Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 18:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://solaraexecutor.com/
Resource
win10v2004-20240802-en
General
-
Target
https://solaraexecutor.com/
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 444 Bootstrapper.exe 3500 Bootstrapper.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 74 raw.githubusercontent.com 76 raw.githubusercontent.com 77 raw.githubusercontent.com 80 pastebin.com 81 pastebin.com 102 pastebin.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 51388.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3640 msedge.exe 3640 msedge.exe 1832 msedge.exe 1832 msedge.exe 1564 identity_helper.exe 1564 identity_helper.exe 556 msedge.exe 556 msedge.exe 2412 msedge.exe 2412 msedge.exe 216 msedge.exe 216 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 444 Bootstrapper.exe Token: SeDebugPrivilege 4420 Solara.exe Token: SeDebugPrivilege 2044 Solara.exe Token: SeDebugPrivilege 3156 Solara.exe Token: SeDebugPrivilege 3500 Bootstrapper.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
pid Process 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1832 wrote to memory of 4840 1832 msedge.exe 82 PID 1832 wrote to memory of 4840 1832 msedge.exe 82 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 4512 1832 msedge.exe 83 PID 1832 wrote to memory of 3640 1832 msedge.exe 84 PID 1832 wrote to memory of 3640 1832 msedge.exe 84 PID 1832 wrote to memory of 4504 1832 msedge.exe 85 PID 1832 wrote to memory of 4504 1832 msedge.exe 85 PID 1832 wrote to memory of 4504 1832 msedge.exe 85 PID 1832 wrote to memory of 4504 1832 msedge.exe 85 PID 1832 wrote to memory of 4504 1832 msedge.exe 85 PID 1832 wrote to memory of 4504 1832 msedge.exe 85 PID 1832 wrote to memory of 4504 1832 msedge.exe 85 PID 1832 wrote to memory of 4504 1832 msedge.exe 85 PID 1832 wrote to memory of 4504 1832 msedge.exe 85 PID 1832 wrote to memory of 4504 1832 msedge.exe 85 PID 1832 wrote to memory of 4504 1832 msedge.exe 85 PID 1832 wrote to memory of 4504 1832 msedge.exe 85 PID 1832 wrote to memory of 4504 1832 msedge.exe 85 PID 1832 wrote to memory of 4504 1832 msedge.exe 85 PID 1832 wrote to memory of 4504 1832 msedge.exe 85 PID 1832 wrote to memory of 4504 1832 msedge.exe 85 PID 1832 wrote to memory of 4504 1832 msedge.exe 85 PID 1832 wrote to memory of 4504 1832 msedge.exe 85 PID 1832 wrote to memory of 4504 1832 msedge.exe 85 PID 1832 wrote to memory of 4504 1832 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://solaraexecutor.com/1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bbaf46f8,0x7ff8bbaf4708,0x7ff8bbaf47182⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2568 /prefetch:82⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2988 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:82⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5320 /prefetch:82⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6264 /prefetch:82⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:556
-
-
C:\Users\Admin\Downloads\Bootstrapper.exe"C:\Users\Admin\Downloads\Bootstrapper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6720 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6844 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6496 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6480 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1904 /prefetch:12⤵PID:4720
-
-
C:\Users\Admin\Downloads\Bootstrapper.exe"C:\Users\Admin\Downloads\Bootstrapper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,2607766705152609724,7346464482847821670,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5944 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2360
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2368
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1876
-
C:\Users\Admin\Downloads\Solara.Dir\Solara\Solara.exe"C:\Users\Admin\Downloads\Solara.Dir\Solara\Solara.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
C:\Users\Admin\Downloads\Solara.Dir\Solara\Solara.exe"C:\Users\Admin\Downloads\Solara.Dir\Solara\Solara.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
C:\Users\Admin\Downloads\Solara.Dir\Solara\Solara.exe"C:\Users\Admin\Downloads\Solara.Dir\Solara\Solara.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e87e48b105757e1c7563d1c719059733
SHA128a3f2b2e0672da2b531f4757d2b20b53032dafc
SHA2560aaf22dc84cc3fcfe53de7ccfed8e662247dfb7f1a9967032c88790d0c663461
SHA512bf19c5743143aee914a453c41189c722c9b90a5b8bf299cecf3e1f97656d32cd209ecb74da8aebc89bb41c27d189f73aaaabbc64fe383410c95dc76ad4218968
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
20KB
MD56931123c52bee278b00ee54ae99f0ead
SHA16907e9544cd8b24f602d0a623cfe32fe9426f81f
SHA256c54a6c3031bf3472077c716fa942bd683119dc483b7e0181e8a608fa0b309935
SHA51240221fe98816aa369c45f87dc62e6d91fcdb559d9756cb6a05819f1cde629e23a51803e71371f4e4f27112a09489d58ed45b2b901a5f2f00c69c082b3576057f
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize744B
MD5975b6a815b513afcda488908e0372188
SHA1c00fa0b7e64f71593b41f75c1454007b229e692f
SHA256b54c87ef180c15f32e254ba727d70abf10a755016c3f28466a181db5dfa8d0a0
SHA5121ae14fc98bfcbdbe128c7676575e75e35bcdddd8e4698b20c97e23beb25e807b4214b7919bc0c51dfbe9ec204255fb79e6a87170ee8a96e77e238d25e8140de1
-
Filesize
2KB
MD5b50a960f8ff9d1183154b79f89e355bd
SHA137c681ca84f6b212ea155c94f3fd7f9000b55bf1
SHA256852be2fb29a44f32d707cc3bd488ecb148202eb6510e7938779e9ae68b3c1f6c
SHA51259a139338bbdf354dcd69f9ad72a16f353fb8822e73318e96e5711d26c4186d4cdac99fb00fbb0b238e202d33e0d2a06a4bed14293aa4e4b6b537c8f69e45a8b
-
Filesize
6KB
MD53e138fb7c3322ade830e3308082327c3
SHA1846376864bbfa36261020390f9e6cafb263dc1a6
SHA2567d872818d70fa5a9f4e312b56a046953f3ac5c70a2736fb81bc5e9308958c500
SHA51272f16b63b4e0cba83c050df74847553a73deababb4d2dc429eb4c1be85175e60f2fcca2fabbb6d6fce74b98914881882f224bdf1d2e8de31737581e1e6b736d5
-
Filesize
7KB
MD5b64bf264c3679b71968541660ca07c7f
SHA1ae2cb412372ca8cc67c135da0d43185913035d91
SHA256436f6cbbb97c03e7add92cbae5e0a5c769d7329d3f5298e913c07e381c5c34b6
SHA5125e442a279e10ced6cab70541edb9e711c8ab5f83ad1e6bfe6222aafcfb8c62a73219ba96cb8eba18328c627296ce003c3923a598bc4cd7d8370f1d73b6fbd17d
-
Filesize
7KB
MD55dcf0e66d8ae0389813ece28a1ef8b48
SHA1f38b867f504b4cae7db1b98277041f1df4b2cc27
SHA256f523ebd531d57d33e48e0469bf6518716cb0e6ae9b0bc0fe93565f923515f4f7
SHA51267d6bfbeb7b86101d62115d558d683357d38a861e4675d0f366de141687d29b24621474294672d7959ecb83fd138e9c10c6fbcee7952f4b1ef17ebf92c922d48
-
Filesize
539B
MD5c4a64bcd492561835b97c958a09aa081
SHA1f51b54d16da67f5934e0b4c8b339542d736e2411
SHA256c16a7b014df11a307031af699745355f6c422fd04d0dfeb61e5762a7a3d07de3
SHA512311a2502da687e3e0f61d57ee976789ea259a2182dcb59779c6618a0f8018c83b1d0a207c6ceedd634b5985301ebc456ae020275feed4a8b8ad7537380cf2bb2
-
Filesize
539B
MD514888a10bc1119cf80d20b3b6f13d0de
SHA1919de795443217f0511e13662fbc909f1e7c810a
SHA25608521f47b74421f1934e55efb5bc0991a507933b743113461cc2e362cf62f944
SHA512e88c26c57e6218783dd6481474cbfe899296f80705f284d81a7b120ea7fa588819b907b2a2bb516c85b4f51a275d5debfd126071aab7ee27bef9a3213df72fde
-
Filesize
204B
MD557722174af7bd9a68ce34081e113e86a
SHA198b75bfb9d24c4acbfb05cd717d1cdde138bda4f
SHA2563e85f381da7eadcf1a7d335bc4ec5188e2ee0323d282ffd42e1266c74859e3dd
SHA5126ab6e90e5796439c0add57ad400be039c60a48a5051f59bf923eaa0779c40424750065ad0a4d1c195823cd7f4b5ed60fffa85bb13e525cd30bbd5c063070df14
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dcf533e1aa3b527b70fc13955b1805de
SHA12851aef8b912ff6b587ff7d9239643bb9923b854
SHA2569a251981879865f984dce6b20d1124cb277f0a43118598469bed093fbc5295bf
SHA5128f6a36c12eb184fa52dbedd352fd89ef1f1663d58f80ac2faa83a551471db1c88199526cde5db6546cd113e693a5a7bb471285f5d6ae32f5f6404287ce31c468
-
Filesize
11KB
MD5a69d078b3a91bc2217f84c397e01835e
SHA18c5b1b3bb82a13ce0344ed4233c7aff9007739b9
SHA2566f44d47c5ad6bc038ef6c422fb61f240ff1edef7c4ec53506e6e0f91e2ebd121
SHA5127e5c8af58b04c84bf6f8952023a68405986e85ac00236a11bf08aa704d31774a88a26401c09522ad4775b06251824d5adc36ffa3ed5da8c269e5d4aac1500456
-
Filesize
11KB
MD572d167ec244fccb91218bacde0cb9245
SHA133b8a5b1eac4dcad87f7d9063bea763b5c423572
SHA256a93aef51d22efaff35eea9151fba72efc9aba0f78ee8524bc75082b531e75983
SHA5126dd5ba5dd6dda46753b607b56520c6b3a0924dbeeb069af8780b76b9ba5513700aff9a35d976e4424809ec380afdb7d7d8d1ae3af7e0268f573eec69c55622aa
-
Filesize
11KB
MD55a33e8e78956a795d4f1b213a0477f05
SHA189b6318be20e9bcadd3a2efdf60cb930979ffc49
SHA25621ed20aa9db4980350953ce36b72494c4bff1b05298655dbb84e7835706b9351
SHA512c35189124feef13eaedd4593ada9978dcf779fba07ff55bcb6e33d5c30f3d2d817b32567c5c5357e6fe0392f3c29d958fda4500a055bd5ec07bbfca487617c08
-
Filesize
8.1MB
MD5577623eb65034cbd53313ab707fe9496
SHA156158757e6c91999188de9059c19808c8d7c6426
SHA256803de9083266eadfe4fdd6761b97224a98877262b0c978a8cf0ac4c5e0760aa0
SHA51210d970d04904b0258cb2edfe8db19ad5399ecc908c6e2f6386f0b4e61855b233823ce6b227d2ee91ff26752adb5d3cb010742d5f5bc24faa0b93f23810bbe5ed
-
Filesize
795KB
MD5365971e549352a15e150b60294ec2e57
SHA12932242b427e81b1b4ac8c11fb17793eae0939f7
SHA256faad2bc8e61b75e595a80ff2b6d150ff8b27187a8ba426cc1e5e38e193ab6d42
SHA512f7ba1353e880213a6bdf5bd1dfdfd42a0acf4066a540a502e8df8fec8eac7fb80b75aa52e68eca98be3f7701da48eb90758e5b94d72013d3dff05e0aaf27e938