File name:

moon.exe

Full analysis: https://app.any.run/tasks/888244ae-c6e9-48bd-99a5-2c3340442ef6
Verdict: Malicious activity
Analysis date: October 29, 2024, 15:43:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
vmprotect
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386, for MS Windows, 6 sections
MD5:

0A0698E9B85864FDC3803A574A8D12C8

SHA1:

9351E3C6F43066C393599D394186A5F94AEC44E1

SHA256:

5A9EC98D04D88858793AFC0F80E841DFA223F8904AE32B04B48075EEC04FB6BA

SSDEEP:

98304:OBU87Vne17Jd/qv2vnDc0RENHVpfvl10uydJx6vk6glycOyqyND0OrD1q+tSO2CX:Fpe0nP0CWy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the Internet Settings

      • moon.exe (PID: 3500)
    • Reads security settings of Internet Explorer

      • moon.exe (PID: 3500)
    • Checks Windows Trust Settings

      • moon.exe (PID: 3500)
    • Starts CMD.EXE for commands execution

      • moon.exe (PID: 3500)
    • Reads settings of System Certificates

      • moon.exe (PID: 3500)
    • Potential Corporate Privacy Violation

      • svchost.exe (PID: 1060)
  • INFO

    • Checks proxy server information

      • moon.exe (PID: 3500)
    • Checks supported languages

      • moon.exe (PID: 3500)
    • Reads the computer name

      • moon.exe (PID: 3500)
    • Reads the machine GUID from the registry

      • moon.exe (PID: 3500)
    • Reads the software policy settings

      • moon.exe (PID: 3500)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 1568)
    • VMProtect protector has been detected

      • moon.exe (PID: 3500)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (61.6)
.dll | Win32 Dynamic Link Library (generic) (14.6)
.exe | Win32 Executable (generic) (10)
.exe | Win16/32 Executable Delphi generic (4.6)
.exe | Generic Win/DOS Executable (4.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:10:22 09:55:09+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 14.29
CodeSize: 25600
InitializedDataSize: 2587648
UninitializedDataSize: -
EntryPoint: 0xa715af
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
43
Monitored processes
6
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT moon.exe svchost.exe cmd.exe no specs cmd.exe no specs wmpnscfg.exe no specs moon.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1060C:\Windows\system32\svchost.exe -k NetworkServiceC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1100C:\Windows\system32\cmd.exe /c clsC:\Windows\System32\cmd.exemoon.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1568"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3500"C:\Users\admin\AppData\Local\Temp\moon.exe" C:\Users\admin\AppData\Local\Temp\moon.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\moon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msvcp140.dll
3660"C:\Users\admin\AppData\Local\Temp\moon.exe" C:\Users\admin\AppData\Local\Temp\moon.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\moon.exe
c:\windows\system32\ntdll.dll
3696C:\Windows\system32\cmd.exe /c Color 02C:\Windows\System32\cmd.exemoon.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
7 818
Read events
7 769
Write events
43
Delete events
6

Modification events

(PID) Process:(1060) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Nla\Cache\Intranet
Operation:writeName:{4040CF00-1B3E-486A-B407-FA14C56B6FC0}
Value:
525400363EFF
(PID) Process:(3500) moon.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3500) moon.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3500) moon.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3500) moon.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(3500) moon.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3500) moon.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(3500) moon.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
(PID) Process:(3500) moon.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoConfigURL
Value:
(PID) Process:(3500) moon.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoDetect
Value:
Executable files
0
Suspicious files
12
Text files
5
Unknown types
1

Dropped files

PID
Process
Filename
Type
3500moon.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751binary
MD5:822467B728B7A66B081C91795373789A
SHA256:AF2343382B88335EEA72251AD84949E244FF54B6995063E24459A7216E9576B9
3500moon.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7FD6B1DF4E991C74C18FBA2A610DC1B8binary
MD5:1779D6A6273CB822CEF22534A1592683
SHA256:2A9262151976875A0A2B9318CCDBD88480792876F1F7FE1F9358CD2B23F829C0
3500moon.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:375BD6F40C6BA0A80D57E372A43A34E0
SHA256:9EC6757D82FDAEE07DF21C43F2ABE0E1FFBA6AA5C09B48163508AF9C8DBF1291
3500moon.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\RP95SSNT.txttext
MD5:FDC009D8DEF1E02F60E78A6B618CEA2D
SHA256:4295F61C2D7F10150EFA1785631CBDB88DCD00814814C65D91AA2568AB25A5AF
3500moon.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\welcometomlmaster[1].htmhtml
MD5:9E7E9DC62FE3295AC17A0A19B7F43462
SHA256:DBD2B7F58BDAA95EDC80C47DEC795B6E73C18F3B95CC3C4AF46F333B9459F1CB
3500moon.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7FD6B1DF4E991C74C18FBA2A610DC1B8binary
MD5:F52CDE2A934EF191ADBD2EE0D41C9CC7
SHA256:EB25E2833C213A9E9A164A394A88E9DDB910A8F1D65689BEBAC32414800115FD
1060svchost.exeC:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\Cab48CA.tmpcompressed
MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
SHA256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
3500moon.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\73FELDYB.txttext
MD5:85A2AC7AA2A40E5761816617B14506D0
SHA256:4AC42C0CD0A86CF4AF2B0EFB4C81B15B9DA7C6AC807158B177853FC4A8312FB6
3500moon.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\MYZI5OE4.txttext
MD5:A7F5450CA85B4DE7286604F06FF7FBEF
SHA256:6A2FE4B6627E4CA34CBBAD76B854EAD9E8FE2BB09CFE2E1D5165934171D9BA59
1060svchost.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
SHA256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
18
DNS requests
10
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3500
moon.exe
GET
200
72.246.169.163:80
http://x1.c.lencr.org/
unknown
whitelisted
3500
moon.exe
GET
304
23.53.40.35:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?de243428eafece54
unknown
whitelisted
3500
moon.exe
GET
200
195.138.255.19:80
http://r11.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgRx5%2Fk0fJHj59OoaM1Ns7xDwA%3D%3D
unknown
whitelisted
3500
moon.exe
GET
403
185.176.43.98:80
http://moonsoft.eu3.biz/uwu.php
unknown
malicious
3500
moon.exe
GET
403
91.195.240.85:80
http://ww16.moonlight.uno/donaldtrump.html?sub1=20241030-0244-034a-852f-f78238e03548
unknown
unknown
3500
moon.exe
GET
200
199.59.243.227:80
http://ww25.moonlight.uno/music/welcometomlmaster.wav?subid1=20241030-0244-0206-838e-fb3f13e2ca75
unknown
unknown
1060
svchost.exe
GET
200
23.53.40.35:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?3c4d1c7aa342ad0e
unknown
whitelisted
1060
svchost.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3500
moon.exe
GET
403
185.176.43.98:80
http://moonsoft.eu3.biz/id.php
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:137
whitelisted
2564
svchost.exe
239.255.255.250:3702
whitelisted
1060
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
3500
moon.exe
103.224.182.253:443
moonlight.uno
Trellian Pty. Limited
AU
suspicious
3500
moon.exe
23.53.40.35:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
whitelisted
3500
moon.exe
72.246.169.163:80
x1.c.lencr.org
AKAMAI-AS
DE
whitelisted
3500
moon.exe
195.138.255.19:80
r11.o.lencr.org
AS33891 Netzbetrieb GmbH
DE
whitelisted
3500
moon.exe
199.59.243.227:80
ww25.moonlight.uno
AMAZON-02
US
suspicious

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.174
whitelisted
moonlight.uno
  • 103.224.182.253
unknown
ctldl.windowsupdate.com
  • 23.53.40.35
  • 23.53.40.49
  • 23.53.40.83
whitelisted
x1.c.lencr.org
  • 72.246.169.163
whitelisted
r11.o.lencr.org
  • 195.138.255.19
whitelisted
ww25.moonlight.uno
  • 199.59.243.227
unknown
moonsoft.eu3.biz
  • 185.176.43.98
malicious
ww16.moonlight.uno
  • 91.195.240.85
unknown
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.176
  • 23.48.23.177
  • 23.48.23.164
  • 23.48.23.173
whitelisted

Threats

PID
Process
Class
Message
1060
svchost.exe
Potential Corporate Privacy Violation
ET GAMES Moonlight Hack Domain in DNS Lookup
3500
moon.exe
Potentially Bad Traffic
ET HUNTING Observed Let's Encrypt Certificate for Suspicious TLD (.xyz)
1060
svchost.exe
Potential Corporate Privacy Violation
ET GAMES Moonlight Hack Domain in DNS Lookup
No debug info