Analysis
-
max time kernel
15s -
max time network
18s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 08:53
Static task
static1
Behavioral task
behavioral1
Sample
Solara.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Solara.exe
Resource
win10v2004-20240802-en
General
-
Target
Solara.exe
-
Size
6.2MB
-
MD5
da26c67d857555aeef4f2580e53d7c6d
-
SHA1
fc39f8e1987aa7d8553b052b789a7e6b0d24a68a
-
SHA256
b9536929d0de9b4a18e7646f2ecf59aad20f93092e982be91d20143d599e6c22
-
SHA512
115ff4890967b3a00bf2e192d9e2d8717bc7525bab995ca5db7c5c7d2be6a81888ae9687f51d04d053371088e553381a7844a82433240022bccbc44b319df75d
-
SSDEEP
98304:yyjZJD+ddKUmXQ+ZQaJOV20y89y8dfWwl+ZILeXLel:yEZJD+Xe7ZQaIE0jzWwlXebel
Malware Config
Extracted
rhadamanthys
https://144.76.133.166:8034/5502b8a765a7d7349/k5851jfq.guti6
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
Solara.exedescription pid process target process PID 1208 created 2588 1208 Solara.exe sihost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Solara.exedescription pid process target process PID 3216 set thread context of 1208 3216 Solara.exe Solara.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3240 1208 WerFault.exe Solara.exe 1332 1208 WerFault.exe Solara.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Solara.exeSolara.exeopenwith.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
Solara.exeopenwith.exepid process 1208 Solara.exe 1208 Solara.exe 2124 openwith.exe 2124 openwith.exe 2124 openwith.exe 2124 openwith.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Solara.exeSolara.exedescription pid process target process PID 3216 wrote to memory of 1208 3216 Solara.exe Solara.exe PID 3216 wrote to memory of 1208 3216 Solara.exe Solara.exe PID 3216 wrote to memory of 1208 3216 Solara.exe Solara.exe PID 3216 wrote to memory of 1208 3216 Solara.exe Solara.exe PID 3216 wrote to memory of 1208 3216 Solara.exe Solara.exe PID 3216 wrote to memory of 1208 3216 Solara.exe Solara.exe PID 3216 wrote to memory of 1208 3216 Solara.exe Solara.exe PID 3216 wrote to memory of 1208 3216 Solara.exe Solara.exe PID 3216 wrote to memory of 1208 3216 Solara.exe Solara.exe PID 3216 wrote to memory of 1208 3216 Solara.exe Solara.exe PID 1208 wrote to memory of 2124 1208 Solara.exe openwith.exe PID 1208 wrote to memory of 2124 1208 Solara.exe openwith.exe PID 1208 wrote to memory of 2124 1208 Solara.exe openwith.exe PID 1208 wrote to memory of 2124 1208 Solara.exe openwith.exe PID 1208 wrote to memory of 2124 1208 Solara.exe openwith.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2588
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 3403⤵
- Program crash
PID:3240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 4483⤵
- Program crash
PID:1332
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1208 -ip 12081⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1208 -ip 12081⤵PID:4320