Analysis
-
max time kernel
90s -
max time network
91s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 20:35
Behavioral task
behavioral1
Sample
solara.exe
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
solara.exe
-
Size
74KB
-
MD5
d939a8f7173dbebb24c01a8e913b6e6f
-
SHA1
e6ed20f133d07787f4d17005b158c654b1e9037f
-
SHA256
71278221ab4edd7798eb6d35c30f61f022f175c31ec250c9d08176da771df559
-
SHA512
68dc23bf7baed8fd77e7d073b6df6e99ea7ae1e489d04f5358c98c8659af80389efb4ad50e503e20de4026fe5ecd3bbe82e6f5399eb557074d8ce16406ba7458
-
SSDEEP
1536:MJLaUY/jBSSiM/oHseUtR0DVRfgeoOzIbKyLZhb1B:GLaU+H1/1tRkWeoOofj
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/3424-4-0x0000000005850000-0x0000000005A64000-memory.dmp family_agenttesla -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language solara.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS solara.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer solara.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion solara.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3424 solara.exe