Overview
overview
6Static
static
3SolaraB2.rar
windows7-x64
3SolaraB2.rar
windows10-2004-x64
3SolaraB2/S...er.exe
windows7-x64
6SolaraB2/S...er.exe
windows10-2004-x64
6SolaraB2/S..._FE.iy
windows7-x64
3SolaraB2/S..._FE.iy
windows10-2004-x64
3SolaraB2/S...s.json
windows7-x64
3SolaraB2/S...s.json
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/08/2024, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
SolaraB2.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SolaraB2.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
SolaraB2/SolaraB2/Solara/SolaraBootstrapper.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
SolaraB2/SolaraB2/Solara/SolaraBootstrapper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
SolaraB2/SolaraB2/Solara/workspace/IY_FE.iy
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
SolaraB2/SolaraB2/Solara/workspace/IY_FE.iy
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
SolaraB2/SolaraB2/Solara/workspace/Trollolo/options.json
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
SolaraB2/SolaraB2/Solara/workspace/Trollolo/options.json
Resource
win10v2004-20240802-en
General
-
Target
SolaraB2/SolaraB2/Solara/workspace/IY_FE.iy
-
Size
971B
-
MD5
059dd36a7e96d6060762b18d2bf13864
-
SHA1
038bfd6bdde0350b3c5b03701e8cdbdc92a3ff6c
-
SHA256
427eecaf21ec588e89d8449a8f7ba160550ae46b7316542cd1d595e1671fa632
-
SHA512
f3d9ab8e6601c7245879cb8b3502d81b7bc77c51be947b11ad129d4191b03e4206e2845e487dd9b0e3f265e1699b860ef11e34b2983b7bb880fbac8a077c4ebe
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.iy rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\iy_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\iy_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\iy_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\iy_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\iy_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.iy\ = "iy_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\iy_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1608 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1608 AcroRd32.exe 1608 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2784 2200 cmd.exe 31 PID 2200 wrote to memory of 2784 2200 cmd.exe 31 PID 2200 wrote to memory of 2784 2200 cmd.exe 31 PID 2784 wrote to memory of 1608 2784 rundll32.exe 32 PID 2784 wrote to memory of 1608 2784 rundll32.exe 32 PID 2784 wrote to memory of 1608 2784 rundll32.exe 32 PID 2784 wrote to memory of 1608 2784 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SolaraB2\SolaraB2\Solara\workspace\IY_FE.iy1⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SolaraB2\SolaraB2\Solara\workspace\IY_FE.iy2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\SolaraB2\SolaraB2\Solara\workspace\IY_FE.iy"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a4f1604d33fdfff12ede6ce2cd7f5d8d
SHA1a84e684f38d3b4fef856caf793136a02453b91e8
SHA256dd74a6830b0b99841d36ea86540600432b48c23eac5d31bc0f21ea2075ed740f
SHA512f735934f3ca971c1ab364060dc27fea4ef075331016e0aa8a3b6322c2111f6352e46106ec77db65238d561d36f8f0fba129f3571c25ce9e2e715e9ace406bd8b