Overview
overview
10Static
static
3Solara/Sol...on.dll
windows7-x64
1Solara/Sol...on.dll
windows10-2004-x64
1Solara/Sol...er.dll
windows7-x64
1Solara/Sol...er.dll
windows10-2004-x64
1Solara/Sol...ce.dll
windows7-x64
1Solara/Sol...ce.dll
windows10-2004-x64
1Solara/Sol...ce.dll
windows7-x64
1Solara/Sol...ce.dll
windows10-2004-x64
1Solara/Sol...ra.exe
windows7-x64
10Solara/Sol...ra.exe
windows10-2004-x64
10Solara/Sol...pl.dll
windows10-2004-x64
1Solara/Sol...rn.dll
windows10-2004-x64
1Solara/Sol...fg.dll
windows10-2004-x64
1Analysis
-
max time kernel
136s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 13:22
Static task
static1
Behavioral task
behavioral1
Sample
Solara/Solara/Debug/Addition.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Solara/Solara/Debug/Addition.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Solara/Solara/Debug/Helper.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Solara/Solara/Debug/Helper.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Solara/Solara/Debug/Resource.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Solara/Solara/Debug/Resource.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Solara/Solara/Packaged/Resource.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Solara/Solara/Packaged/Resource.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Solara/Solara/Solara.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Solara/Solara/Solara.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Solara/Solara/accessibilitycpl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
Solara/Solara/oleprn.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Solara/Solara/wwancfg.dll
Resource
win10v2004-20240802-en
General
-
Target
Solara/Solara/Solara.exe
-
Size
6.2MB
-
MD5
da26c67d857555aeef4f2580e53d7c6d
-
SHA1
fc39f8e1987aa7d8553b052b789a7e6b0d24a68a
-
SHA256
b9536929d0de9b4a18e7646f2ecf59aad20f93092e982be91d20143d599e6c22
-
SHA512
115ff4890967b3a00bf2e192d9e2d8717bc7525bab995ca5db7c5c7d2be6a81888ae9687f51d04d053371088e553381a7844a82433240022bccbc44b319df75d
-
SSDEEP
98304:yyjZJD+ddKUmXQ+ZQaJOV20y89y8dfWwl+ZILeXLel:yEZJD+Xe7ZQaIE0jzWwlXebel
Malware Config
Extracted
rhadamanthys
https://144.76.133.166:8034/5502b8a765a7d7349/k5851jfq.guti6
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3556 created 2992 3556 Solara.exe 51 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1264 set thread context of 3556 1264 Solara.exe 90 -
Program crash 2 IoCs
pid pid_target Process procid_target 812 3556 WerFault.exe 90 4080 3556 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3556 Solara.exe 3556 Solara.exe 4344 openwith.exe 4344 openwith.exe 4344 openwith.exe 4344 openwith.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1264 wrote to memory of 3556 1264 Solara.exe 90 PID 1264 wrote to memory of 3556 1264 Solara.exe 90 PID 1264 wrote to memory of 3556 1264 Solara.exe 90 PID 1264 wrote to memory of 3556 1264 Solara.exe 90 PID 1264 wrote to memory of 3556 1264 Solara.exe 90 PID 1264 wrote to memory of 3556 1264 Solara.exe 90 PID 1264 wrote to memory of 3556 1264 Solara.exe 90 PID 1264 wrote to memory of 3556 1264 Solara.exe 90 PID 1264 wrote to memory of 3556 1264 Solara.exe 90 PID 1264 wrote to memory of 3556 1264 Solara.exe 90 PID 3556 wrote to memory of 4344 3556 Solara.exe 93 PID 3556 wrote to memory of 4344 3556 Solara.exe 93 PID 3556 wrote to memory of 4344 3556 Solara.exe 93 PID 3556 wrote to memory of 4344 3556 Solara.exe 93 PID 3556 wrote to memory of 4344 3556 Solara.exe 93
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2992
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Users\Admin\AppData\Local\Temp\Solara\Solara\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara\Solara\Solara.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\Solara\Solara\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara\Solara\Solara.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3556 -s 4643⤵
- Program crash
PID:812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3556 -s 4723⤵
- Program crash
PID:4080
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3556 -ip 35561⤵PID:2476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3556 -ip 35561⤵PID:3308