Overview
overview
9Static
static
9Solara⠀�...��.exe
windows11-21h2-x64
7Solara⠀�...32.dll
windows11-21h2-x64
3Solara⠀�...32.lib
windows11-21h2-x64
3Solara⠀�...SE.txt
windows11-21h2-x64
3Solara⠀�...wp.dll
windows11-21h2-x64
1Solara⠀�...uwpver
windows11-21h2-x64
1Solara⠀�...ff.bin
windows11-21h2-x64
3Solara⠀�...offver
windows11-21h2-x64
1Solara⠀�...on.txt
windows11-21h2-x64
3Solara⠀�...ts.dll
windows11-21h2-x64
1Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-05-2024 09:32
Behavioral task
behavioral1
Sample
Solara⠀⠀/Solara⠀Executor⠀V2⠀.exe
Resource
win11-20240419-en
Behavioral task
behavioral2
Sample
Solara⠀⠀/dll/VMProtectSDK32.dll
Resource
win11-20240426-en
Behavioral task
behavioral3
Sample
Solara⠀⠀/dll/VMProtectSDK32.lib
Resource
win11-20240426-en
Behavioral task
behavioral4
Sample
Solara⠀⠀/dll/autoexec/HOW_TO_USE.txt
Resource
win11-20240419-en
Behavioral task
behavioral5
Sample
Solara⠀⠀/dll/celeryuwp.dll
Resource
win11-20240508-en
Behavioral task
behavioral6
Sample
Solara⠀⠀/dll/celeryuwpver
Resource
win11-20240508-en
Behavioral task
behavioral7
Sample
Solara⠀⠀/dll/uwpoff.bin
Resource
win11-20240508-en
Behavioral task
behavioral8
Sample
Solara⠀⠀/dll/uwpoffver
Resource
win11-20240426-en
Behavioral task
behavioral9
Sample
Solara⠀⠀/dll/uwpversion.txt
Resource
win11-20240426-en
Behavioral task
behavioral10
Sample
Solara⠀⠀/scripts/scripts.dll
Resource
win11-20240426-en
General
-
Target
Solara⠀⠀/dll/uwpoff.bin
-
Size
5KB
-
MD5
f6bd9ca8a75d0e07cfd57177cf7bdab3
-
SHA1
a876290038821ce7ae8d14e3db3286323f22caa7
-
SHA256
6b1f4c2089b4086bdfd8b11e90721baffe74ddad2240c787e0245e49e93ac332
-
SHA512
3b1521a404c47c795d2c960bc3edb5e91cc5e598da3c135c16d46b74dd59a0d3dd44c4dc3158f347489b283a7194bf100389cfeb87d8379e6fcc791705fbfb1a
-
SSDEEP
48:SClA9KbxnWqU6o+MKd2kbcrzQUuPIKtcuMj18SYlt+gtXvsY9W2XApEdF0/JxNyV:nlAkbAeo+BcPNuMuLlhtX7ptv0/H9Cww
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1672260578-815027929-964132517-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1672260578-815027929-964132517-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 2292 OpenWith.exe