Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 03:54
Behavioral task
behavioral1
Sample
Solara/Solara.dll
Resource
win7-20240705-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
Solara/Solara.dll
Resource
win10v2004-20240709-en
8 signatures
150 seconds
Behavioral task
behavioral3
Sample
Solara/Solara.exe
Resource
win7-20240705-en
9 signatures
150 seconds
General
-
Target
Solara/Solara.dll
-
Size
4.4MB
-
MD5
d2095e81b64ae68f6315e2a84bcf7e77
-
SHA1
c822a738341d9c7a551bb38f5dd9d288975ab45a
-
SHA256
9664bb7b9e94eec10aed5c7b8b198efee20056da51537066d1f4894fd72c7f38
-
SHA512
df43ea1eed8a18224591d34e7ca519c181f1d7999dad53a1b5cc9b2467c1a7e5466ef41f9df51ada51a94aa4cea196ce670c124e5112c2261056207fc7545e15
-
SSDEEP
98304:V3xlBT6DCb/QI7/MCgQMQzztD/KWLAbV+riCObX0u:jTZ6Cg+zhD/P2rCEX
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
resource yara_rule behavioral1/memory/2708-0-0x0000000180000000-0x0000000180B5F000-memory.dmp themida behavioral1/memory/2708-1-0x0000000180000000-0x0000000180B5F000-memory.dmp themida behavioral1/memory/2708-2-0x0000000180000000-0x0000000180B5F000-memory.dmp themida behavioral1/memory/2708-4-0x0000000180000000-0x0000000180B5F000-memory.dmp themida behavioral1/memory/2708-5-0x0000000180000000-0x0000000180B5F000-memory.dmp themida behavioral1/memory/2708-7-0x0000000180000000-0x0000000180B5F000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\bin\path.txt rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2708 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2708 rundll32.exe 2708 rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Solara\Solara.dll,#11⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2708