Analysis
-
max time kernel
94s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 04:31
Static task
static1
Behavioral task
behavioral1
Sample
SolaraB.zip
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
SolaraB.zip
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
SolaraB/Solara/SolaraBootstrapper.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
SolaraB/Solara/SolaraBootstrapper.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
SolaraB/Solara/workspace/IY_FE.iy
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
SolaraB/Solara/workspace/IY_FE.iy
Resource
win10v2004-20240508-en
General
-
Target
SolaraB/Solara/workspace/IY_FE.iy
-
Size
539B
-
MD5
254236b95c2d6ae908e93a360fb749b8
-
SHA1
57ed578dbd1230cce16d31ae380394f2a649325c
-
SHA256
6f6330ec143d653fbbfd14672a534def12ff9325e7aec90b41f65f059ad2ae26
-
SHA512
812b01941160c6fe41b77ad0f1ce905fb84a552ee6d0d42a4c0b0fbca018718c94ede6c081ea220a2e6e401b4ed2b23d088ce6c70417c860e3d259babc1223c3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1652 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1496 OpenWith.exe -
Suspicious use of SetWindowsHookEx 25 IoCs
pid Process 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe 1496 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1496 wrote to memory of 1652 1496 OpenWith.exe 92 PID 1496 wrote to memory of 1652 1496 OpenWith.exe 92
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SolaraB\Solara\workspace\IY_FE.iy1⤵
- Modifies registry class
PID:4396
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\SolaraB\Solara\workspace\IY_FE.iy2⤵
- Opens file in notepad (likely ransom note)
PID:1652
-