executeScript
inject
isAttached
Behavioral task
behavioral1
Sample
Solara.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
Solara.dll
Resource
win11-20240508-en
Target
Solara.dll
Size
6.8MB
MD5
831de1c61f46c6ab9dff283a2e8787a0
SHA1
f63a602b8ec3bb067099e611d1fdc44cb58e70ed
SHA256
55b7d2a1cd1fb6e068df7d55107ca2c141b236f480bdbc21c7a38de904dc2129
SHA512
95da21f3a8c754079e7a778a9742dc1d5b2e4419f2e1ebb5bc644a7138febf590f4efd6342407939c25d752c73017238717b8e7dd92b05ee592255c3bff1d2e5
SSDEEP
196608:6RsDScgbtUzu7bMdiEM0GAmb0WFod2/1itcsZ:AVTbtUzu7bUMdlb0Uod2/ApZ
resource | yara_rule |
---|---|
sample | themida |
Checks for missing Authenticode signature.
resource |
---|
Solara.dll |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
executeScript
inject
isAttached
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ