Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-07-2024 21:54
Behavioral task
behavioral1
Sample
Solara.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Solara.exe
Resource
win10v2004-20240508-en
General
-
Target
Solara.exe
-
Size
45KB
-
MD5
13325ceba29ec848cee74cc4b4c34816
-
SHA1
7c7408870da2fe079aa460fe0d237e12e19cb7cb
-
SHA256
c05a571f0f7e4233697b7590f7f4329e7da984d6fcf71a2ce521df984aa2cd54
-
SHA512
e3c069485b14679bed54b47d0e914417e00e526bc6ffd2e77767c86e30267abc037b1f974add86672c9b8cc4d40ccb1420929641b495e419aa8c6bcac585e220
-
SSDEEP
768:JdhO/poiiUcjlJInRJH9Xqk5nWEZ5SbTDaNWI7CPW5A:Hw+jjgnrH9XqcnW85SbTsWIY
Malware Config
Extracted
xenorat
anyone-blogging.gl.at.ply.gg
Xeno_rat_nd8912d
-
delay
500
-
install_path
temp
-
port
22284
-
startup_name
Windows
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4272 Solara.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1640 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3092 wrote to memory of 4272 3092 Solara.exe 79 PID 3092 wrote to memory of 4272 3092 Solara.exe 79 PID 3092 wrote to memory of 4272 3092 Solara.exe 79 PID 4272 wrote to memory of 1640 4272 Solara.exe 81 PID 4272 wrote to memory of 1640 4272 Solara.exe 81 PID 4272 wrote to memory of 1640 4272 Solara.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\Solara.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\Solara.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4575.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:1640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD51294de804ea5400409324a82fdc7ec59
SHA19a39506bc6cadf99c1f2129265b610c69d1518f7
SHA256494398ec6108c68573c366c96aae23d35e7f9bdbb440a4aab96e86fcad5871d0
SHA512033905cc5b4d0c0ffab2138da47e3223765146fa751c9f84b199284b653a04874c32a23aae577d2e06ce6c6b34fec62331b5fc928e3baf68dc53263ecdfa10c1
-
Filesize
45KB
MD513325ceba29ec848cee74cc4b4c34816
SHA17c7408870da2fe079aa460fe0d237e12e19cb7cb
SHA256c05a571f0f7e4233697b7590f7f4329e7da984d6fcf71a2ce521df984aa2cd54
SHA512e3c069485b14679bed54b47d0e914417e00e526bc6ffd2e77767c86e30267abc037b1f974add86672c9b8cc4d40ccb1420929641b495e419aa8c6bcac585e220
-
Filesize
1KB
MD547a3be81106e2974e9b79d6a2f27511d
SHA15ed116b9007692dfaeb191ee6a47a835cfc2abff
SHA256f9d62fcb5ea3db4838a0aad4605be0deb88b808d2dc44563bc3a62cdf077f808
SHA512e8f583fbb98489b0936301ca7ae2962af8d8292115ca9591dcefb2efd269190f01b9931a3856dfcc74562d34c291ef59fa233aeea11eaf0bd5e34f125b44f8a4