Analysis

  • max time kernel
    41s
  • max time network
    64s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02-09-2024 18:34

General

  • Target

    Solaraً/Bootstrapperً.exe

  • Size

    693KB

  • MD5

    ac10e1cb266e694f78ff4a815c06f29a

  • SHA1

    b0960667b451e09334e84418f90af99b57a5bd16

  • SHA256

    6b26490431d849d714accf4cf704dc609c845d5c39e6b08ec10f7020635ccd4d

  • SHA512

    95472caf45ae38c89e005643e2b994e0da270b5f9e431fbe8dc9cd61d6ff32ccab265d6984414ea5942ed87dea95dc664ed63e5e3541279e590d1377bd119190

  • SSDEEP

    12288:oT5vOF1f2GHUfW0WtG4XCCsL8W1kmI9Cy6GWZMtgQa0IeiF6h4rXfrVaBQNSKd8f:oT5vOX2Gt0gG49soEIMG

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Loads dropped DLL 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Solaraً\Bootstrapperً.exe
    "C:\Users\Admin\AppData\Local\Temp\Solaraً\Bootstrapperً.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3788
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\msvcp110.dll

    Filesize

    746KB

    MD5

    6103c4fd0755e869090af4f9eeea791c

    SHA1

    7b492225b2473b915911e88792ba896df70827e5

    SHA256

    48926333b6225e7ba3768fa97590170421096d6f4d2ec1b971f3064d1fcfb967

    SHA512

    83d650476b9d5fd77b248604d6f61af269337b00fc7ad8be05121faca81c9ec18a0186ac42fef8ea6c0ef814a7157a15587bb270e82465bf611264ad50d494ec

  • memory/3788-11-0x00000000745B0000-0x0000000074D61000-memory.dmp

    Filesize

    7.7MB

  • memory/3788-1-0x0000000000190000-0x0000000000244000-memory.dmp

    Filesize

    720KB

  • memory/3788-2-0x00000000745B0000-0x0000000074D61000-memory.dmp

    Filesize

    7.7MB

  • memory/3788-0-0x00000000745BE000-0x00000000745BF000-memory.dmp

    Filesize

    4KB

  • memory/3788-12-0x00000000745B0000-0x0000000074D61000-memory.dmp

    Filesize

    7.7MB

  • memory/3788-13-0x00000000771A1000-0x00000000772C3000-memory.dmp

    Filesize

    1.1MB

  • memory/5936-18-0x0000000005820000-0x000000000582A000-memory.dmp

    Filesize

    40KB

  • memory/5936-22-0x0000000008890000-0x00000000088CC000-memory.dmp

    Filesize

    240KB

  • memory/5936-15-0x0000000005D20000-0x00000000062C6000-memory.dmp

    Filesize

    5.6MB

  • memory/5936-16-0x0000000005770000-0x0000000005802000-memory.dmp

    Filesize

    584KB

  • memory/5936-17-0x00000000745B0000-0x0000000074D61000-memory.dmp

    Filesize

    7.7MB

  • memory/5936-9-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/5936-19-0x0000000008DD0000-0x00000000093E8000-memory.dmp

    Filesize

    6.1MB

  • memory/5936-20-0x0000000008830000-0x0000000008842000-memory.dmp

    Filesize

    72KB

  • memory/5936-21-0x0000000008960000-0x0000000008A6A000-memory.dmp

    Filesize

    1.0MB

  • memory/5936-14-0x00000000745B0000-0x0000000074D61000-memory.dmp

    Filesize

    7.7MB

  • memory/5936-23-0x00000000088D0000-0x000000000891C000-memory.dmp

    Filesize

    304KB

  • memory/5936-26-0x0000000008CB0000-0x0000000008D16000-memory.dmp

    Filesize

    408KB

  • memory/5936-27-0x0000000009C00000-0x0000000009C76000-memory.dmp

    Filesize

    472KB

  • memory/5936-28-0x0000000008D20000-0x0000000008D3E000-memory.dmp

    Filesize

    120KB

  • memory/5936-29-0x000000000A230000-0x000000000A3F2000-memory.dmp

    Filesize

    1.8MB

  • memory/5936-30-0x000000000AAE0000-0x000000000B00C000-memory.dmp

    Filesize

    5.2MB

  • memory/5936-31-0x00000000745B0000-0x0000000074D61000-memory.dmp

    Filesize

    7.7MB

  • memory/5936-33-0x00000000745B0000-0x0000000074D61000-memory.dmp

    Filesize

    7.7MB