Overview
overview
10Static
static
1Solara.zip
windows7-x64
1Solara.zip
windows10-2004-x64
1Solara/Sol...V2.exe
windows7-x64
10Solara/Sol...V2.exe
windows10-2004-x64
10Solara/Sol...st.lua
windows7-x64
3Solara/Sol...st.lua
windows10-2004-x64
3Solara/Sol...t2.lua
windows7-x64
3Solara/Sol...t2.lua
windows10-2004-x64
3Solara/Sol...le.txt
windows7-x64
1Solara/Sol...le.txt
windows10-2004-x64
1Solara/Sol...et.txt
windows7-x64
1Solara/Sol...et.txt
windows10-2004-x64
1Solara/Sol...le.txt
windows7-x64
1Solara/Sol...le.txt
windows10-2004-x64
1Solara/Sol..._1.txt
windows7-x64
1Solara/Sol..._1.txt
windows10-2004-x64
1Solara/Sol..._2.txt
windows7-x64
1Solara/Sol..._2.txt
windows10-2004-x64
1Solara/Sol...le.txt
windows7-x64
1Solara/Sol...le.txt
windows10-2004-x64
1Solara/Sol...le.txt
windows7-x64
1Solara/Sol...le.txt
windows10-2004-x64
1Solara/Sol...tefile
windows7-x64
1Solara/Sol...tefile
windows10-2004-x64
1Solara/Sol...le.txt
windows7-x64
1Solara/Sol...le.txt
windows10-2004-x64
1Solara/Sol...LL.txt
windows7-x64
1Solara/Sol...LL.txt
windows10-2004-x64
1Solara/Sol..._FE.iy
windows7-x64
3Solara/Sol..._FE.iy
windows10-2004-x64
3Solara/Sol...s.json
windows7-x64
3Solara/Sol...s.json
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 14:33
Static task
static1
Behavioral task
behavioral1
Sample
Solara.zip
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Solara.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Solara/Solara/SolaraV2.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Solara/Solara/SolaraV2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Solara/Solara/autoexec/test.lua
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Solara/Solara/autoexec/test.lua
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Solara/Solara/autoexec/test2.lua
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Solara/Solara/autoexec/test2.lua
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Solara/Solara/workspace/.tests/appendfile.txt
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Solara/Solara/workspace/.tests/appendfile.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Solara/Solara/workspace/.tests/getcustomasset.txt
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
Solara/Solara/workspace/.tests/getcustomasset.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Solara/Solara/workspace/.tests/isfile.txt
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Solara/Solara/workspace/.tests/isfile.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Solara/Solara/workspace/.tests/listfiles/test_1.txt
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
Solara/Solara/workspace/.tests/listfiles/test_1.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Solara/Solara/workspace/.tests/listfiles/test_2.txt
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
Solara/Solara/workspace/.tests/listfiles/test_2.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Solara/Solara/workspace/.tests/loadfile.txt
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Solara/Solara/workspace/.tests/loadfile.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Solara/Solara/workspace/.tests/readfile.txt
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
Solara/Solara/workspace/.tests/readfile.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Solara/Solara/workspace/.tests/writefile
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
Solara/Solara/workspace/.tests/writefile
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Solara/Solara/workspace/.tests/writefile.txt
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
Solara/Solara/workspace/.tests/writefile.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Solara/Solara/workspace/EzHubLL.txt
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
Solara/Solara/workspace/EzHubLL.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Solara/Solara/workspace/IY_FE.iy
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
Solara/Solara/workspace/IY_FE.iy
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Solara/Solara/workspace/Sky Hub/Sky Hub Settings.json
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
Solara/Solara/workspace/Sky Hub/Sky Hub Settings.json
Resource
win10v2004-20240802-en
General
-
Target
Solara/Solara/workspace/Sky Hub/Sky Hub Settings.json
-
Size
52B
-
MD5
9a42aefba1beca2d4816e37142fa22db
-
SHA1
387384c567a5bd1ca99568c43315ea39bdaec1e0
-
SHA256
37dd2675939dcf754c08d0a3776908fc7c996849839dcba037848a943f33240b
-
SHA512
77ed2aeab7c10507e74c8001cbafe883d4a308cc3686d0edcf8925db54f00e45337b9ebd7d19c83129cebda0e0eaa9d01a0f5474d0639b6cab5659cfedb80a9b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\json_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\json_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.json rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2600 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2600 AcroRd32.exe 2600 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2612 2732 cmd.exe 31 PID 2732 wrote to memory of 2612 2732 cmd.exe 31 PID 2732 wrote to memory of 2612 2732 cmd.exe 31 PID 2612 wrote to memory of 2600 2612 rundll32.exe 32 PID 2612 wrote to memory of 2600 2612 rundll32.exe 32 PID 2612 wrote to memory of 2600 2612 rundll32.exe 32 PID 2612 wrote to memory of 2600 2612 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Solara\Solara\workspace\Sky Hub\Sky Hub Settings.json"1⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Solara\Solara\workspace\Sky Hub\Sky Hub Settings.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Solara\Solara\workspace\Sky Hub\Sky Hub Settings.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2600
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57a3662f9fa52578a1c611e3fa5c29a9a
SHA139eb3b21644c84f9e71bbe261d0cde536c9bbf68
SHA25657d2d5231d94aa8aac6d6b68f2d28d9a8d778f3a86b263ebef1bb8d36d6daa4e
SHA512410a84c87d27b1d2f738696bff93c811c403c941c252341d610c9e28e52d8cdf3cadfe5d3d250da7351a794611a76ca63d3c000d9d3173a01da597bda4c81b53