Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
06-05-2024 13:00
Behavioral task
behavioral1
Sample
SolaraQB.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
SolaraQB.exe
Resource
win10v2004-20240419-en
General
-
Target
SolaraQB.exe
-
Size
33.2MB
-
MD5
3b2b7e806989b481aeb8a71eb95c9e9e
-
SHA1
dd1d80a59120aeaaa1239c05cf385579226747f7
-
SHA256
56e17b8f1e7d3348d2c8730369594171547017906ffd95109dc2ec8da127ca48
-
SHA512
9c4936b8b82092897f877825b6b6275b075f81a02bf0326792ecd393f3d839495ccb4422d2d55b95f35d5f509f59ff540e46826d7ddcbcb2f5d76d08eb759f00
-
SSDEEP
786432:1dM77JXb1ukCDeE6q+m5jVagaIQm2q+L5+u9Y2KN:1dI1EDX6q3Am2F3K
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
SolaraQB.exepid process 2380 SolaraQB.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI24162\python310.dll upx -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
SolaraQB.exedescription pid process target process PID 2416 wrote to memory of 2380 2416 SolaraQB.exe SolaraQB.exe PID 2416 wrote to memory of 2380 2416 SolaraQB.exe SolaraQB.exe PID 2416 wrote to memory of 2380 2416 SolaraQB.exe SolaraQB.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD54a6afa2200b1918c413d511c5a3c041c
SHA139ca3c2b669adac07d4a5eb1b3b79256cfe0c3b3
SHA256bec187f608507b57cf0475971ba646b8ab42288af8fdcf78bce25f1d8c84b1da
SHA512dbffb06ffff0542200344ea9863a44a6f1e1b783379e53df18580e697e8204d3911e091deb32a9c94b5599cdd54301b705b74e1f51104151cf13b89d57280a20