Analysis

  • max time kernel
    92s
  • max time network
    96s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02-09-2024 18:34

General

  • Target

    Solaraً/Bootstrapperً.exe

  • Size

    693KB

  • MD5

    ac10e1cb266e694f78ff4a815c06f29a

  • SHA1

    b0960667b451e09334e84418f90af99b57a5bd16

  • SHA256

    6b26490431d849d714accf4cf704dc609c845d5c39e6b08ec10f7020635ccd4d

  • SHA512

    95472caf45ae38c89e005643e2b994e0da270b5f9e431fbe8dc9cd61d6ff32ccab265d6984414ea5942ed87dea95dc664ed63e5e3541279e590d1377bd119190

  • SSDEEP

    12288:oT5vOF1f2GHUfW0WtG4XCCsL8W1kmI9Cy6GWZMtgQa0IeiF6h4rXfrVaBQNSKd8f:oT5vOX2Gt0gG49soEIMG

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Loads dropped DLL 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Solaraً\Bootstrapperً.exe
    "C:\Users\Admin\AppData\Local\Temp\Solaraً\Bootstrapperً.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5600
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\msvcp110.dll

    Filesize

    746KB

    MD5

    6103c4fd0755e869090af4f9eeea791c

    SHA1

    7b492225b2473b915911e88792ba896df70827e5

    SHA256

    48926333b6225e7ba3768fa97590170421096d6f4d2ec1b971f3064d1fcfb967

    SHA512

    83d650476b9d5fd77b248604d6f61af269337b00fc7ad8be05121faca81c9ec18a0186ac42fef8ea6c0ef814a7157a15587bb270e82465bf611264ad50d494ec

  • memory/3576-26-0x00000000094E0000-0x0000000009556000-memory.dmp

    Filesize

    472KB

  • memory/3576-30-0x0000000074BA0000-0x0000000075351000-memory.dmp

    Filesize

    7.7MB

  • memory/3576-17-0x00000000057E0000-0x00000000057EA000-memory.dmp

    Filesize

    40KB

  • memory/3576-9-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3576-31-0x0000000074BA0000-0x0000000075351000-memory.dmp

    Filesize

    7.7MB

  • memory/3576-18-0x0000000008900000-0x0000000008F18000-memory.dmp

    Filesize

    6.1MB

  • memory/3576-13-0x0000000074BA0000-0x0000000075351000-memory.dmp

    Filesize

    7.7MB

  • memory/3576-14-0x0000000005A20000-0x0000000005FC6000-memory.dmp

    Filesize

    5.6MB

  • memory/3576-15-0x0000000005510000-0x00000000055A2000-memory.dmp

    Filesize

    584KB

  • memory/3576-16-0x0000000074BA0000-0x0000000075351000-memory.dmp

    Filesize

    7.7MB

  • memory/3576-33-0x0000000074BA0000-0x0000000075351000-memory.dmp

    Filesize

    7.7MB

  • memory/3576-29-0x000000000A6E0000-0x000000000AC0C000-memory.dmp

    Filesize

    5.2MB

  • memory/3576-21-0x00000000082E0000-0x000000000831C000-memory.dmp

    Filesize

    240KB

  • memory/3576-20-0x00000000083F0000-0x00000000084FA000-memory.dmp

    Filesize

    1.0MB

  • memory/3576-19-0x0000000008240000-0x0000000008252000-memory.dmp

    Filesize

    72KB

  • memory/3576-22-0x0000000008320000-0x000000000836C000-memory.dmp

    Filesize

    304KB

  • memory/3576-25-0x0000000009270000-0x00000000092D6000-memory.dmp

    Filesize

    408KB

  • memory/3576-28-0x0000000009FE0000-0x000000000A1A2000-memory.dmp

    Filesize

    1.8MB

  • memory/3576-27-0x0000000008FC0000-0x0000000008FDE000-memory.dmp

    Filesize

    120KB

  • memory/5600-0-0x0000000074BAE000-0x0000000074BAF000-memory.dmp

    Filesize

    4KB

  • memory/5600-2-0x0000000074BA0000-0x0000000075351000-memory.dmp

    Filesize

    7.7MB

  • memory/5600-12-0x0000000074BA0000-0x0000000075351000-memory.dmp

    Filesize

    7.7MB

  • memory/5600-11-0x0000000074BA0000-0x0000000075351000-memory.dmp

    Filesize

    7.7MB

  • memory/5600-1-0x0000000000050000-0x0000000000104000-memory.dmp

    Filesize

    720KB