Overview
overview
10Static
static
3Solara/Deb...on.dll
windows7-x64
1Solara/Deb...on.dll
windows10-2004-x64
1Solara/Deb...er.dll
windows7-x64
1Solara/Deb...er.dll
windows10-2004-x64
1Solara/Deb...ce.dll
windows7-x64
1Solara/Deb...ce.dll
windows10-2004-x64
1Solara/Pac...ce.dll
windows7-x64
1Solara/Pac...ce.dll
windows10-2004-x64
1Solara/Solara.exe
windows7-x64
10Solara/Solara.exe
windows10-2004-x64
10Solara/acc...pl.dll
windows10-2004-x64
Solara/oleprn.dll
windows10-2004-x64
1Solara/wwancfg.dll
windows10-2004-x64
1Resubmissions
30-08-2024 20:29
240830-y9xrmavdll 10Analysis
-
max time kernel
136s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 20:29
Static task
static1
Behavioral task
behavioral1
Sample
Solara/Debug/Addition.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Solara/Debug/Addition.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Solara/Debug/Helper.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Solara/Debug/Helper.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Solara/Debug/Resource.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Solara/Debug/Resource.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Solara/Packaged/Resource.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Solara/Packaged/Resource.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Solara/Solara.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Solara/Solara.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Solara/accessibilitycpl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
Solara/oleprn.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Solara/wwancfg.dll
Resource
win10v2004-20240802-en
General
-
Target
Solara/Solara.exe
-
Size
6.2MB
-
MD5
da26c67d857555aeef4f2580e53d7c6d
-
SHA1
fc39f8e1987aa7d8553b052b789a7e6b0d24a68a
-
SHA256
b9536929d0de9b4a18e7646f2ecf59aad20f93092e982be91d20143d599e6c22
-
SHA512
115ff4890967b3a00bf2e192d9e2d8717bc7525bab995ca5db7c5c7d2be6a81888ae9687f51d04d053371088e553381a7844a82433240022bccbc44b319df75d
-
SSDEEP
98304:yyjZJD+ddKUmXQ+ZQaJOV20y89y8dfWwl+ZILeXLel:yEZJD+Xe7ZQaIE0jzWwlXebel
Malware Config
Extracted
rhadamanthys
https://144.76.133.166:8034/5502b8a765a7d7349/k5851jfq.guti6
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2712 created 2648 2712 Solara.exe 44 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4792 set thread context of 2712 4792 Solara.exe 88 -
Program crash 2 IoCs
pid pid_target Process procid_target 1652 2712 WerFault.exe 88 1444 2712 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4792 Solara.exe 4792 Solara.exe 2712 Solara.exe 2712 Solara.exe 4808 openwith.exe 4808 openwith.exe 4808 openwith.exe 4808 openwith.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4792 Solara.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4792 wrote to memory of 832 4792 Solara.exe 87 PID 4792 wrote to memory of 832 4792 Solara.exe 87 PID 4792 wrote to memory of 832 4792 Solara.exe 87 PID 4792 wrote to memory of 2712 4792 Solara.exe 88 PID 4792 wrote to memory of 2712 4792 Solara.exe 88 PID 4792 wrote to memory of 2712 4792 Solara.exe 88 PID 4792 wrote to memory of 2712 4792 Solara.exe 88 PID 4792 wrote to memory of 2712 4792 Solara.exe 88 PID 4792 wrote to memory of 2712 4792 Solara.exe 88 PID 4792 wrote to memory of 2712 4792 Solara.exe 88 PID 4792 wrote to memory of 2712 4792 Solara.exe 88 PID 4792 wrote to memory of 2712 4792 Solara.exe 88 PID 4792 wrote to memory of 2712 4792 Solara.exe 88 PID 2712 wrote to memory of 4808 2712 Solara.exe 91 PID 2712 wrote to memory of 4808 2712 Solara.exe 91 PID 2712 wrote to memory of 4808 2712 Solara.exe 91 PID 2712 wrote to memory of 4808 2712 Solara.exe 91 PID 2712 wrote to memory of 4808 2712 Solara.exe 91
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2648
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4808
-
-
C:\Users\Admin\AppData\Local\Temp\Solara\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara\Solara.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\Solara\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara\Solara.exe"2⤵PID:832
-
-
C:\Users\Admin\AppData\Local\Temp\Solara\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara\Solara.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 4763⤵
- Program crash
PID:1652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 4843⤵
- Program crash
PID:1444
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2712 -ip 27121⤵PID:1952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2712 -ip 27121⤵PID:4480