Analysis
-
max time kernel
1794s -
max time network
1799s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 04:53
Behavioral task
behavioral1
Sample
Solara executor/Solara.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Solara executor/cfg/SDL2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Solara executor/cfg/steam_api.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Solara executor/cfg/sw.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Solara executor/cfg/vgui.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
Solara executor/cfg/vgui2.dll
Resource
win10v2004-20240802-en
General
-
Target
Solara executor/cfg/SDL2.dll
-
Size
1.9MB
-
MD5
9fd3ec6d8de3cff290e7a78177b17362
-
SHA1
b3cb33d621749c9340718f405a719c9f383b7bcd
-
SHA256
7a7f96e8e8dd97bed0faecdf12f8b22d09ae6181659c86c94f075453cfa6d5f7
-
SHA512
0e376326e26be63198db2f532acf9f8f7b9dbad7a6fb182c4adf2ffc034d9d345f4664ada3f5ae6ce023743dc55bd82250db095fa132df248ab606362d5c2525
-
SSDEEP
24576:EaURSDS53BCRBnjUG8rKGGe36k4TtDPW/akFnPc2/U1NxytF2xwP5uHhMqLzn9p9:Ea36Z6J6/9zGugbzPkAN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 220 wrote to memory of 4100 220 rundll32.exe 95 PID 220 wrote to memory of 4100 220 rundll32.exe 95 PID 220 wrote to memory of 4100 220 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Solara executor\cfg\SDL2.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Solara executor\cfg\SDL2.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4120,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=4440 /prefetch:81⤵PID:3988
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4012,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=1420 /prefetch:81⤵PID:3964