Overview
overview
10Static
static
3Solara/Deb...on.dll
windows7-x64
1Solara/Deb...on.dll
windows10-2004-x64
1Solara/Deb...er.dll
windows7-x64
1Solara/Deb...er.dll
windows10-2004-x64
1Solara/Deb...ce.dll
windows7-x64
1Solara/Deb...ce.dll
windows10-2004-x64
1Solara/Pac...ce.dll
windows7-x64
1Solara/Pac...ce.dll
windows10-2004-x64
1Solara/Solara.exe
windows7-x64
10Solara/Solara.exe
windows10-2004-x64
10Solara/acc...pl.dll
windows10-2004-x64
Solara/oleprn.dll
windows10-2004-x64
1Solara/wwancfg.dll
windows10-2004-x64
1Resubmissions
30-08-2024 20:29
240830-y9xrmavdll 10Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
30-08-2024 20:29
Static task
static1
Behavioral task
behavioral1
Sample
Solara/Debug/Addition.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Solara/Debug/Addition.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Solara/Debug/Helper.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Solara/Debug/Helper.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Solara/Debug/Resource.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Solara/Debug/Resource.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Solara/Packaged/Resource.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Solara/Packaged/Resource.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Solara/Solara.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Solara/Solara.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Solara/accessibilitycpl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
Solara/oleprn.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Solara/wwancfg.dll
Resource
win10v2004-20240802-en
General
-
Target
Solara/Solara.exe
-
Size
6.2MB
-
MD5
da26c67d857555aeef4f2580e53d7c6d
-
SHA1
fc39f8e1987aa7d8553b052b789a7e6b0d24a68a
-
SHA256
b9536929d0de9b4a18e7646f2ecf59aad20f93092e982be91d20143d599e6c22
-
SHA512
115ff4890967b3a00bf2e192d9e2d8717bc7525bab995ca5db7c5c7d2be6a81888ae9687f51d04d053371088e553381a7844a82433240022bccbc44b319df75d
-
SSDEEP
98304:yyjZJD+ddKUmXQ+ZQaJOV20y89y8dfWwl+ZILeXLel:yEZJD+Xe7ZQaIE0jzWwlXebel
Malware Config
Extracted
rhadamanthys
https://144.76.133.166:8034/5502b8a765a7d7349/k5851jfq.guti6
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2060 set thread context of 2992 2060 Solara.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2060 Solara.exe 2060 Solara.exe 2060 Solara.exe 2060 Solara.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2060 Solara.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2928 2060 Solara.exe 30 PID 2060 wrote to memory of 2928 2060 Solara.exe 30 PID 2060 wrote to memory of 2928 2060 Solara.exe 30 PID 2060 wrote to memory of 2928 2060 Solara.exe 30 PID 2060 wrote to memory of 2976 2060 Solara.exe 31 PID 2060 wrote to memory of 2976 2060 Solara.exe 31 PID 2060 wrote to memory of 2976 2060 Solara.exe 31 PID 2060 wrote to memory of 2976 2060 Solara.exe 31 PID 2060 wrote to memory of 2992 2060 Solara.exe 32 PID 2060 wrote to memory of 2992 2060 Solara.exe 32 PID 2060 wrote to memory of 2992 2060 Solara.exe 32 PID 2060 wrote to memory of 2992 2060 Solara.exe 32 PID 2060 wrote to memory of 2992 2060 Solara.exe 32 PID 2060 wrote to memory of 2992 2060 Solara.exe 32 PID 2060 wrote to memory of 2992 2060 Solara.exe 32 PID 2060 wrote to memory of 2992 2060 Solara.exe 32 PID 2060 wrote to memory of 2992 2060 Solara.exe 32 PID 2060 wrote to memory of 2992 2060 Solara.exe 32 PID 2060 wrote to memory of 2992 2060 Solara.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Solara\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara\Solara.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Solara\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara\Solara.exe"2⤵PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\Solara\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara\Solara.exe"2⤵PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\Solara\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara\Solara.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2992
-