Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 17:22
Behavioral task
behavioral1
Sample
Solara.exe
Resource
win7-20240508-en
General
-
Target
Solara.exe
-
Size
45KB
-
MD5
13325ceba29ec848cee74cc4b4c34816
-
SHA1
7c7408870da2fe079aa460fe0d237e12e19cb7cb
-
SHA256
c05a571f0f7e4233697b7590f7f4329e7da984d6fcf71a2ce521df984aa2cd54
-
SHA512
e3c069485b14679bed54b47d0e914417e00e526bc6ffd2e77767c86e30267abc037b1f974add86672c9b8cc4d40ccb1420929641b495e419aa8c6bcac585e220
-
SSDEEP
768:JdhO/poiiUcjlJInRJH9Xqk5nWEZ5SbTDaNWI7CPW5A:Hw+jjgnrH9XqcnW85SbTsWIY
Malware Config
Extracted
xenorat
anyone-blogging.gl.at.ply.gg
Xeno_rat_nd8912d
-
delay
500
-
install_path
temp
-
port
22284
-
startup_name
Windows
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Solara.exe -
Executes dropped EXE 1 IoCs
pid Process 3328 Solara.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 648 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5092 wrote to memory of 3328 5092 Solara.exe 83 PID 5092 wrote to memory of 3328 5092 Solara.exe 83 PID 5092 wrote to memory of 3328 5092 Solara.exe 83 PID 3328 wrote to memory of 648 3328 Solara.exe 84 PID 3328 wrote to memory of 648 3328 Solara.exe 84 PID 3328 wrote to memory of 648 3328 Solara.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\Solara.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\Solara.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4EEB.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
45KB
MD513325ceba29ec848cee74cc4b4c34816
SHA17c7408870da2fe079aa460fe0d237e12e19cb7cb
SHA256c05a571f0f7e4233697b7590f7f4329e7da984d6fcf71a2ce521df984aa2cd54
SHA512e3c069485b14679bed54b47d0e914417e00e526bc6ffd2e77767c86e30267abc037b1f974add86672c9b8cc4d40ccb1420929641b495e419aa8c6bcac585e220
-
Filesize
1KB
MD547a3be81106e2974e9b79d6a2f27511d
SHA15ed116b9007692dfaeb191ee6a47a835cfc2abff
SHA256f9d62fcb5ea3db4838a0aad4605be0deb88b808d2dc44563bc3a62cdf077f808
SHA512e8f583fbb98489b0936301ca7ae2962af8d8292115ca9591dcefb2efd269190f01b9931a3856dfcc74562d34c291ef59fa233aeea11eaf0bd5e34f125b44f8a4