Overview
overview
6Static
static
3Solara.zip
windows7-x64
1Solara.zip
windows10-2004-x64
1Launcher.bat
windows7-x64
6Launcher.bat
windows10-2004-x64
6compiler.exe
windows7-x64
1compiler.exe
windows10-2004-x64
3conf.txt
windows7-x64
1conf.txt
windows10-2004-x64
1lua51.dll
windows7-x64
3lua51.dll
windows10-2004-x64
3Analysis
-
max time kernel
139s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 06:47
Static task
static1
Behavioral task
behavioral1
Sample
Solara.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Solara.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Launcher.bat
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Launcher.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
compiler.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
compiler.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
conf.txt
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
conf.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
lua51.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
lua51.dll
Resource
win10v2004-20240802-en
General
-
Target
Launcher.bat
-
Size
605B
-
MD5
46d6baf18639fb319462dfd35d6fa3c8
-
SHA1
bc5a75924578d6b4a42760e435cd6ca6bce1462c
-
SHA256
ea08be982b18ecbe6a5af7525f5c49e478cf41067174e41058cf3db2f9581d37
-
SHA512
9a68f4981efff0ffc4a9c47cdf4cd8ce4f9039ed903cb11a6935f4783adb27b3b56ccaeaad3d520ce26d9c96f5e6bfbcc53681cb9bb247f82183884bcc826f44
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Setup\Scripts\ErrorHandler.cmd compiler.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3208 schtasks.exe 4592 schtasks.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4504 wrote to memory of 4744 4504 cmd.exe 85 PID 4504 wrote to memory of 4744 4504 cmd.exe 85 PID 4504 wrote to memory of 4744 4504 cmd.exe 85 PID 4744 wrote to memory of 3208 4744 compiler.exe 96 PID 4744 wrote to memory of 3208 4744 compiler.exe 96 PID 4744 wrote to memory of 3208 4744 compiler.exe 96 PID 4744 wrote to memory of 4592 4744 compiler.exe 97 PID 4744 wrote to memory of 4592 4744 compiler.exe 97 PID 4744 wrote to memory of 4592 4744 compiler.exe 97 PID 4744 wrote to memory of 2688 4744 compiler.exe 100 PID 4744 wrote to memory of 2688 4744 compiler.exe 100 PID 4744 wrote to memory of 2688 4744 compiler.exe 100
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Launcher.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\compiler.execompiler.exe conf.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc daily /st 11:11 /f /tn GameOptimizerTask_ODA0 /tr ""C:\Users\Admin\AppData\Local\OWYsN2YsN2YsYTAsOWUsODYsOGMsOTYsNjQsN2Ms\ODA0.exe" "C:\Users\Admin\AppData\Local\OWYsN2YsN2YsYTAsOWUsODYsOGMsOTYsNjQsN2Ms\conf.txt""3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3208
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc daily /st 11:11 /f /tn Setup /tr "C:/Windows/System32/oobe/Setup.exe" /rl highest3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4592
-
-
C:\Users\Admin\AppData\Local\Temp\compiler.exe"C:\Users\Admin\AppData\Local\Temp\compiler.exe" "C:\Users\Admin\AppData\Roaming\tmp\conf.lua"3⤵PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD5a6e82e3f005f61929f62c981670138b1
SHA171f15a319a5f8f353068b6463d153e7bcc4ebf23
SHA256289b7cd5419091154d2db0c1c70e7580ccde22ebe59b03ada35e95ee6b530bd7
SHA5120691bc3995e0bae2048c966a7f3c207cfd708fa691b2f95b85618c136ab3bb65d4201b4d9d690b3a3b7812c52c537175a91af6efcf98959ed5fca84aa7467cce