Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
73s -
max time network
82s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 08:44
Behavioral task
behavioral1
Sample
SolarisBETA/Solaris.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
SolarisBETA/Solaris.exe
Resource
win10v2004-20240419-en
General
-
Target
SolarisBETA/Solaris.exe
-
Size
143KB
-
MD5
f8cc2b58cec9e31bf803fae2e4f46bfa
-
SHA1
b2ffd2d4288b141e35e732f85e4949b4ed7b4820
-
SHA256
365dc0f2d75a3468ba97b0e4f262b34b3e42c0f8085c0cf6c4745abd1cab2b75
-
SHA512
d243e216bde8a8265b21923a1268de8b7665cbc6b547edcfc96b3d5883475980d9a870c6c9e3de523bd42dd8815648a43c739157cad3aa3f205555252e6e72a9
-
SSDEEP
3072:ErHyYbtwcPYv4DlyzCk/2WlguRdLDhwHeL7nxZUvXvtaIA2XP7XXADPG:ErHRbtwcPYv4DlyzCk/zguRvL7xwcIA7
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/1908-2-0x0000010CE1330000-0x0000010CE1544000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation Solaris.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Solaris.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Solaris.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Solaris.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2024 CefSharp.BrowserSubprocess.exe 2024 CefSharp.BrowserSubprocess.exe 2300 CefSharp.BrowserSubprocess.exe 2300 CefSharp.BrowserSubprocess.exe 3652 CefSharp.BrowserSubprocess.exe 3652 CefSharp.BrowserSubprocess.exe 4436 CefSharp.BrowserSubprocess.exe 4436 CefSharp.BrowserSubprocess.exe 536 CefSharp.BrowserSubprocess.exe 536 CefSharp.BrowserSubprocess.exe 4048 CefSharp.BrowserSubprocess.exe 4048 CefSharp.BrowserSubprocess.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1908 Solaris.exe Token: SeDebugPrivilege 2024 CefSharp.BrowserSubprocess.exe Token: SeDebugPrivilege 2300 CefSharp.BrowserSubprocess.exe Token: SeDebugPrivilege 3652 CefSharp.BrowserSubprocess.exe Token: SeDebugPrivilege 4436 CefSharp.BrowserSubprocess.exe Token: SeDebugPrivilege 536 CefSharp.BrowserSubprocess.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeDebugPrivilege 4048 CefSharp.BrowserSubprocess.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe Token: SeCreatePagefilePrivilege 1908 Solaris.exe Token: SeShutdownPrivilege 1908 Solaris.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2024 1908 Solaris.exe 87 PID 1908 wrote to memory of 2024 1908 Solaris.exe 87 PID 1908 wrote to memory of 4436 1908 Solaris.exe 88 PID 1908 wrote to memory of 4436 1908 Solaris.exe 88 PID 1908 wrote to memory of 2300 1908 Solaris.exe 89 PID 1908 wrote to memory of 2300 1908 Solaris.exe 89 PID 1908 wrote to memory of 536 1908 Solaris.exe 90 PID 1908 wrote to memory of 536 1908 Solaris.exe 90 PID 1908 wrote to memory of 3652 1908 Solaris.exe 91 PID 1908 wrote to memory of 3652 1908 Solaris.exe 91 PID 1908 wrote to memory of 4048 1908 Solaris.exe 92 PID 1908 wrote to memory of 4048 1908 Solaris.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\SolarisBETA\Solaris.exe"C:\Users\Admin\AppData\Local\Temp\SolarisBETA\Solaris.exe"1⤵
- Checks computer location settings
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\SolarisBETA\CefSharp.BrowserSubprocess.exe"C:\Users\Admin\AppData\Local\Temp\SolarisBETA\CefSharp.BrowserSubprocess.exe" --type=gpu-process --no-sandbox --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\Admin\AppData\Local\Temp\SolarisBETA\debug.log" --mojo-platform-channel-handle=2120 --field-trial-handle=2128,i,2272622872393871340,7246379468325258040,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version /prefetch:2 --host-process-id=19082⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\SolarisBETA\CefSharp.BrowserSubprocess.exe"C:\Users\Admin\AppData\Local\Temp\SolarisBETA\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --log-file="C:\Users\Admin\AppData\Local\Temp\SolarisBETA\debug.log" --mojo-platform-channel-handle=2924 --field-trial-handle=2128,i,2272622872393871340,7246379468325258040,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version /prefetch:8 --host-process-id=19082⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\SolarisBETA\CefSharp.BrowserSubprocess.exe"C:\Users\Admin\AppData\Local\Temp\SolarisBETA\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --log-file="C:\Users\Admin\AppData\Local\Temp\SolarisBETA\debug.log" --mojo-platform-channel-handle=2992 --field-trial-handle=2128,i,2272622872393871340,7246379468325258040,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version /prefetch:8 --host-process-id=19082⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\SolarisBETA\CefSharp.BrowserSubprocess.exe"C:\Users\Admin\AppData\Local\Temp\SolarisBETA\CefSharp.BrowserSubprocess.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --first-renderer-process --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\SolarisBETA\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3248 --field-trial-handle=2128,i,2272622872393871340,7246379468325258040,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version --host-process-id=1908 /prefetch:12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
C:\Users\Admin\AppData\Local\Temp\SolarisBETA\CefSharp.BrowserSubprocess.exe"C:\Users\Admin\AppData\Local\Temp\SolarisBETA\CefSharp.BrowserSubprocess.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\SolarisBETA\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3252 --field-trial-handle=2128,i,2272622872393871340,7246379468325258040,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version --host-process-id=1908 /prefetch:12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
C:\Users\Admin\AppData\Local\Temp\SolarisBETA\CefSharp.BrowserSubprocess.exe"C:\Users\Admin\AppData\Local\Temp\SolarisBETA\CefSharp.BrowserSubprocess.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\SolarisBETA\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3372 --field-trial-handle=2128,i,2272622872393871340,7246379468325258040,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version --host-process-id=1908 /prefetch:12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
738B
MD54f780472301b1f2b33540fbcbb9c9407
SHA179e502d461157deb75e73a200523a4992f96bd0d
SHA256d333d8d7f6c12d0fd04f1589f15b706826f2f6d4e3816255b49ba8facf085776
SHA512433f8efe672059caef808d5efe8d87dc658bdfc937842c06546ad234c97bbb6af41688002f5b3428e058d4a864f2c70e85bc7d9cae61f09b0f160d75e7ef06d3
-
Filesize
529B
MD510a19ed3dc959fd1c25055e53be9bb91
SHA1fdaffbfa06ba536fae8eb87c89850a4f7da3771b
SHA256acaa8cee9da9686ecaff0c9bc90181e55e4b0694962b454dcfd2d6f686fe876a
SHA5125f4786252881f8a8a884780e552cc8b7f7e184c32e362110bdd23c4cba267a5eb4b9a220c898230410587e8e6eac5506bf1057eeb5ebed3f1153f472cbac013e
-
Filesize
23KB
MD5faf1a5cc4ffd0480be8ac93bf23a880b
SHA1df3194757817333bb5d440bc6e031d54f45bb7aa
SHA256d3aa6f2eb04d3d16cd2bc70f6984f5de8656ebfe944227798e2328e8063b3684
SHA5121e6b0ea283e708224af100da32a84a148722e59e87f08ee386dd7337be25608f827472eba2e5f9456e041f442c49795163d0e8bfcb4732493e125e6595b67969