Analysis

  • max time kernel
    24s
  • max time network
    28s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 14:49

General

  • Target

    Solara.exe

  • Size

    707KB

  • MD5

    890aefe0eb8cac48c07f1b8c32b40c52

  • SHA1

    354100304c1eedfea760b85804f79995cd558e39

  • SHA256

    9fb5c80c2a1e3d90dfd12b92fe46d1971c19c25f4e9094b6a911636b53c06281

  • SHA512

    d4831595f132738558cfc9d2e11e51c7eb68e4ae3b6ce0d81dee506ca5e856f4970cdbd9a15fc9ac0ecb74ed63b1752c2f576a130e1ec1fcdfeeb11330d580c5

  • SSDEEP

    12288:fCQjgAtAHM+vetZxF5EWry8AJGy0yR1Bjy1hbpyPeVo0Wx1Lk:f5ZWs+OZVEWry8AFfrjy1hVyPeVolrLk

Score
10/10

Malware Config

Signatures

  • Detect Umbral payload 2 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Solara.exe
    "C:\Users\Admin\AppData\Local\Temp\Solara.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5076
    • C:\Users\Admin\AppData\Local\Temp\SoIaraBootstrapper.exe
      "C:\Users\Admin\AppData\Local\Temp\SoIaraBootstrapper.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4224
    • C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe
      "C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\SoIaraBootstrapper.exe

    Filesize

    227KB

    MD5

    c4256ec1eed03d809035bbd044aa0f19

    SHA1

    a0b69231eb481436b51bb78605e93dcdf5d986d0

    SHA256

    b4914acc9d1e0cc61549d3c21f290369eea0e9a205ea7ce465b221ae3ef409d4

    SHA512

    41cfb128462ef590fac4ed44bc1df187f51fb46353579c718bb2e361d97b06a02a970bbe959898b21a2133a7c1732dfe912e0dca8c3d4d3608b15469258006b1

  • C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe

    Filesize

    13KB

    MD5

    6557bd5240397f026e675afb78544a26

    SHA1

    839e683bf68703d373b6eac246f19386bb181713

    SHA256

    a7fecfc225dfdd4e14dcd4d1b4ba1b9f8e4d1984f1cdd8cda3a9987e5d53c239

    SHA512

    f2399d34898a4c0c201372d2dd084ee66a66a1c3eae949e568421fe7edada697468ef81f4fcab2afd61eaf97bcb98d6ade2d97295e2f674e93116d142e892e97

  • memory/4012-26-0x0000000000C10000-0x0000000000C1A000-memory.dmp

    Filesize

    40KB

  • memory/4012-28-0x0000000002F50000-0x0000000002F5A000-memory.dmp

    Filesize

    40KB

  • memory/4224-23-0x00007FFD32733000-0x00007FFD32735000-memory.dmp

    Filesize

    8KB

  • memory/4224-24-0x00000218D8520000-0x00000218D8560000-memory.dmp

    Filesize

    256KB

  • memory/4224-27-0x00007FFD32730000-0x00007FFD331F1000-memory.dmp

    Filesize

    10.8MB