Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-06-2024 06:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
SolaraBootstrapper.exe
Resource
win7-20240508-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
SolaraBootstrapper.exe
Resource
win10v2004-20240508-en
7 signatures
150 seconds
General
-
Target
SolaraBootstrapper.exe
-
Size
13KB
-
MD5
8be476fb431fcf11156417f410acf978
-
SHA1
55a19def82358ffc006487e1f49be04277e12bd5
-
SHA256
14cf7648123e018dcdfc2aa386135a0510a9f7b12b8bc125ad4e32fd7f16999c
-
SHA512
cf747947ff0bedf87230e0fa08ee534f44f08962a52ae3dd0c0d734d6f4131456a0e2dc1ac230fa6500d5b254a64cae9e01161d1a690e26794c38d66e22cb5ed
-
SSDEEP
192:IUxOQrGVa/nHU0LgJ2jaVb4+LHdrDXy3pifUJ1hHxrWjd:hIQaVafU0LmqaVb4+xPy5ifU1hRyj
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2968 2936 WerFault.exe SolaraBootstrapper.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SolaraBootstrapper.exedescription pid process Token: SeDebugPrivilege 2936 SolaraBootstrapper.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
SolaraBootstrapper.exedescription pid process target process PID 2936 wrote to memory of 2968 2936 SolaraBootstrapper.exe WerFault.exe PID 2936 wrote to memory of 2968 2936 SolaraBootstrapper.exe WerFault.exe PID 2936 wrote to memory of 2968 2936 SolaraBootstrapper.exe WerFault.exe PID 2936 wrote to memory of 2968 2936 SolaraBootstrapper.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 10882⤵
- Program crash
PID:2968
-