Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 17:43
Static task
static1
Behavioral task
behavioral1
Sample
Solara_Executor.exe
Resource
win7-20240729-en
General
-
Target
Solara_Executor.exe
-
Size
6.9MB
-
MD5
c164593ac5af309fb01b2e6dd0878b2d
-
SHA1
4fea75d5bf4e9d9f2aa2cd10ac37792123e9ecf8
-
SHA256
fba4191436f3e31d46df52a899a20ab7cfddbc3d39c36daf496d87edcf39e469
-
SHA512
2eb25593e518ab0ef7905315a5c2ca9879b6497757f01c5d99c5df6fbcf4d6262b43601bf357b31eeb6b556bd9965e60d16c8272405320c95fe44c836e62af32
-
SSDEEP
49152:Go4Jx048wEi74S3YwZpLJtnPi+gL9A6QzjMkjBXyaXg93/w1JlkaKJFJa6jGu5Ea:j2x0Udh+m68NXyaQ9PsYDEXvZevX
Malware Config
Extracted
lumma
https://outfittydadop.shop/api
https://empiredzmwnx.shop/api
https://boattyownerwrv.shop/api
https://rainbowmynsjn.shop/api
https://definitonizmnx.shop/api
https://creepydxzoxmj.shop/api
https://budgetttysnzm.shop/api
https://chippyfroggsyhz.shop/api
https://assumedtribsosp.shop/api
Extracted
lumma
https://outfittydadop.shop/api
https://empiredzmwnx.shop/api
https://boattyownerwrv.shop/api
https://rainbowmynsjn.shop/api
https://definitonizmnx.shop/api
https://creepydxzoxmj.shop/api
https://budgetttysnzm.shop/api
https://chippyfroggsyhz.shop/api
https://assumedtribsosp.shop/api
https://tenntysjuxmz.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4880 set thread context of 1884 4880 Solara_Executor.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4880 wrote to memory of 1884 4880 Solara_Executor.exe 86 PID 4880 wrote to memory of 1884 4880 Solara_Executor.exe 86 PID 4880 wrote to memory of 1884 4880 Solara_Executor.exe 86 PID 4880 wrote to memory of 1884 4880 Solara_Executor.exe 86 PID 4880 wrote to memory of 1884 4880 Solara_Executor.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Solara_Executor.exe"C:\Users\Admin\AppData\Local\Temp\Solara_Executor.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- System Location Discovery: System Language Discovery
PID:1884
-