Overview
overview
6Static
static
3SolaraB2.rar
windows7-x64
3SolaraB2.rar
windows10-2004-x64
3SolaraB2/S...er.exe
windows7-x64
6SolaraB2/S...er.exe
windows10-2004-x64
6SolaraB2/S..._FE.iy
windows7-x64
3SolaraB2/S..._FE.iy
windows10-2004-x64
3SolaraB2/S...s.json
windows7-x64
3SolaraB2/S...s.json
windows10-2004-x64
3Analysis
-
max time kernel
96s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2024, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
SolaraB2.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SolaraB2.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
SolaraB2/SolaraB2/Solara/SolaraBootstrapper.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
SolaraB2/SolaraB2/Solara/SolaraBootstrapper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
SolaraB2/SolaraB2/Solara/workspace/IY_FE.iy
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
SolaraB2/SolaraB2/Solara/workspace/IY_FE.iy
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
SolaraB2/SolaraB2/Solara/workspace/Trollolo/options.json
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
SolaraB2/SolaraB2/Solara/workspace/Trollolo/options.json
Resource
win10v2004-20240802-en
General
-
Target
SolaraB2.rar
-
Size
6KB
-
MD5
16434087ae5892e84731067d577c329c
-
SHA1
8b5d70e1d9cf723d855edea9397dad232e3df008
-
SHA256
31a41571e3cf39f65893a8a6d97da7d846114dce12adeb158fd013548f1cc18f
-
SHA512
03b1abaa4b6f5594da0130c83710854b1f1ad266a9d91e181f5723662a811dbd126b5417b49e22199f071536176fbbfb1d980d62e3856e2668dc2c43ec136f72
-
SSDEEP
192:w4bWgy6uqRg7Z7axhkz/Fvc/Zpdn0iXHieX:w4b3yYR+ZGcb8ptkG
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3904 OpenWith.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 3904 OpenWith.exe 3904 OpenWith.exe 3904 OpenWith.exe 3904 OpenWith.exe 3904 OpenWith.exe 3904 OpenWith.exe 3904 OpenWith.exe 3904 OpenWith.exe 3904 OpenWith.exe 3904 OpenWith.exe 3904 OpenWith.exe 3904 OpenWith.exe 3904 OpenWith.exe 3904 OpenWith.exe 3904 OpenWith.exe 3904 OpenWith.exe 3904 OpenWith.exe 3904 OpenWith.exe 3904 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SolaraB2.rar1⤵
- Modifies registry class
PID:2272
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3904