Overview
overview
9Static
static
9ًUpdBootstrappً.zip
windows11-21h2-x64
8Solaraً.zip
windows11-21h2-x64
1Solaraً/B...ً.exe
windows11-21h2-x64
9Solaraً/bin/api.dll
windows11-21h2-x64
3Solaraً/w...le.txt
windows11-21h2-x64
3Solaraً/w...et.txt
windows11-21h2-x64
3Solaraً/w...le.txt
windows11-21h2-x64
3Solaraً/w..._1.txt
windows11-21h2-x64
3Solaraً/w..._2.txt
windows11-21h2-x64
3Solaraً/w...le.txt
windows11-21h2-x64
3Solaraً/w...le.txt
windows11-21h2-x64
3Solaraً/w...tefile
windows11-21h2-x64
1Solaraً/w...le.txt
windows11-21h2-x64
3Solaraً/w...LL.txt
windows11-21h2-x64
3Solaraً/w..._FE.iy
windows11-21h2-x64
3Solaraً/w...s.json
windows11-21h2-x64
3Solaraً/B...ً.exe
windows11-21h2-x64
9Solaraً/a...st.lua
windows11-21h2-x64
3Solaraً/a...t2.lua
windows11-21h2-x64
3Solaraً/bin/api.dll
windows11-21h2-x64
3Solaraً/w...le.txt
windows11-21h2-x64
3Solaraً/w...et.txt
windows11-21h2-x64
3Solaraً/w...le.txt
windows11-21h2-x64
3Solaraً/w..._1.txt
windows11-21h2-x64
3Solaraً/w..._2.txt
windows11-21h2-x64
3Solaraً/w...le.txt
windows11-21h2-x64
3Solaraً/w...le.txt
windows11-21h2-x64
3Solaraً/w...tefile
windows11-21h2-x64
1Solaraً/w...le.txt
windows11-21h2-x64
3Solaraً/w...LL.txt
windows11-21h2-x64
3Solaraً/w..._FE.iy
windows11-21h2-x64
3Solaraً/w...s.json
windows11-21h2-x64
3Analysis
-
max time kernel
41s -
max time network
64s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-09-2024 18:34
Behavioral task
behavioral1
Sample
ًUpdBootstrappً.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
Solaraً.zip
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Solaraً/Bootstrapperً.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
Solaraً/bin/api.dll
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
Solaraً/workspace/.tests/appendfile.txt
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
Solaraً/workspace/.tests/getcustomasset.txt
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
Solaraً/workspace/.tests/isfile.txt
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
Solaraً/workspace/.tests/listfiles/test_1.txt
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
Solaraً/workspace/.tests/listfiles/test_2.txt
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
Solaraً/workspace/.tests/loadfile.txt
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
Solaraً/workspace/.tests/readfile.txt
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
Solaraً/workspace/.tests/writefile
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
Solaraً/workspace/.tests/writefile.txt
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
Solaraً/workspace/EzHubLL.txt
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
Solaraً/workspace/IY_FE.iy
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
Solaraً/workspace/Sky Hub/Sky Hub Settings.json
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
Solaraً/Bootstrapperً.exe
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
Solaraً/autoexec/test.lua
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
Solaraً/autoexec/test2.lua
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
Solaraً/bin/api.dll
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
Solaraً/workspace/.tests/appendfile.txt
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
Solaraً/workspace/.tests/getcustomasset.txt
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
Solaraً/workspace/.tests/isfile.txt
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
Solaraً/workspace/.tests/listfiles/test_1.txt
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
Solaraً/workspace/.tests/listfiles/test_2.txt
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
Solaraً/workspace/.tests/loadfile.txt
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
Solaraً/workspace/.tests/readfile.txt
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
Solaraً/workspace/.tests/writefile
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
Solaraً/workspace/.tests/writefile.txt
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
Solaraً/workspace/EzHubLL.txt
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
Solaraً/workspace/IY_FE.iy
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
Solaraً/workspace/Sky Hub/Sky Hub Settings.json
Resource
win11-20240802-en
General
-
Target
Solaraً/Bootstrapperً.exe
-
Size
693KB
-
MD5
ac10e1cb266e694f78ff4a815c06f29a
-
SHA1
b0960667b451e09334e84418f90af99b57a5bd16
-
SHA256
6b26490431d849d714accf4cf704dc609c845d5c39e6b08ec10f7020635ccd4d
-
SHA512
95472caf45ae38c89e005643e2b994e0da270b5f9e431fbe8dc9cd61d6ff32ccab265d6984414ea5942ed87dea95dc664ed63e5e3541279e590d1377bd119190
-
SSDEEP
12288:oT5vOF1f2GHUfW0WtG4XCCsL8W1kmI9Cy6GWZMtgQa0IeiF6h4rXfrVaBQNSKd8f:oT5vOX2Gt0gG49soEIMG
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL 1 IoCs
pid Process 3788 Bootstrapperً.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3788 set thread context of 5936 3788 Bootstrapperً.exe 79 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapperً.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 5936 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 5936 MSBuild.exe Token: SeSecurityPrivilege 5936 MSBuild.exe Token: SeSecurityPrivilege 5936 MSBuild.exe Token: SeSecurityPrivilege 5936 MSBuild.exe Token: SeSecurityPrivilege 5936 MSBuild.exe Token: SeDebugPrivilege 5936 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3788 wrote to memory of 5936 3788 Bootstrapperً.exe 79 PID 3788 wrote to memory of 5936 3788 Bootstrapperً.exe 79 PID 3788 wrote to memory of 5936 3788 Bootstrapperً.exe 79 PID 3788 wrote to memory of 5936 3788 Bootstrapperً.exe 79 PID 3788 wrote to memory of 5936 3788 Bootstrapperً.exe 79 PID 3788 wrote to memory of 5936 3788 Bootstrapperً.exe 79 PID 3788 wrote to memory of 5936 3788 Bootstrapperً.exe 79 PID 3788 wrote to memory of 5936 3788 Bootstrapperً.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\Solaraً\Bootstrapperً.exe"C:\Users\Admin\AppData\Local\Temp\Solaraً\Bootstrapperً.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
746KB
MD56103c4fd0755e869090af4f9eeea791c
SHA17b492225b2473b915911e88792ba896df70827e5
SHA25648926333b6225e7ba3768fa97590170421096d6f4d2ec1b971f3064d1fcfb967
SHA51283d650476b9d5fd77b248604d6f61af269337b00fc7ad8be05121faca81c9ec18a0186ac42fef8ea6c0ef814a7157a15587bb270e82465bf611264ad50d494ec