Analysis
-
max time kernel
134s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
06/08/2024, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
LauncherSolara.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
LauncherSolara.exe
Resource
win7-20240729-en
Behavioral task
behavioral3
Sample
LauncherSolara.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
LauncherSolara.exe
Resource
win10v2004-20240802-en
General
-
Target
LauncherSolara.exe
-
Size
652KB
-
MD5
014a986d4ac0fd0d49ac813f7b07e105
-
SHA1
57d6d57be508bf876da4ccc2824fb3505530474a
-
SHA256
f1714e7243a1e4b271b82d0e4943c8603ca83e8a68c081ad045a2cedff7b9b31
-
SHA512
a24e86b3e8d8d8ad686b419e68e329ef89692f9a12028c1569b3576e99b1c342fcc12acf985cecd8b0138d2ec928267166f59c94f94ccd54de319b72bf9f6db2
-
SSDEEP
12288:CnxzTdUWxb9Pq9z4BBJVCfAHAtMSKUFaAMv8J65Ty0pZCL4zvEk+RrWxf2B/U9Z0:CxzTdUO89z4PzCIF
Malware Config
Extracted
lumma
https://clouddycuiomsnz.shop/api
https://empiredzmwnx.shop/api
https://boattyownerwrv.shop/api
https://rainbowmynsjn.shop/api
https://definitonizmnx.shop/api
https://creepydxzoxmj.shop/api
https://budgetttysnzm.shop/api
https://chippyfroggsyhz.shop/api
https://assumedtribsosp.shop/api
Extracted
lumma
https://clouddycuiomsnz.shop/api
https://chippyfroggsyhz.shop/api
https://tenntysjuxmz.shop/api
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 5060 LauncherSolara.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5060 set thread context of 96 5060 LauncherSolara.exe 73 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LauncherSolara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5060 wrote to memory of 96 5060 LauncherSolara.exe 73 PID 5060 wrote to memory of 96 5060 LauncherSolara.exe 73 PID 5060 wrote to memory of 96 5060 LauncherSolara.exe 73 PID 5060 wrote to memory of 96 5060 LauncherSolara.exe 73 PID 5060 wrote to memory of 96 5060 LauncherSolara.exe 73 PID 5060 wrote to memory of 96 5060 LauncherSolara.exe 73 PID 5060 wrote to memory of 96 5060 LauncherSolara.exe 73 PID 5060 wrote to memory of 96 5060 LauncherSolara.exe 73 PID 5060 wrote to memory of 96 5060 LauncherSolara.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\LauncherSolara.exe"C:\Users\Admin\AppData\Local\Temp\LauncherSolara.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:96
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD5a1c0b409623eff20e50fae25b08f7de3
SHA19dd2f7a85c112f51ed03fba4340eccfc655baebc
SHA2568df55f4af78c594f7c611ef633b871416c13a8c6e1e8ccf1fb195bb72f2df423
SHA5125e6a7571b444c246af3668581021f0d67491543d31ca8b4dfb054fd76303024556880473d57ceb5423d1d8e4fcdf6c7e1a009b6a94a4c1035627cf34164c891f