Overview
overview
10Static
static
3Solara.zip
windows10-2004-x64
10Solara/Sol...on.dll
windows10-2004-x64
1Solara/Sol...er.dll
windows10-2004-x64
1Solara/Sol...ce.dll
windows10-2004-x64
1Solara/Sol...ce.dll
windows10-2004-x64
1Solara/Sol...ra.exe
windows10-2004-x64
10Solara/Sol...pl.dll
windows10-2004-x64
1Solara/Sol...rn.dll
windows10-2004-x64
1Solara/Sol...fg.dll
windows10-2004-x64
1Analysis
-
max time kernel
95s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2024, 08:13
Static task
static1
Behavioral task
behavioral1
Sample
Solara.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Solara/Solara/Debug/Addition.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Solara/Solara/Debug/Helper.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Solara/Solara/Debug/Resource.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Solara/Solara/Packaged/Resource.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
Solara/Solara/Solara.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Solara/Solara/accessibilitycpl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
Solara/Solara/oleprn.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Solara/Solara/wwancfg.dll
Resource
win10v2004-20240802-en
General
-
Target
Solara/Solara/Solara.exe
-
Size
6.2MB
-
MD5
da26c67d857555aeef4f2580e53d7c6d
-
SHA1
fc39f8e1987aa7d8553b052b789a7e6b0d24a68a
-
SHA256
b9536929d0de9b4a18e7646f2ecf59aad20f93092e982be91d20143d599e6c22
-
SHA512
115ff4890967b3a00bf2e192d9e2d8717bc7525bab995ca5db7c5c7d2be6a81888ae9687f51d04d053371088e553381a7844a82433240022bccbc44b319df75d
-
SSDEEP
98304:yyjZJD+ddKUmXQ+ZQaJOV20y89y8dfWwl+ZILeXLel:yEZJD+Xe7ZQaIE0jzWwlXebel
Malware Config
Extracted
rhadamanthys
https://144.76.133.166:8034/5502b8a765a7d7349/k5851jfq.guti6
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4664 created 2452 4664 Solara.exe 44 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1628 set thread context of 4664 1628 Solara.exe 87 -
Program crash 2 IoCs
pid pid_target Process procid_target 1880 4664 WerFault.exe 87 1532 4664 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4664 Solara.exe 4664 Solara.exe 4720 openwith.exe 4720 openwith.exe 4720 openwith.exe 4720 openwith.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1628 wrote to memory of 4664 1628 Solara.exe 87 PID 1628 wrote to memory of 4664 1628 Solara.exe 87 PID 1628 wrote to memory of 4664 1628 Solara.exe 87 PID 1628 wrote to memory of 4664 1628 Solara.exe 87 PID 1628 wrote to memory of 4664 1628 Solara.exe 87 PID 1628 wrote to memory of 4664 1628 Solara.exe 87 PID 1628 wrote to memory of 4664 1628 Solara.exe 87 PID 1628 wrote to memory of 4664 1628 Solara.exe 87 PID 1628 wrote to memory of 4664 1628 Solara.exe 87 PID 1628 wrote to memory of 4664 1628 Solara.exe 87 PID 4664 wrote to memory of 4720 4664 Solara.exe 89 PID 4664 wrote to memory of 4720 4664 Solara.exe 89 PID 4664 wrote to memory of 4720 4664 Solara.exe 89 PID 4664 wrote to memory of 4720 4664 Solara.exe 89 PID 4664 wrote to memory of 4720 4664 Solara.exe 89
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2452
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4720
-
-
C:\Users\Admin\AppData\Local\Temp\Solara\Solara\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara\Solara\Solara.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\Solara\Solara\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara\Solara\Solara.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 4323⤵
- Program crash
PID:1880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 4283⤵
- Program crash
PID:1532
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4664 -ip 46641⤵PID:1280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4664 -ip 46641⤵PID:4408