Analysis
-
max time kernel
359s -
max time network
363s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 11:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
SolaraBootstrapper.exe
Resource
win7-20240508-en
windows7-x64
2 signatures
600 seconds
Behavioral task
behavioral2
Sample
SolaraBootstrapper.exe
Resource
win10-20240404-en
windows10-1703-x64
11 signatures
600 seconds
General
-
Target
SolaraBootstrapper.exe
-
Size
12KB
-
MD5
06f13f50c4580846567a644eb03a11f2
-
SHA1
39ee712b6dfc5a29a9c641d92c7467a2c4445984
-
SHA256
0636e8f9816b17d7cff26ef5d280ce1c1aae992cda8165c6f4574029258a08a9
-
SHA512
f5166a295bb0960e59c176eefa89c341563fdf0eec23a45576e0ee5bf7e8271cc35eb9dd56b11d9c0bbe789f2eac112643108c46be3341fa332cfcf39b4a90b9
-
SSDEEP
192:cDnQvi7auc35nuKdhAWVIanaLvmr/XKTxnTc1BREVXLGDlNjA:cDn97auc35tAKIanayzKto1jEVQzj
Score
6/10
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SolaraBootstrapper.exedescription pid process Token: SeDebugPrivilege 1636 SolaraBootstrapper.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1636-0-0x0000000073F1E000-0x0000000073F1F000-memory.dmpFilesize
4KB
-
memory/1636-1-0x0000000000910000-0x000000000091A000-memory.dmpFilesize
40KB
-
memory/1636-2-0x0000000073F10000-0x00000000745FE000-memory.dmpFilesize
6.9MB
-
memory/1636-3-0x0000000073F10000-0x00000000745FE000-memory.dmpFilesize
6.9MB