SHA5127e3e88652c6d088954fdcdf5407e7b9c5bee9307f9aa72fd830955e9e86397f1d4fe032bef23648a16c2f4e42e601983584c9cef96c703e1cf042ca9099ccfc5