Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
25/08/2024, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
BootstrapperSolara.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
BootstrapperSolara.exe
Resource
win10-20240404-en
General
-
Target
BootstrapperSolara.exe
-
Size
961KB
-
MD5
fa965ef7dad222010cb3185768dddf72
-
SHA1
64ea311586210eee0741f4e94f51c66a3e99dbf2
-
SHA256
7851e924f810dab1284813a043f4e41f52306cb919085f0afc3a17b32c7da450
-
SHA512
59057559c2a776660395a0a1d0ce67d3a7157b367f654b79f36c46df12c829a0c61a43718b57e5c1490367b6264202c9411e3d3fa74e58c59f05851abb5b6a61
-
SSDEEP
12288:u0EgdoJsmwgZXgV7BqUURLBCt3KpOJE+sm93hW2FZm4sPMaJhf6ozg+GQm8gXags:6gyJs2QV0UURdCt3LJrhePMN
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1176 BootstrapperSolara.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1176 set thread context of 5076 1176 BootstrapperSolara.exe 74 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BootstrapperSolara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeBackupPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeBackupPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeBackupPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeBackupPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeBackupPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeBackupPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe Token: SeSecurityPrivilege 5076 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1176 wrote to memory of 5076 1176 BootstrapperSolara.exe 74 PID 1176 wrote to memory of 5076 1176 BootstrapperSolara.exe 74 PID 1176 wrote to memory of 5076 1176 BootstrapperSolara.exe 74 PID 1176 wrote to memory of 5076 1176 BootstrapperSolara.exe 74 PID 1176 wrote to memory of 5076 1176 BootstrapperSolara.exe 74 PID 1176 wrote to memory of 5076 1176 BootstrapperSolara.exe 74 PID 1176 wrote to memory of 5076 1176 BootstrapperSolara.exe 74 PID 1176 wrote to memory of 5076 1176 BootstrapperSolara.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperSolara.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperSolara.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5ee8f4d53a63875270bc1c0a28d791148
SHA1963c75a3c698f536e32620f507bb607cbe7af72f
SHA2568831023784ad6d17c0ac4f550f21e95699bc54da6a79a08c079852465fea5023
SHA51243c4b8ffffe8169d7f773426f202a5aa136ca8a57b5d3f8b8a2467ab118cce149b944f405ca5d904d677e74069519ded4115f8a8629c2e59570bae01dad94972