Analysis

  • max time kernel
    44s
  • max time network
    102s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    13-06-2024 18:14

General

  • Target

    SolaraBootstrapper.exe

  • Size

    13KB

  • MD5

    6557bd5240397f026e675afb78544a26

  • SHA1

    839e683bf68703d373b6eac246f19386bb181713

  • SHA256

    a7fecfc225dfdd4e14dcd4d1b4ba1b9f8e4d1984f1cdd8cda3a9987e5d53c239

  • SHA512

    f2399d34898a4c0c201372d2dd084ee66a66a1c3eae949e568421fe7edada697468ef81f4fcab2afd61eaf97bcb98d6ade2d97295e2f674e93116d142e892e97

  • SSDEEP

    192:konexQO0FoAWyEfJkVIaqaLHmr/XKT0ifnTJ1jvVXctNjA:HnexHAWyEfJoIaqayzKAifd1LVEj

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe
    "C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2980
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2636
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2540
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:560
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6ab9758,0x7fef6ab9768,0x7fef6ab9778
        2⤵
          PID:332
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1276,i,1565831726996585540,5360074157881015735,131072 /prefetch:2
          2⤵
            PID:852
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1276,i,1565831726996585540,5360074157881015735,131072 /prefetch:8
            2⤵
              PID:1648
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1276,i,1565831726996585540,5360074157881015735,131072 /prefetch:8
              2⤵
                PID:1124
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2308 --field-trial-handle=1276,i,1565831726996585540,5360074157881015735,131072 /prefetch:1
                2⤵
                  PID:1732
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2320 --field-trial-handle=1276,i,1565831726996585540,5360074157881015735,131072 /prefetch:1
                  2⤵
                    PID:2328
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1388 --field-trial-handle=1276,i,1565831726996585540,5360074157881015735,131072 /prefetch:2
                    2⤵
                      PID:1536
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1296 --field-trial-handle=1276,i,1565831726996585540,5360074157881015735,131072 /prefetch:1
                      2⤵
                        PID:1052
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3476 --field-trial-handle=1276,i,1565831726996585540,5360074157881015735,131072 /prefetch:8
                        2⤵
                          PID:1832
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3596 --field-trial-handle=1276,i,1565831726996585540,5360074157881015735,131072 /prefetch:8
                          2⤵
                            PID:2092
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3988 --field-trial-handle=1276,i,1565831726996585540,5360074157881015735,131072 /prefetch:8
                            2⤵
                              PID:1072
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level
                              2⤵
                                PID:1716
                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe
                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x1403a7688,0x1403a7698,0x1403a76a8
                                  3⤵
                                    PID:2632
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3856 --field-trial-handle=1276,i,1565831726996585540,5360074157881015735,131072 /prefetch:1
                                  2⤵
                                    PID:2256
                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                  1⤵
                                    PID:2272
                                  • C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe
                                    "C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe"
                                    1⤵
                                      PID:1736

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                      Filesize

                                      361B

                                      MD5

                                      01f901e3c9dd22b7a022767ed4af412d

                                      SHA1

                                      4af0fe92de95c2a6dfbcc93fc4ea7ee0c14b0b8f

                                      SHA256

                                      c7af4b20487c536516d495045926030199968e5c00cf6f21c4620bd64959b25d

                                      SHA512

                                      4a9eb374b25f8d2cf5c9ab241aeef03c2f2f0b285834a7fb40ebffdeb76e911887f95d51284798b7571eefd203da61dc021b6e2b0b0ea4b21b5fbbc856b43d6f

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      4KB

                                      MD5

                                      3d7d085fec9a3c3ea116598433efafcd

                                      SHA1

                                      33639d0406f69d3c94a1c1e24c9382b5f0dc91a0

                                      SHA256

                                      0c188610441adfea778454a84bbc2274bdca40d7de3cce777cc564d3b70607f9

                                      SHA512

                                      aba7282d6c4456487da7e99956588cf9888e9ffabbf4192bc864b98a18bb00a47c597e3104c276b8bdbb00036be093804dcc49d4f4d13fc5ebfc1697bb149c16

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      4KB

                                      MD5

                                      b29d8123413fb6fd5fdf9af04e8f40a3

                                      SHA1

                                      247dd546887346113396286187092fd9de626042

                                      SHA256

                                      6a2eca8c19ab95b8873b5a9a6a2060dd37b6eb9ad66c9a78dd9962ea4b4bc142

                                      SHA512

                                      38fc6886c0788147f5274fba47331696cd4a9e2514f27119b345cd23297003a001e15894ed134c1c05d2a8092ccfe929a50c5dfdbc95c12bfc602b9f8efc0f94

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      4KB

                                      MD5

                                      58ad8778b255d83c5200b77406bcf86b

                                      SHA1

                                      87b3573997205f43fc9274717cc5d9a3e461be6a

                                      SHA256

                                      2b7d7d0b204c9efb4185555da382a3aecfba5d53d5c05ebf71b7b70ba98db36c

                                      SHA512

                                      ff9880562a679ba1bc066dbf5accc23abaa12b29960771a88d220ad0515baf874a3584bc29f7c401ba9f6dc1bb3f33c0aaac18c77a462868f069ced9ab2cc900

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                      Filesize

                                      16B

                                      MD5

                                      18e723571b00fb1694a3bad6c78e4054

                                      SHA1

                                      afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                      SHA256

                                      8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                      SHA512

                                      43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                      Filesize

                                      296KB

                                      MD5

                                      cccb47b093d2a7ce235161e01e8ab955

                                      SHA1

                                      2308b793fa4d407c9fe96a7be639020bfc355b03

                                      SHA256

                                      d38f416371040d919ef0692d96767ff35df486a09984e9b347d8a6dac254d406

                                      SHA512

                                      3a0c4a70b49fc0209d96b42f053d14e4bbea11391c56ff98bde4ee5346e961a1c6e89a5aa2061e14d340d4c9a04ff6319964730249658bf0054082a1083a1335

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                      Filesize

                                      264KB

                                      MD5

                                      f50f89a0a91564d0b8a211f8921aa7de

                                      SHA1

                                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                                      SHA256

                                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                      SHA512

                                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                    • C:\Users\Admin\Saved Games\Microsoft Games\Purble Place\desktop.ini

                                      Filesize

                                      94B

                                      MD5

                                      5fee8c846e9b919705407a20885194ab

                                      SHA1

                                      a1aa27e0366ae24c0c5f3a92bb38817615437080

                                      SHA256

                                      ea27260dffe170fc8c7987da31e3b5536795a9e30c76a2e6d4047db474a9617d

                                      SHA512

                                      e39ea9473731e201caef09ac448cc333ac7377df6deec1781b54e7d51af41a7e5717725db56088cb2adbe0c647eea2bba91e8a95ad77eaa8d6446c7aea890c11

                                    • \??\pipe\crashpad_560_QHOASROYOQFDEPHX

                                      MD5

                                      d41d8cd98f00b204e9800998ecf8427e

                                      SHA1

                                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                                      SHA256

                                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                      SHA512

                                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                    • memory/1736-121-0x0000000000590000-0x000000000059A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/1736-126-0x0000000001DD0000-0x0000000001DDA000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/1736-181-0x0000000000590000-0x0000000000592000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/1736-122-0x0000000000590000-0x000000000059A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/1736-125-0x0000000000590000-0x000000000059A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/1736-124-0x0000000000590000-0x000000000059A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/1736-123-0x0000000000590000-0x000000000059A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/1736-153-0x0000000001DD0000-0x0000000001DDA000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/1736-129-0x0000000001DD0000-0x0000000001DDA000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/1736-128-0x0000000001DD0000-0x0000000001DDA000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/1736-127-0x0000000001DD0000-0x0000000001DDA000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/1736-154-0x0000000001DD0000-0x0000000001DDA000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/1736-145-0x0000000000590000-0x000000000059A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/1736-144-0x0000000000590000-0x000000000059A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/1736-143-0x0000000000590000-0x000000000059A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/1736-142-0x0000000000590000-0x000000000059A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/1736-155-0x0000000001DD0000-0x0000000001DDA000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/1736-156-0x0000000001DD0000-0x0000000001DDA000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/2540-5-0x0000000140000000-0x00000001405E8000-memory.dmp

                                      Filesize

                                      5.9MB

                                    • memory/2540-4-0x0000000140000000-0x00000001405E8000-memory.dmp

                                      Filesize

                                      5.9MB

                                    • memory/2980-3-0x0000000074980000-0x000000007506E000-memory.dmp

                                      Filesize

                                      6.9MB

                                    • memory/2980-0-0x000000007498E000-0x000000007498F000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2980-2-0x0000000074980000-0x000000007506E000-memory.dmp

                                      Filesize

                                      6.9MB

                                    • memory/2980-1-0x0000000000B90000-0x0000000000B9A000-memory.dmp

                                      Filesize

                                      40KB