Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 08:44
Behavioral task
behavioral1
Sample
SolarisBETA/Solaris.exe
Resource
win7-20240215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
SolarisBETA/Solaris.exe
Resource
win10v2004-20240419-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
SolarisBETA/Solaris.exe
-
Size
143KB
-
MD5
f8cc2b58cec9e31bf803fae2e4f46bfa
-
SHA1
b2ffd2d4288b141e35e732f85e4949b4ed7b4820
-
SHA256
365dc0f2d75a3468ba97b0e4f262b34b3e42c0f8085c0cf6c4745abd1cab2b75
-
SHA512
d243e216bde8a8265b21923a1268de8b7665cbc6b547edcfc96b3d5883475980d9a870c6c9e3de523bd42dd8815648a43c739157cad3aa3f205555252e6e72a9
-
SSDEEP
3072:ErHyYbtwcPYv4DlyzCk/2WlguRdLDhwHeL7nxZUvXvtaIA2XP7XXADPG:ErHRbtwcPYv4DlyzCk/zguRvL7xwcIA7
Score
10/10
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/2936-2-0x000000001C0A0000-0x000000001C2B4000-memory.dmp family_agenttesla -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Solaris.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Solaris.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Solaris.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2088 2936 Solaris.exe 28 PID 2936 wrote to memory of 2088 2936 Solaris.exe 28 PID 2936 wrote to memory of 2088 2936 Solaris.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\SolarisBETA\Solaris.exe"C:\Users\Admin\AppData\Local\Temp\SolarisBETA\Solaris.exe"1⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2936 -s 8362⤵PID:2088
-