Analysis
-
max time kernel
1364s -
max time network
1154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 04:53
Behavioral task
behavioral1
Sample
Solara executor/Solara.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Solara executor/cfg/SDL2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Solara executor/cfg/steam_api.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Solara executor/cfg/sw.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Solara executor/cfg/vgui.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
Solara executor/cfg/vgui2.dll
Resource
win10v2004-20240802-en
General
-
Target
Solara executor/Solara.exe
-
Size
4.6MB
-
MD5
eb1a8a2ad16907874483509234a36dc1
-
SHA1
2bd4bc54aea4b45855c2091e3f7df32442063581
-
SHA256
259a15fc38bcc8b24aa75cf10bf16bdf9927de1cf928544b7bab38276c04e547
-
SHA512
dc44f89c7964ca241650eb00747ee29b601f4f7c150c2d3af44498b32b6c48ea0c23e8c3eebef3fa84dbe92b43cf89cefc4b1dcfa342230c5e36780adeded91d
-
SSDEEP
98304:jx1UuIrWlbF+6vXf8KIIG4N4kRkd7tJWPTTj3XMILFi:j0pWl4CXf1RG4NjKJsPLnt
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Solara.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Solara.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Solara.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2968-11-0x00000000004A0000-0x0000000000F9C000-memory.dmp themida behavioral1/memory/2968-12-0x00000000004A0000-0x0000000000F9C000-memory.dmp themida behavioral1/memory/2968-32-0x00000000004A0000-0x0000000000F9C000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Solara.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2968 Solara.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2968 Solara.exe 2968 Solara.exe 2968 Solara.exe 2968 Solara.exe 2968 Solara.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2968 Solara.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Solara executor\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara executor\Solara.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4660
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2