Analysis
-
max time kernel
289s -
max time network
576s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 06:04
Static task
static1
Behavioral task
behavioral1
Sample
SolaraH.zip
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
SolaraH.zip
Resource
win10v2004-20240802-en
General
-
Target
SolaraH.zip
-
Size
51.8MB
-
MD5
014d87f98adef08287b7a0487c7ac73d
-
SHA1
52b79fa1cfb445cd3a4356c9886f291c25927242
-
SHA256
a32780d4f3cd7aebed06ac7aa42ab9e163ca68c2ce1ff2d00896c238eeff0988
-
SHA512
66457939fd9e672ee4977b5114b6f3704897ad9ab52f506449990810fba1fe21a3e6ac86e33a3b3fda60dfb85a17b258da887af45c96a6dc7bc93e6004e1b1fd
-
SSDEEP
1572864:josAFnhVce7XxjKJt0o6yRQ43u4ivCYz46BtSE4v6GYLM:MVx7XNKL0pyddAz46BtrS6GY4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2772 2960 chrome.exe 33 PID 2960 wrote to memory of 2772 2960 chrome.exe 33 PID 2960 wrote to memory of 2772 2960 chrome.exe 33 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 1928 2960 chrome.exe 35 PID 2960 wrote to memory of 2300 2960 chrome.exe 36 PID 2960 wrote to memory of 2300 2960 chrome.exe 36 PID 2960 wrote to memory of 2300 2960 chrome.exe 36 PID 2960 wrote to memory of 2052 2960 chrome.exe 37 PID 2960 wrote to memory of 2052 2960 chrome.exe 37 PID 2960 wrote to memory of 2052 2960 chrome.exe 37 PID 2960 wrote to memory of 2052 2960 chrome.exe 37 PID 2960 wrote to memory of 2052 2960 chrome.exe 37 PID 2960 wrote to memory of 2052 2960 chrome.exe 37 PID 2960 wrote to memory of 2052 2960 chrome.exe 37 PID 2960 wrote to memory of 2052 2960 chrome.exe 37 PID 2960 wrote to memory of 2052 2960 chrome.exe 37 PID 2960 wrote to memory of 2052 2960 chrome.exe 37 PID 2960 wrote to memory of 2052 2960 chrome.exe 37 PID 2960 wrote to memory of 2052 2960 chrome.exe 37 PID 2960 wrote to memory of 2052 2960 chrome.exe 37 PID 2960 wrote to memory of 2052 2960 chrome.exe 37 PID 2960 wrote to memory of 2052 2960 chrome.exe 37 PID 2960 wrote to memory of 2052 2960 chrome.exe 37 PID 2960 wrote to memory of 2052 2960 chrome.exe 37 PID 2960 wrote to memory of 2052 2960 chrome.exe 37 PID 2960 wrote to memory of 2052 2960 chrome.exe 37
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\SolaraH.zip1⤵PID:2404
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2792
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6d99758,0x7fef6d99768,0x7fef6d997782⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1112 --field-trial-handle=1272,i,17388557352407887121,10874982097165352843,131072 /prefetch:22⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1272,i,17388557352407887121,10874982097165352843,131072 /prefetch:82⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1272,i,17388557352407887121,10874982097165352843,131072 /prefetch:82⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2264 --field-trial-handle=1272,i,17388557352407887121,10874982097165352843,131072 /prefetch:12⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2272 --field-trial-handle=1272,i,17388557352407887121,10874982097165352843,131072 /prefetch:12⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3212 --field-trial-handle=1272,i,17388557352407887121,10874982097165352843,131072 /prefetch:22⤵PID:904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1412 --field-trial-handle=1272,i,17388557352407887121,10874982097165352843,131072 /prefetch:12⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3664 --field-trial-handle=1272,i,17388557352407887121,10874982097165352843,131072 /prefetch:82⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3540 --field-trial-handle=1272,i,17388557352407887121,10874982097165352843,131072 /prefetch:82⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3664 --field-trial-handle=1272,i,17388557352407887121,10874982097165352843,131072 /prefetch:82⤵PID:892
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
986B
MD5b16c97c23025a9206bf8817699fe1b91
SHA110f51b3f2bb38e98f47b9e9dd81ab0f71b44c878
SHA256f102a25e33b0468aeb792e2743e538e4940533f181830fb953b5fd0c0270eb61
SHA5120bd14ffbd9e1110261c74d4b0ab9aca532cc27afd0da1fb29f5204fb656225d07e6dd933614aa6b061762742930ad38fc9678ceab15bc3ec692b710db4df63d0
-
Filesize
1KB
MD5cbcb2f8635268f8b2ddee7ea0a675b6f
SHA1d4266af56dd42a3e87c8df8fd8c22db996ec9eeb
SHA25651a0b3ed49c0d152dcbe3de94f115af5593d5f8342b67e3f0b8b920e43e79eec
SHA5129622b80ba2610ca09d94e44f6e5f05226d1fac582faca65f52e5ccfbf2ec14c110860db8e6a946a3f7aacdeb86e5136c12e24657b3c4603ecb9a9fba7db064e4
-
Filesize
5KB
MD53c48e4973273cdf0cc3ac29ed50d5f50
SHA1484aa24f49beb3e79b03fa402dd5447faa0fb61e
SHA256d9130f5ccf5456052f2d2b7d348e8c6746b6605962fa247d17f34f261828647b
SHA5126cfdef5bebcd6eb7aa54f7a811e3bb7c090e1b1402b74971bcb44286d6810d5b3113330100e3379cd99f0b880aa2a9f1c002eb05026272fb28ca1357ed4571c6
-
Filesize
5KB
MD52f44a4569d39f4e9c4841988b8f79354
SHA1c0e8fda65c3f0d7eee56b1c11d95080fa48705d0
SHA2567e8bc3d256d974362398fa7d9368f0f89505ba010c3bac37a82b2adabc62c720
SHA51236d86f18c723269491dbc833c833cc8a0e507a9e0b640623c4a9cecbc1dac0ccd5a7fd4d88d321a0a48561f09df496c3e6591fd35c2632b2ef3ba8e46dc2dfaf
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
162KB
MD5fcb5ba23f797dab1f0ffa14eeac4171e
SHA1c1f4589020d9f85b5a39b0988e3a418b3237bfe0
SHA256aabc9497895cd17960f58d552bf706c2a0f0b049c0dd9c5f4e12620a3c647d4c
SHA5127cd46f91fbb1a75e9fdc59a63f20d97cd3e00010dc3720cfced2137c239bb2e477074b0099ae8b4a36492b46958e1d4e4ddacf3e4e81a1fdb43151a40421b674
-
Filesize
346KB
MD56de7789c6c83c4e9f775cbf6a1f280de
SHA1be4c4735eecac51267f3d7d34e382fb8075b6a37
SHA256599d70ca630a4c7cf5f23df937947aae7e4f417feebff35ecde5cea01a12c366
SHA512783aab21b9d7b2327b48696f6f07cdc60dcb71ec60bf4ed52549784498a7020b99dd0e6b5fc0cd4577e263e278dd5a4b8837e5d9cd029ca14af2eef90f49cf5b
-
Filesize
319KB
MD54ab937fd5937aa8f21f841c75fb3e54c
SHA1c62126d5f997a430dbf5ab363d65ad4c1f0eaf5c
SHA2561be2c0175023bddd975ee17ec0d572a7534cd78a65d023cc643d5e40c37e814c
SHA512b936a07299381f1ebf1c265c7540d9412810bf84474c174d9b4757843e48bb893e79740a5196f2e34b83629652d85266b535bc2d3fe94c8d26bc4957c18528e8