Analysis
-
max time kernel
1049s -
max time network
1056s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-06-2024 18:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1246629392017264730/1246630633296498749/SolaraB.zip?ex=665d16c0&is=665bc540&hm=e92ff639e30663ccb29b047bd40cc92f9c4abcaf01ca27c3a1803b4b7204e774&
Resource
win11-20240426-en
General
-
Target
https://cdn.discordapp.com/attachments/1246629392017264730/1246630633296498749/SolaraB.zip?ex=665d16c0&is=665bc540&hm=e92ff639e30663ccb29b047bd40cc92f9c4abcaf01ca27c3a1803b4b7204e774&
Malware Config
Extracted
discordrat
-
discord_token
MTI0NTMyMTUyODE4NzQyNDc3OA.GR78y4.vMfEj5skpraljw4MJ9J0BO20fQH19kOJIYpkg4
-
server_id
1245464272843051061
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
flow ioc 2 discord.com 7 raw.githubusercontent.com 25 discord.com 26 discord.com 29 discord.com 31 discord.com 22 discord.com 24 discord.com 27 raw.githubusercontent.com 28 discord.com 32 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133618257845677573" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000_Classes\Local Settings chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\SolaraB.zip:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2708 chrome.exe 2708 chrome.exe 2592 chrome.exe 2592 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2096 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2708 chrome.exe 2708 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2096 7zFM.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2708 wrote to memory of 3152 2708 chrome.exe 76 PID 2708 wrote to memory of 3152 2708 chrome.exe 76 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 1904 2708 chrome.exe 77 PID 2708 wrote to memory of 540 2708 chrome.exe 78 PID 2708 wrote to memory of 540 2708 chrome.exe 78 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79 PID 2708 wrote to memory of 952 2708 chrome.exe 79
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1246629392017264730/1246630633296498749/SolaraB.zip?ex=665d16c0&is=665bc540&hm=e92ff639e30663ccb29b047bd40cc92f9c4abcaf01ca27c3a1803b4b7204e774&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe140eab58,0x7ffe140eab68,0x7ffe140eab782⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1804,i,14235547499441518075,899409899756422821,131072 /prefetch:22⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=1804,i,14235547499441518075,899409899756422821,131072 /prefetch:82⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2128 --field-trial-handle=1804,i,14235547499441518075,899409899756422821,131072 /prefetch:82⤵PID:952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1804,i,14235547499441518075,899409899756422821,131072 /prefetch:12⤵PID:3764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1804,i,14235547499441518075,899409899756422821,131072 /prefetch:12⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 --field-trial-handle=1804,i,14235547499441518075,899409899756422821,131072 /prefetch:82⤵
- NTFS ADS
PID:700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4564 --field-trial-handle=1804,i,14235547499441518075,899409899756422821,131072 /prefetch:82⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 --field-trial-handle=1804,i,14235547499441518075,899409899756422821,131072 /prefetch:82⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1804,i,14235547499441518075,899409899756422821,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1312
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3724
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\SolarbB.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2096
-
C:\Users\Admin\Desktop\SolarbB.exe"C:\Users\Admin\Desktop\SolarbB.exe"1⤵PID:1360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5577a35996d4b8497d8db721f96107107
SHA139a9b25d39e00c9475d4474d2018a1474a0b7889
SHA2564988187cbc0bdfec97ba93c147b0240fd36fec4af76f8440d53641558124519a
SHA512fbd397eb5ba1a05ffb9261804101d4c4f31c3c52b63bea15408b37700a9f853a05408e4b48421cd29e2edc8fd6431336d79646de6d748d8425a4e58de1c3179b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5cf3e699e2a1229eff7dd9119f22b7b4a
SHA1824753d24a390f976647e9f6b306c62714324b43
SHA256d50b17784863fa6d941ba206cddd7f89018571615f3a0cf908ce268c50a8378a
SHA51256d014f02a6fb1fdc9522552f904f435524fdec271595f2fe307dec8a125e1980d41a05a34493df14c5a340d7ad1b7dc77bc6bc090647226d8e26b5e70703b67
-
Filesize
130KB
MD59768c888a37c2b57f4c23e32e69a81f5
SHA11b3a73b342c2bc21ddff9879fd9cb92ecb869f07
SHA2568bbee9711602dc186e3b560a557430feaa17e9cb9308bc13d5dcb606fbb76d91
SHA51272cb893c8464b870fdde6db496559180acd4a2c86fd15bad2dfddb9a9b65f8a3262dc5113c21fbe46e17e9de1deccee28e794adda77358b11d3516393e77949d
-
Filesize
27KB
MD5c0426e2992fd4fa90336665e6d56abe8
SHA18b00e93e5d84520c07d2e5942af997afe0dc1e63
SHA256f20ff052ab37ce445122c007f90d20148f4e0de842417b4e26230f128ce485f0
SHA512e78d71040b24143e51f311e4f3bb284f4b76ff5ddbde5a97b65b0ae1547d5e0979f77508abe40ce3cd11862d597d66d355cc3c3a3d4c01f0c520cd58d9593ebf
-
Filesize
219B
MD5ce51ea6561f88f1ac0fd9a04118ac17a
SHA10519e1f676029817d76d261727e8dbd3240bda63
SHA25654242d045af8c13f311d2fe3d16286b2d890d22fae5f6ec2f87c3a01de03ca1f
SHA51210dd3ef2841194bbde6972dbcaa738139c7c4f396880d82315216d4f91eec5ad5e2427785bf29c4013b90dd802dcee3980adfc2e73570786e4535241aa1ec5e5