Analysis Overview
SHA256
b0bc11ed599ee0020aada24b7c60d8ae7d2a6cf14e57930ed350ca7418c5b944
Threat Level: Known bad
The file SolaraBETA.exe was found to be: Known bad.
Malicious Activity Summary
Darkcomet family
Darkcomet
Loads dropped DLL
Executes dropped EXE
Legitimate hosting services abused for malware hosting/C2
Suspicious use of SetThreadContext
Enumerates physical storage devices
Unsigned PE
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-21 11:36
Signatures
Darkcomet family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-21 11:36
Reported
2024-06-21 11:39
Platform
win7-20240220-en
Max time kernel
120s
Max time network
120s
Command Line
Signatures
Darkcomet
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\DLLHOST.EXE | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\SOLARABOOTSTRAPPER.EXE | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\SolaraBETA.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\SolaraBETA.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\SolaraBETA.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | raw.githubusercontent.com | N/A | N/A |
| N/A | raw.githubusercontent.com | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2020 set thread context of 2708 | N/A | C:\Users\Admin\AppData\Local\Temp\DLLHOST.EXE | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\SOLARABOOTSTRAPPER.EXE | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\SOLARABOOTSTRAPPER.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\iexplore.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\iexplore.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\SolaraBETA.exe
"C:\Users\Admin\AppData\Local\Temp\SolaraBETA.exe"
C:\Users\Admin\AppData\Local\Temp\DLLHOST.EXE
"C:\Users\Admin\AppData\Local\Temp\DLLHOST.EXE"
C:\Users\Admin\AppData\Local\Temp\SOLARABOOTSTRAPPER.EXE
"C:\Users\Admin\AppData\Local\Temp\SOLARABOOTSTRAPPER.EXE"
C:\Program Files (x86)\Internet Explorer\iexplore.exe
"C:\Program Files (x86)\Internet Explorer\iexplore.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | carolina-reverse.gl.at.ply.gg | udp |
| US | 147.185.221.20:34609 | carolina-reverse.gl.at.ply.gg | tcp |
| US | 8.8.8.8:53 | github.com | udp |
| GB | 20.26.156.215:443 | github.com | tcp |
| US | 8.8.8.8:53 | raw.githubusercontent.com | udp |
| US | 185.199.110.133:443 | raw.githubusercontent.com | tcp |
| GB | 20.26.156.215:443 | github.com | tcp |
Files
\Users\Admin\AppData\Local\Temp\DLLHOST.EXE
| MD5 | 6ecd5704770c96a4d4b78c66a7736a73 |
| SHA1 | 5903e2bb775a53074a8c81427ec8772eefc46876 |
| SHA256 | 597d30d625fabb7fde3171fb1f2faa501435255e6a9c4ea883221e35b0454001 |
| SHA512 | 7b216218c7faab14fce17b72b64ce1c8e09bb42935f17739d6ed8675c31d567ec70eae677bc605e6d2ab58ee8fafa4ed87e33bd5e5b7c602e135d233a9f6f1ff |
\Users\Admin\AppData\Local\Temp\SOLARABOOTSTRAPPER.EXE
| MD5 | 6557bd5240397f026e675afb78544a26 |
| SHA1 | 839e683bf68703d373b6eac246f19386bb181713 |
| SHA256 | a7fecfc225dfdd4e14dcd4d1b4ba1b9f8e4d1984f1cdd8cda3a9987e5d53c239 |
| SHA512 | f2399d34898a4c0c201372d2dd084ee66a66a1c3eae949e568421fe7edada697468ef81f4fcab2afd61eaf97bcb98d6ade2d97295e2f674e93116d142e892e97 |
memory/2020-15-0x0000000000270000-0x0000000000271000-memory.dmp
memory/2708-18-0x0000000000400000-0x00000000004B5000-memory.dmp
memory/2020-19-0x0000000000400000-0x00000000004B5000-memory.dmp
memory/2592-20-0x000000007475E000-0x000000007475F000-memory.dmp
memory/2592-21-0x0000000000AB0000-0x0000000000ABA000-memory.dmp