Overview
overview
10Static
static
9ezWwTYmb9tEG.zip
windows11-21h2-x64
ReadMe.txt
windows11-21h2-x64
3So1ara.rar
windows11-21h2-x64
3Solara/Sol...er.exe
windows11-21h2-x64
10$TEMP/Bolt
windows11-21h2-x64
1$TEMP/Consistent
windows11-21h2-x64
1$TEMP/Dr
windows11-21h2-x64
1$TEMP/Fleet
windows11-21h2-x64
1$TEMP/Inexpensive
windows11-21h2-x64
1$TEMP/Park
windows11-21h2-x64
1$TEMP/Telescope
windows11-21h2-x64
1$TEMP/Viruses
windows11-21h2-x64
1$TEMP/Wellington
windows11-21h2-x64
1SaturnSexo/Animal
windows11-21h2-x64
1SaturnSexo/Graphic
windows11-21h2-x64
1SaturnSexo/Proven
windows11-21h2-x64
1SaturnSexo...ations
windows11-21h2-x64
1Solara/Sol...st.lua
windows11-21h2-x64
3Solara/Sol...t2.lua
windows11-21h2-x64
3Solara/Sol...pi.dll
windows11-21h2-x64
3Solara/Sol...le.txt
windows11-21h2-x64
3Solara/Sol...et.txt
windows11-21h2-x64
3Solara/Sol...le.txt
windows11-21h2-x64
3Solara/Sol..._1.txt
windows11-21h2-x64
3Solara/Sol..._2.txt
windows11-21h2-x64
3Solara/Sol...le.txt
windows11-21h2-x64
3Solara/Sol...le.txt
windows11-21h2-x64
3Solara/Sol...tefile
windows11-21h2-x64
1Solara/Sol...le.txt
windows11-21h2-x64
3Solara/Sol...LL.txt
windows11-21h2-x64
3Solara/Sol..._FE.iy
windows11-21h2-x64
3Solara/Sol...s.json
windows11-21h2-x64
3Analysis
-
max time kernel
137s -
max time network
141s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-08-2024 04:35
Behavioral task
behavioral1
Sample
ezWwTYmb9tEG.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
ReadMe.txt
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
So1ara.rar
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
Solara/Solar/SolaraBootstrapper.exe
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/Bolt
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
$TEMP/Consistent
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
$TEMP/Dr
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
$TEMP/Fleet
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
$TEMP/Inexpensive
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
$TEMP/Park
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
$TEMP/Telescope
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
$TEMP/Viruses
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
$TEMP/Wellington
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
SaturnSexo/Animal
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
SaturnSexo/Graphic
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
SaturnSexo/Proven
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
SaturnSexo/Representations
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
Solara/Solar/autoexec/test.lua
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
Solara/Solar/autoexec/test2.lua
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
Solara/Solar/bin/api.dll
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
Solara/Solar/workspace/.tests/appendfile.txt
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
Solara/Solar/workspace/.tests/getcustomasset.txt
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
Solara/Solar/workspace/.tests/isfile.txt
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
Solara/Solar/workspace/.tests/listfiles/test_1.txt
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
Solara/Solar/workspace/.tests/listfiles/test_2.txt
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
Solara/Solar/workspace/.tests/loadfile.txt
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
Solara/Solar/workspace/.tests/readfile.txt
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
Solara/Solar/workspace/.tests/writefile
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
Solara/Solar/workspace/.tests/writefile.txt
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
Solara/Solar/workspace/EzHubLL.txt
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
Solara/Solar/workspace/IY_FE.iy
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
Solara/Solar/workspace/Sky Hub/Sky Hub Settings.json
Resource
win11-20240802-en
General
-
Target
Solara/Solar/SolaraBootstrapper.exe
-
Size
149.8MB
-
MD5
514a5006c26dffcd6d6a7ec4ca897ed6
-
SHA1
12514a2dadfef13a209697d2af2cda955e1d9468
-
SHA256
e7a36dd328ba20e8695a1d07a25a71edb41f649ee118d9f1c27139fd59fcb35c
-
SHA512
21ffb034e8cf1913c62ec647f4872aa51e93db0ec45ad03ac559577c7265ee2a0a54e569ab87ebfc4f23b538a2b65df50c98ee75a7a773afce6c82591c778ab7
-
SSDEEP
1572864:RTBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBn:
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2676 created 3332 2676 Argument.pif 53 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 2 IoCs
pid Process 2676 Argument.pif 2460 RegAsm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1572 tasklist.exe 3292 tasklist.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\CalendarLogistics SolaraBootstrapper.exe File opened for modification C:\Windows\OnlyDot SolaraBootstrapper.exe File opened for modification C:\Windows\GraceProt SolaraBootstrapper.exe File opened for modification C:\Windows\MarkingRational SolaraBootstrapper.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SolaraBootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Argument.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2676 Argument.pif 2676 Argument.pif 2676 Argument.pif 2676 Argument.pif 2676 Argument.pif 2676 Argument.pif 2676 Argument.pif 2676 Argument.pif 2676 Argument.pif 2676 Argument.pif 2460 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1572 tasklist.exe Token: SeDebugPrivilege 3292 tasklist.exe Token: SeDebugPrivilege 2460 RegAsm.exe Token: SeBackupPrivilege 2460 RegAsm.exe Token: SeSecurityPrivilege 2460 RegAsm.exe Token: SeSecurityPrivilege 2460 RegAsm.exe Token: SeSecurityPrivilege 2460 RegAsm.exe Token: SeSecurityPrivilege 2460 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2676 Argument.pif 2676 Argument.pif 2676 Argument.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2676 Argument.pif 2676 Argument.pif 2676 Argument.pif -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1516 wrote to memory of 3408 1516 SolaraBootstrapper.exe 82 PID 1516 wrote to memory of 3408 1516 SolaraBootstrapper.exe 82 PID 1516 wrote to memory of 3408 1516 SolaraBootstrapper.exe 82 PID 3408 wrote to memory of 1572 3408 cmd.exe 84 PID 3408 wrote to memory of 1572 3408 cmd.exe 84 PID 3408 wrote to memory of 1572 3408 cmd.exe 84 PID 3408 wrote to memory of 788 3408 cmd.exe 85 PID 3408 wrote to memory of 788 3408 cmd.exe 85 PID 3408 wrote to memory of 788 3408 cmd.exe 85 PID 3408 wrote to memory of 3292 3408 cmd.exe 87 PID 3408 wrote to memory of 3292 3408 cmd.exe 87 PID 3408 wrote to memory of 3292 3408 cmd.exe 87 PID 3408 wrote to memory of 888 3408 cmd.exe 88 PID 3408 wrote to memory of 888 3408 cmd.exe 88 PID 3408 wrote to memory of 888 3408 cmd.exe 88 PID 3408 wrote to memory of 1972 3408 cmd.exe 89 PID 3408 wrote to memory of 1972 3408 cmd.exe 89 PID 3408 wrote to memory of 1972 3408 cmd.exe 89 PID 3408 wrote to memory of 3688 3408 cmd.exe 90 PID 3408 wrote to memory of 3688 3408 cmd.exe 90 PID 3408 wrote to memory of 3688 3408 cmd.exe 90 PID 3408 wrote to memory of 1712 3408 cmd.exe 91 PID 3408 wrote to memory of 1712 3408 cmd.exe 91 PID 3408 wrote to memory of 1712 3408 cmd.exe 91 PID 3408 wrote to memory of 2676 3408 cmd.exe 92 PID 3408 wrote to memory of 2676 3408 cmd.exe 92 PID 3408 wrote to memory of 2676 3408 cmd.exe 92 PID 3408 wrote to memory of 2772 3408 cmd.exe 93 PID 3408 wrote to memory of 2772 3408 cmd.exe 93 PID 3408 wrote to memory of 2772 3408 cmd.exe 93 PID 2676 wrote to memory of 2460 2676 Argument.pif 94 PID 2676 wrote to memory of 2460 2676 Argument.pif 94 PID 2676 wrote to memory of 2460 2676 Argument.pif 94 PID 2676 wrote to memory of 2460 2676 Argument.pif 94 PID 2676 wrote to memory of 2460 2676 Argument.pif 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\Solara\Solar\SolaraBootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Solara\Solar\SolaraBootstrapper.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Representations Representations.cmd & Representations.cmd & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵
- System Location Discovery: System Language Discovery
PID:788
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3292
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"4⤵
- System Location Discovery: System Language Discovery
PID:888
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 6916534⤵
- System Location Discovery: System Language Discovery
PID:1972
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "IssuesGriffinChildrenModelling" Animal4⤵
- System Location Discovery: System Language Discovery
PID:3688
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Bolt + Inexpensive + Wellington + Fleet + Telescope + Graphic + Consistent + Dr + Park + Proven 691653\F4⤵
- System Location Discovery: System Language Discovery
PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\691653\Argument.pifArgument.pif F4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2676
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 54⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\691653\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\691653\RegAsm.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
685KB
MD55ea43da01aba98003a6abbac210aff8f
SHA15507e8a1a6264e0d88c3226b0b6259e92b65a219
SHA25682d13a43681c9e64083c3b818b537bd7471c156fa3462f5378d4023ba7538e38
SHA512a4c505a31974a1436f0072047cdf30da22e95f815a6cc5f89ab41704df4e13fd97c9dc0982b81d5414ca30a0e45f9ed4f00517fb3442b3f597578086081ec6ad
-
Filesize
63KB
MD542ab6e035df99a43dbb879c86b620b91
SHA1c6e116569d17d8142dbb217b1f8bfa95bc148c38
SHA25653195987d396986ebcb20425ac130e78ad308fdbd918f33f3fd92b99abda314b
SHA5122e79de2d394ad33023d71611bb728b254aa4680b5a3a1ef5282b1155ddfaa2f3585c840a6700dfe0d1a276dac801298431f0187086d2e8f96b22f6c808fb97e5
-
Filesize
692B
MD531c1e59569e694098305c7b2d5c8401e
SHA1762ce052bc83f6f917cb5afe5d354bb279d2b3f8
SHA2562e439a7e4674589c3e4da070ef4dfe392abf65dac006911ba3aeb54673580abd
SHA5121604e8b8fe8ada65bcd468d1b6017e70834db5b3dc36ae4d052079a049c58085a072e11115ac66463cb4e6b0f3c87bdccb8b78f460eb6e7d39c7787c1da7e7e7
-
Filesize
70KB
MD57ff18f550ee982d1c609f0ac54c59b1c
SHA1115af2ad5292ca76b85ff4e02263bc7829a64b43
SHA25660049115790147848413a5b6b5046d2dc7ae038b319bed53749cdbc1fdc23cfc
SHA5123c00755e5fa75475fec62d19a3cd58ea36294eed6c5cd682ba794819c1cae6eeb3f96aa7e63a382564bb2231af0293afe00064874dca57c3f5423f06dc106234
-
Filesize
76KB
MD566bbd8d50edfa12e57b0af52bc7f456b
SHA16c414e8ba8ef8e179eb96a894a75e10c2a943015
SHA256c02e044b9da1e4edecc37c83c06abe69d6d1178a669fca3f4c78b514b0345f70
SHA512b4b0c91ec423355481b35ad411f4501b13fc604ed11d7d77960c72de2a7799530053a146b45ef910f7db92e3477831044983cb58990ce0f40dceac53ede39ac2
-
Filesize
54KB
MD5b2ed5751e918601dda9729e8a41f61de
SHA1b39da18af098fcaae3b4eae5a288054d2d926fe8
SHA25615e62fb9ba7fcc3100f3232e9d9122d16c41b82be1b5b659662371bc30ee4190
SHA512698091e2db997a132d093d25e323cf8d0c817827cb46767e9559944aff1e4cc09600734e03eb407d93a257708c440f6d07c09215194473100a68ee9f89de9a74
-
Filesize
60KB
MD5ac1f3b21cd1c110fc58d986e4f6f8d8b
SHA1e6e524b79cf4301876e6b6f4a0b4339dad666ac2
SHA2562553e041e8540db4da38df68258e72b7c9d1bd01d3ba8df82fdf94bdea6f1e57
SHA512ef48d88d836f69f372466bfcd9c20ec68dcef4f3a840c0e7fbe0e40af935b652f37da415725b2a295ff96f72f73ffbe2b1961f1ceeeb7971041a021203435071
-
Filesize
71KB
MD59f5e004cc57210c7d4812afd5b37b738
SHA18ae7a822e30aebcc0e7dbff3abdbcc68d83bc883
SHA2569a0dbaad05c54a38059217ea7e14952d669d45dac6ccf6baa37be09c70bb728e
SHA512a36224c168d8b87ea3c5b4e3dde613fe51ab831215388f1221ef0c4392af003bab4bf2ab250381b2f211bad6eb4432ac694bad9e23585cf5e767d130f44bf73e
-
Filesize
97KB
MD5a0ea14cdf9d5f5f999fa22e5f14ca09b
SHA19b67c5ea6680fb93cbda3fbe332c54a4272e52ee
SHA256202875f02bd7d4cedf6457ec61db4bf9c32a8ced3cbec4636af8e95163a6b0cc
SHA5122bd7c9a06ef23f58849c1e2411fce49052c1f59e28af41ad127bc9134430699a73841b8b80f4024d49cea28a17de813790e9c642642651aea680d2f824fdd633
-
Filesize
55KB
MD59a2f7a1099d5c6b8023442986b7d3f63
SHA1553623dd6c4f4afcf6e4a201c708d6bd23463600
SHA25609bfb2fc7ea7858f6041a2397f8163bdbdbdc38a8e985467cbff5f845cfb9cfc
SHA512c5b904906219c920046bdff253c0ec0287dbbcb120915d9d169b312cbcace6bdc1962e4e29dc9242e16e6c59669fac73b02ef63b301d50e5ab44d92ca457c56f
-
Filesize
38KB
MD54e3f4efa93dbdf98812171adf2c2152c
SHA17d661a6c55a1bfc202946297a1e2e79895d65498
SHA2568cedffe95d1aa7a6921ecdb2fa837285bc4c692f07df8a00c37083c8c8fc0bba
SHA5122d47e96f82348a6f779ddc59783c08f5e0f11c2d318d5da52bb4f11b694399ec6e5276f09d6bbce8973bfb230e7b042c57957f89b6b448e9a2a6d5cd9d0bb1e6
-
Filesize
29KB
MD5df007300e1a7a92b49244a15ad6bd975
SHA18493cca1b5f6fe9e85b9daef895e563d30068bb6
SHA25620ea6fa491b528191f772e4814a7ebc3a665b526b6149f187d9b71cb9ef72b00
SHA512298e5d02469a362cf47957918a3bd1a2e9c9e016cf2a47df584d54b8a4e53ec2e4f87254237fc552531444d595a059b5637d87d83f8a79202e4fc321fb9b1943
-
Filesize
89KB
MD5456f4d56c8f909ffcf0ff0a91d8fc1c0
SHA12f68d54fb1d7f0c61a6f57ea13fe59ee8870e576
SHA2564d377450f006468929f4a2c5d9a174816ca42454d2b26f44dc319a80e85a37d3
SHA512c91fcedfce69080f43e124cc94bcd503b41faeb340ef66cf238bd49d2e145907da4e3f419156e472952135957cd760c924bb0d0f9d995aab55ec387015c11710
-
Filesize
872KB
MD58ed2e8863c6355ae9a64c291b8af7bec
SHA1aafc6cb30c6f5f0f0f10c8e9f10107b3614c7d1a
SHA2560019a1fe0412a33f7d8bc05dd100794ec3bea0680d2b27d330f8ffb2805bbadb
SHA5121c14dfed9d37e6dd38d5ac3c1e0ca0dba959cfb753681808e1bc98d2c98840ad50dade87e2ae84c0ad1f6aadc417dee3ef11dfa37b864d8588dec1483b297fca
-
Filesize
75KB
MD5b93b6fe702a14c19fb76ec5decde645c
SHA13e661059f7c9dbddcc7d8b787e11b12e44c78492
SHA256ed3554d9146977b097a160d1ead6970b958846aab4c2eb693b6a2a47ee1f3796
SHA512440d8d93db6e8c5e461ad5ebe423a511d911efb135cca33b61cb1729ba4cb07d22c7d609227097c20bc32040d7f69cde716a1fcd8149973de39711678102587b