Overview
overview
6Static
static
3SolaraB.zip
windows7-x64
3SolaraB.zip
windows10-2004-x64
1SolaraB/So...er.exe
windows7-x64
6SolaraB/So...er.exe
windows10-2004-x64
6SolaraB/So..._FE.iy
windows7-x64
3SolaraB/So..._FE.iy
windows10-2004-x64
3SolaraB/So...erated
windows7-x64
1SolaraB/So...erated
windows10-2004-x64
1SolaraB/So...ig.txt
windows7-x64
3SolaraB/So...ig.txt
windows10-2004-x64
3SolaraB/So...ok.txt
windows7-x64
1SolaraB/So...ok.txt
windows10-2004-x64
1SolaraB/So...s.json
windows7-x64
3SolaraB/So...s.json
windows10-2004-x64
3low ping config.txt
windows7-x64
3low ping config.txt
windows10-2004-x64
3Analysis
-
max time kernel
103s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 12:31
Static task
static1
Behavioral task
behavioral1
Sample
SolaraB.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SolaraB.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
SolaraB/Solara/SolaraBootstrapper.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
SolaraB/Solara/SolaraBootstrapper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
SolaraB/Solara/workspace/IY_FE.iy
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
SolaraB/Solara/workspace/IY_FE.iy
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
SolaraB/Solara/workspace/drax/configs/da_hood/ai generated
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
SolaraB/Solara/workspace/drax/configs/da_hood/ai generated
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
SolaraB/Solara/workspace/drax/configs/da_hood/low ping config.txt
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
SolaraB/Solara/workspace/drax/configs/da_hood/low ping config.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
SolaraB/Solara/workspace/drax/configs/da_hood/lvok.txt
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
SolaraB/Solara/workspace/drax/configs/da_hood/lvok.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
SolaraB/Solara/workspace/rostruct/cache/release_tags.json
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
SolaraB/Solara/workspace/rostruct/cache/release_tags.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
low ping config.txt
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
low ping config.txt
Resource
win10v2004-20240802-en
General
-
Target
SolaraB/Solara/workspace/IY_FE.iy
-
Size
662B
-
MD5
6cde5e80c58d57f2ffa3942d3c209a25
-
SHA1
10295accc2a0f073a7aec5ecbae0de44936045d6
-
SHA256
8ff0e30ca2d7df405819c77ca67cec2269f1ff477fa821030a6b4a7cb9173b71
-
SHA512
88e0e3316bd48f354517bb773aeab16e1eb8013f7c165e2c7b1159ddf8829c296544f20581bebac2a7337d1efcfa306f1b6ba41816c33e1ea0de18f5f6b2ce0d
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.iy rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\iy_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\iy_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\iy_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\iy_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.iy\ = "iy_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\iy_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\iy_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2964 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2964 AcroRd32.exe 2964 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2816 2948 cmd.exe 30 PID 2948 wrote to memory of 2816 2948 cmd.exe 30 PID 2948 wrote to memory of 2816 2948 cmd.exe 30 PID 2816 wrote to memory of 2964 2816 rundll32.exe 31 PID 2816 wrote to memory of 2964 2816 rundll32.exe 31 PID 2816 wrote to memory of 2964 2816 rundll32.exe 31 PID 2816 wrote to memory of 2964 2816 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SolaraB\Solara\workspace\IY_FE.iy1⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SolaraB\Solara\workspace\IY_FE.iy2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\SolaraB\Solara\workspace\IY_FE.iy"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2964
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5767df5db69a3bb2cbaadb628edb54d46
SHA1cd9c5232719d5054b4641087847651bd79dd55ba
SHA256ba577d061e2888e4133c76da8a0a551ebb6d7f5338b5200c114e4d1cb1dda70f
SHA5121f68dc725bf8de2bfa8eb526fe13f26d6c5f42efc750b0abc2cb4e4619e852968914c7bb5cc6add5d7e603c11cc2835168e1d450dbc991d293927d5df7c8cc30