Resubmissions

12/05/2024, 10:18

240512-mcbx4sba9w 6

12/05/2024, 10:08

240512-l6ny4aag6t 6

Analysis

  • max time kernel
    17s
  • max time network
    16s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2024, 10:18

General

  • Target

    Solara_Updater.exe

  • Size

    240KB

  • MD5

    b89051e8cf348e69c0943b540af3b99c

  • SHA1

    50200e338cb5df75077c6144884bf0ff6bf7cc7a

  • SHA256

    2e0a0e7e5d510f4274cd22ca2ed10f4bcca932a8cb2a756a47c13fb36a5fb58d

  • SHA512

    ab1e75c6ccf80fdd29bb35ec802032a46cf642e444ba392a2224cc025d05d78148f60bf81d4405b25301ce86b83e03d9249378864afa575fa6a61f05dea21408

  • SSDEEP

    6144:poKbfO8otzIJZiCgq1gQb4KgLqMIuLRTK83KrAqG:poKzO8otaZiCgSgQb4KgLqMIuLRTwrAq

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Solara_Updater.exe
    "C:\Users\Admin\AppData\Local\Temp\Solara_Updater.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2936
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4340

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2936-0-0x000000007502E000-0x000000007502F000-memory.dmp

          Filesize

          4KB

        • memory/2936-1-0x0000000000100000-0x0000000000142000-memory.dmp

          Filesize

          264KB

        • memory/2936-2-0x0000000075020000-0x00000000757D0000-memory.dmp

          Filesize

          7.7MB

        • memory/2936-4-0x0000000006130000-0x000000000613A000-memory.dmp

          Filesize

          40KB

        • memory/2936-5-0x0000000006160000-0x0000000006172000-memory.dmp

          Filesize

          72KB

        • memory/2936-415-0x0000000075020000-0x00000000757D0000-memory.dmp

          Filesize

          7.7MB

        • memory/4340-416-0x0000020E9BDC0000-0x0000020E9BDC1000-memory.dmp

          Filesize

          4KB

        • memory/4340-418-0x0000020E9BDC0000-0x0000020E9BDC1000-memory.dmp

          Filesize

          4KB

        • memory/4340-417-0x0000020E9BDC0000-0x0000020E9BDC1000-memory.dmp

          Filesize

          4KB

        • memory/4340-428-0x0000020E9BDC0000-0x0000020E9BDC1000-memory.dmp

          Filesize

          4KB

        • memory/4340-427-0x0000020E9BDC0000-0x0000020E9BDC1000-memory.dmp

          Filesize

          4KB

        • memory/4340-426-0x0000020E9BDC0000-0x0000020E9BDC1000-memory.dmp

          Filesize

          4KB

        • memory/4340-425-0x0000020E9BDC0000-0x0000020E9BDC1000-memory.dmp

          Filesize

          4KB

        • memory/4340-424-0x0000020E9BDC0000-0x0000020E9BDC1000-memory.dmp

          Filesize

          4KB

        • memory/4340-423-0x0000020E9BDC0000-0x0000020E9BDC1000-memory.dmp

          Filesize

          4KB

        • memory/4340-422-0x0000020E9BDC0000-0x0000020E9BDC1000-memory.dmp

          Filesize

          4KB