File name:

luna-uc-1.0_[unknowncheats.me]_.zip

Full analysis: https://app.any.run/tasks/e96421c5-abe4-4a07-871e-0acd3ae8419f
Verdict: Malicious activity
Analysis date: May 11, 2025, 07:26:58
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

8CEFC365038948CFAA27E659844A299C

SHA1:

CE2712DBA0B5DC4519901644D3AFB943B44C5FDC

SHA256:

3847020E6E3497E24624B903639F43B964D98E6979E17207307055478E0F6F6B

SSDEEP:

98304:SS/o5rvDHrw2YzmwANS+6Um8jpRh4gochiS8O2yFphJmm0bVgD7Q0bJKQWZxvczb:pbe

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 6724)
    • Executing a file with an untrusted certificate

      • cs2.exe (PID: 7916)
      • cs2.exe (PID: 7964)
      • cs2.exe (PID: 3268)
      • cs2.exe (PID: 2096)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • cs2.exe (PID: 7964)
      • cs2.exe (PID: 2096)
    • Executes application which crashes

      • cs2.exe (PID: 7964)
      • cs2.exe (PID: 2096)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6724)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 6724)
      • cs2.exe (PID: 7964)
    • Manual execution by a user

      • cs2.exe (PID: 7916)
      • cs2.exe (PID: 7964)
      • luna.exe (PID: 8084)
      • luna.exe (PID: 8132)
      • luna.exe (PID: 6300)
      • luna.exe (PID: 6112)
      • cs2.exe (PID: 3268)
      • cs2.exe (PID: 2096)
      • luna.exe (PID: 7520)
      • luna.exe (PID: 7240)
    • Checks supported languages

      • cs2.exe (PID: 7964)
      • luna.exe (PID: 8132)
      • luna.exe (PID: 6112)
      • cs2.exe (PID: 2096)
      • luna.exe (PID: 7520)
    • Create files in a temporary directory

      • cs2.exe (PID: 7964)
      • cs2.exe (PID: 2096)
    • Reads the computer name

      • cs2.exe (PID: 7964)
      • cs2.exe (PID: 2096)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 4996)
      • WerFault.exe (PID: 7376)
    • Reads the software policy settings

      • slui.exe (PID: 7264)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:01:19 20:29:12
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: luna-uc-1.0/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
156
Monitored processes
20
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe cs2.exe no specs cs2.exe rundll32.exe no specs luna.exe no specs luna.exe conhost.exe no specs werfault.exe no specs luna.exe no specs luna.exe conhost.exe no specs cs2.exe no specs cs2.exe luna.exe no specs luna.exe conhost.exe no specs werfault.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1672\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeluna.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2096"C:\Users\admin\Desktop\cs2.exe" C:\Users\admin\Desktop\cs2.exe
explorer.exe
User:
admin
Company:
Gentee, Inc.
Integrity Level:
HIGH
Description:
pautomation Setup
Exit code:
3221225477
Version:
2.7.1
Modules
Images
c:\users\admin\desktop\cs2.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
3268"C:\Users\admin\Desktop\cs2.exe" C:\Users\admin\Desktop\cs2.exeexplorer.exe
User:
admin
Company:
Gentee, Inc.
Integrity Level:
MEDIUM
Description:
pautomation Setup
Exit code:
3221226540
Version:
2.7.1
Modules
Images
c:\users\admin\desktop\cs2.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
4996C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7964 -s 1088C:\Windows\SysWOW64\WerFault.execs2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
5800\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeluna.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6112"C:\Users\admin\Desktop\luna-uc-1.0\luna.exe" C:\Users\admin\Desktop\luna-uc-1.0\luna.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\luna-uc-1.0\luna.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6300"C:\Users\admin\Desktop\luna-uc-1.0\luna.exe" C:\Users\admin\Desktop\luna-uc-1.0\luna.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\luna-uc-1.0\luna.exe
c:\windows\system32\ntdll.dll
6724"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\luna-uc-1.0_[unknowncheats.me]_.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7216C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7240"C:\Users\admin\Desktop\luna-uc-1.0\luna.exe" C:\Users\admin\Desktop\luna-uc-1.0\luna.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\luna-uc-1.0\luna.exe
c:\windows\system32\ntdll.dll
Total events
6 208
Read events
6 178
Write events
24
Delete events
6

Modification events

(PID) Process:(6724) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6724) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6724) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6724) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\luna-uc-1.0_[unknowncheats.me]_.zip
(PID) Process:(6724) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6724) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6724) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6724) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4996) WerFault.exeKey:\REGISTRY\A\{8fd2aa79-ca54-340d-f49b-155649e3e511}\Root\InventoryApplicationFile
Operation:writeName:WritePermissionsCheck
Value:
1
(PID) Process:(4996) WerFault.exeKey:\REGISTRY\A\{8fd2aa79-ca54-340d-f49b-155649e3e511}\Root\InventoryApplicationFile\PermissionsCheckTestKey
Operation:delete keyName:(default)
Value:
Executable files
6
Suspicious files
10
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
4996WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_cs2.exe_2391509e58be89abcba8cbdca66ae46075a45329_7c33a770_865624f9-1764-4dc3-b285-c0160efd25d3\Report.wer
MD5:
SHA256:
7376WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_cs2.exe_ea385912c2328c4d4d50c16dc78a295777b93881_7c33a770_f454dd6d-200e-4604-9303-2e1151465c82\Report.wer
MD5:
SHA256:
7964cs2.exeC:\Users\admin\AppData\Local\Temp\genteeFA\guig.dllexecutable
MD5:8757CD8C68B85D668F15BEFC13251D5E
SHA256:96D1906EF8F1AC224830DA79BC9492AA21FFBACD4CAA4FB44CC64DEDF09047A2
7964cs2.exeC:\Users\admin\AppData\Local\Temp\genteert.dllexecutable
MD5:F1D0C343E43B8D4F026BD4C59099812F
SHA256:AEDB5E44C3865767F8CD803342C21658575C7349F4EE26882D2052F16C5ADCF9
6724WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6724.25921\luna-uc-1.0\dll.dllexecutable
MD5:55E171A0CC60C70967B671A7C0394539
SHA256:900E13A2D49EA541A877593BE75F1D13E2DD45B3E827F153023C04C47E9792F6
7964cs2.exeC:\Users\admin\AppData\Local\Temp\genteeFA\setup_temp.geabinary
MD5:83488ADFF316DCC82A0A104751523C53
SHA256:A973057AA052D7F83189451712D53AD0F60BA6A629D43EDCACE4B593DF59A96B
7964cs2.exeC:\Users\admin\AppData\Local\Temp\genteeFA\4default - 1.bmpimage
MD5:14A455E9EEF9FE7FEA4DE14D579A3E84
SHA256:B666E6BD71EFF3547FB2F5580AC61C64527F6F9BE6A2178FA00F80E32431460A
4996WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5BAC.tmp.xmlxml
MD5:D345417F574B579EAA7C7E6567E1FB9C
SHA256:B1F869DE2B82F5E07600BC0CE264DCD92F845221FC6EAD0C284BA65169069795
4996WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5A90.tmp.dmpbinary
MD5:0CD64E02B771D0B1617E947C40FA9724
SHA256:8C580FEF6AF5536D52B6B103B72BF0B1F18DC89CED55DC59434F23EE44F6B55A
4996WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5B7C.tmp.WERInternalMetadata.xmlbinary
MD5:8D90CEA421D36C668077DA828DD4C74A
SHA256:F5440ED6ED0B3D5DD9598092AD21902437124AA0970AB2075EB4A8B516AFEBA1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
20
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7784
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7784
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 23.53.40.176
  • 23.53.40.178
whitelisted
google.com
  • 172.217.16.206
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.160.2
  • 20.190.160.5
  • 40.126.32.134
  • 20.190.160.128
  • 40.126.32.140
  • 20.190.160.132
  • 40.126.32.133
  • 40.126.32.136
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.14
whitelisted

Threats

No threats detected
No debug info