Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7Solara.Dir...re.dll
windows11-21h2-x64
1Solara.Dir...ms.dll
windows11-21h2-x64
1Solara.Dir...pf.dll
windows11-21h2-x64
1Solara.Dir...dex.js
windows11-21h2-x64
3Solara.Dir...n/mime
windows11-21h2-x64
1Solara.Dir...me.cmd
windows11-21h2-x64
1Solara.Dir...me.ps1
windows11-21h2-x64
3Solara.Dir...DME.js
windows11-21h2-x64
3Solara.Dir...dex.js
windows11-21h2-x64
3Solara.Dir...DME.js
windows11-21h2-x64
3Solara.Dir...ten.js
windows11-21h2-x64
3Solara.Dir...DME.js
windows11-21h2-x64
3Solara.Dir...dex.js
windows11-21h2-x64
3Solara.Dir...ead.js
windows11-21h2-x64
3Solara.Dir...son.js
windows11-21h2-x64
3Solara.Dir...raw.js
windows11-21h2-x64
3Solara.Dir...ext.js
windows11-21h2-x64
3Solara.Dir...ded.js
windows11-21h2-x64
3Solara.Dir...dme.js
windows11-21h2-x64
3Solara.Dir...dex.js
windows11-21h2-x64
3Solara.Dir...und.js
windows11-21h2-x64
3Solara.Dir...dex.js
windows11-21h2-x64
3Solara.Dir...und.js
windows11-21h2-x64
3Solara.Dir...dex.js
windows11-21h2-x64
3Solara.Dir...DME.js
windows11-21h2-x64
3Solara.Dir...dex.js
windows11-21h2-x64
3Solara.Dir...DME.js
windows11-21h2-x64
3Solara.Dir...dex.js
windows11-21h2-x64
3Solara.Dir...dme.js
windows11-21h2-x64
3Solara.Dir...dex.js
windows11-21h2-x64
3Solara.Dir...DME.js
windows11-21h2-x64
3Solara.Dir...dex.js
windows11-21h2-x64
3Analysis
-
max time kernel
1415s -
max time network
1174s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/06/2024, 18:02
Behavioral task
behavioral1
Sample
Solara.Dir/Microsoft.Web.WebView2.Core.dll
Resource
win11-20240419-en
Behavioral task
behavioral2
Sample
Solara.Dir/Microsoft.Web.WebView2.WinForms.dll
Resource
win11-20240611-en
Behavioral task
behavioral3
Sample
Solara.Dir/Microsoft.Web.WebView2.Wpf.dll
Resource
win11-20240611-en
Behavioral task
behavioral4
Sample
Solara.Dir/Monaco/fileaccess/index.js
Resource
win11-20240508-en
Behavioral task
behavioral5
Sample
Solara.Dir/Monaco/fileaccess/node_modules/.bin/mime
Resource
win11-20240611-en
Behavioral task
behavioral6
Sample
Solara.Dir/Monaco/fileaccess/node_modules/.bin/mime.cmd
Resource
win11-20240508-en
Behavioral task
behavioral7
Sample
Solara.Dir/Monaco/fileaccess/node_modules/.bin/mime.ps1
Resource
win11-20240611-en
Behavioral task
behavioral8
Sample
Solara.Dir/Monaco/fileaccess/node_modules/accepts/README.js
Resource
win11-20240611-en
Behavioral task
behavioral9
Sample
Solara.Dir/Monaco/fileaccess/node_modules/accepts/index.js
Resource
win11-20240508-en
Behavioral task
behavioral10
Sample
Solara.Dir/Monaco/fileaccess/node_modules/array-flatten/README.js
Resource
win11-20240508-en
Behavioral task
behavioral11
Sample
Solara.Dir/Monaco/fileaccess/node_modules/array-flatten/array-flatten.js
Resource
win11-20240611-en
Behavioral task
behavioral12
Sample
Solara.Dir/Monaco/fileaccess/node_modules/body-parser/README.js
Resource
win11-20240611-en
Behavioral task
behavioral13
Sample
Solara.Dir/Monaco/fileaccess/node_modules/body-parser/index.js
Resource
win11-20240508-en
Behavioral task
behavioral14
Sample
Solara.Dir/Monaco/fileaccess/node_modules/body-parser/lib/read.js
Resource
win11-20240508-en
Behavioral task
behavioral15
Sample
Solara.Dir/Monaco/fileaccess/node_modules/body-parser/lib/types/json.js
Resource
win11-20240419-en
Behavioral task
behavioral16
Sample
Solara.Dir/Monaco/fileaccess/node_modules/body-parser/lib/types/raw.js
Resource
win11-20240611-en
Behavioral task
behavioral17
Sample
Solara.Dir/Monaco/fileaccess/node_modules/body-parser/lib/types/text.js
Resource
win11-20240611-en
Behavioral task
behavioral18
Sample
Solara.Dir/Monaco/fileaccess/node_modules/body-parser/lib/types/urlencoded.js
Resource
win11-20240508-en
Behavioral task
behavioral19
Sample
Solara.Dir/Monaco/fileaccess/node_modules/bytes/Readme.js
Resource
win11-20240611-en
Behavioral task
behavioral20
Sample
Solara.Dir/Monaco/fileaccess/node_modules/bytes/index.js
Resource
win11-20240508-en
Behavioral task
behavioral21
Sample
Solara.Dir/Monaco/fileaccess/node_modules/call-bind/callBound.js
Resource
win11-20240611-en
Behavioral task
behavioral22
Sample
Solara.Dir/Monaco/fileaccess/node_modules/call-bind/index.js
Resource
win11-20240611-en
Behavioral task
behavioral23
Sample
Solara.Dir/Monaco/fileaccess/node_modules/call-bind/test/callBound.js
Resource
win11-20240611-en
Behavioral task
behavioral24
Sample
Solara.Dir/Monaco/fileaccess/node_modules/call-bind/test/index.js
Resource
win11-20240508-en
Behavioral task
behavioral25
Sample
Solara.Dir/Monaco/fileaccess/node_modules/content-disposition/README.js
Resource
win11-20240508-en
Behavioral task
behavioral26
Sample
Solara.Dir/Monaco/fileaccess/node_modules/content-disposition/index.js
Resource
win11-20240508-en
Behavioral task
behavioral27
Sample
Solara.Dir/Monaco/fileaccess/node_modules/content-type/README.js
Resource
win11-20240419-en
Behavioral task
behavioral28
Sample
Solara.Dir/Monaco/fileaccess/node_modules/content-type/index.js
Resource
win11-20240419-en
Behavioral task
behavioral29
Sample
Solara.Dir/Monaco/fileaccess/node_modules/cookie-signature/Readme.js
Resource
win11-20240419-en
Behavioral task
behavioral30
Sample
Solara.Dir/Monaco/fileaccess/node_modules/cookie-signature/index.js
Resource
win11-20240611-en
Behavioral task
behavioral31
Sample
Solara.Dir/Monaco/fileaccess/node_modules/cookie/README.js
Resource
win11-20240611-en
Behavioral task
behavioral32
Sample
Solara.Dir/Monaco/fileaccess/node_modules/cookie/index.js
Resource
win11-20240508-en
General
-
Target
Solara.Dir/Monaco/fileaccess/node_modules/.bin/mime.ps1
-
Size
769B
-
MD5
bef04abf08e89532a476c3e474b5f509
-
SHA1
bb81073d8e07c483ee29121358871535973336e7
-
SHA256
a43d8b7d57dbbb21f2f98c331970d011177fa1c6be327aa0dbb84c1ad01e9201
-
SHA512
e20f86c40ce523477da136cb4aa3f29683dee567a31ebfad666666192417f49568e848cb8844e8dcd32d5501fb7176d47aca54c195324e6d41e73093699788b1
Malware Config
Signatures
-
pid Process 2192 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2192 powershell.exe 2192 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2192 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\node_modules\.bin\mime.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82