Overview
overview
10Static
static
10Luna-Grabb...ha.zip
windows7-x64
3Luna-Grabb...er.exe
windows7-x64
7)x�)S �.pyc
windows7-x64
Luna-Grabb...DME.md
windows7-x64
3Luna-Grabb...rd.png
windows7-x64
3Luna-Grabb...lp.png
windows7-x64
3Luna-Grabb...me.png
windows7-x64
3Luna-Grabb...na.ico
windows7-x64
3Luna-Grabb...na.png
windows7-x64
3Luna-Grabb...ion.py
windows7-x64
3Luna-Grabb...ate.py
windows7-x64
3Luna-Grabb...upx.py
windows7-x64
3Analysis
-
max time kernel
842s -
max time network
843s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
09/02/2025, 15:35
Behavioral task
behavioral1
Sample
Luna-Grabber-Alpha.zip
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Luna-Grabber-Alpha/Builder.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
)x�)S �.pyc
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Luna-Grabber-Alpha/README.md
Resource
win7-20250207-en
Behavioral task
behavioral5
Sample
Luna-Grabber-Alpha/gui_images/clipboard.png
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
Luna-Grabber-Alpha/gui_images/help.png
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
Luna-Grabber-Alpha/gui_images/home.png
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Luna-Grabber-Alpha/gui_images/luna.ico
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
Luna-Grabber-Alpha/gui_images/luna.png
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Luna-Grabber-Alpha/tools/obfuscation.py
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
Luna-Grabber-Alpha/tools/update.py
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Luna-Grabber-Alpha/tools/upx.py
Resource
win7-20240903-en
General
-
Target
Luna-Grabber-Alpha/README.md
-
Size
4KB
-
MD5
d9e484c060f51dfc8a4d1fcb5d044b94
-
SHA1
d197965ec974920fc19ddea81c61e174eef04f62
-
SHA256
5ed9bf8ea44034f189197b3353b8a0eaa85c05eeb2f9b641c35c9295cabe2595
-
SHA512
a74ec8e6d0c291ab5e5df63623ca1e4bfac7cff67aaab743c4d7b9d36dc2b5c6dc2aab3ad369214fa5cd83d57a349520b4a9d6a6c9b89308d5ea2f167055186b
-
SSDEEP
96:cIdEekYRkDkKk/NGFXZ2dAvBmVKrtBkCU5vOYNER:cb/I11GBkZ4YxER
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2752 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2752 AcroRd32.exe 2752 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2284 1900 cmd.exe 29 PID 1900 wrote to memory of 2284 1900 cmd.exe 29 PID 1900 wrote to memory of 2284 1900 cmd.exe 29 PID 2284 wrote to memory of 2752 2284 rundll32.exe 30 PID 2284 wrote to memory of 2752 2284 rundll32.exe 30 PID 2284 wrote to memory of 2752 2284 rundll32.exe 30 PID 2284 wrote to memory of 2752 2284 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Luna-Grabber-Alpha\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Luna-Grabber-Alpha\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Luna-Grabber-Alpha\README.md"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5156324c2e29ba802b2e581b4b67a2178
SHA149bf9eed0c9d35991d98711aa8879501db8e0d85
SHA256605b8a3c82cafd1527d1617a1f6f4fde3053f05e051d065892c3c6e48a5b478e
SHA51297588842bb4b4243e20bed8a34b29a86c383719669c720f21116360d72757219aeff39f2894753594194cc852878635da2823245bc9cfb0e30de768e5c67aed4