Analysis
-
max time kernel
710s -
max time network
675s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 15:58
Static task
static1
Behavioral task
behavioral1
Sample
SolaraFgyr3wg.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SolaraFgyr3wg.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
S0laraG.zip
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
S0laraG.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
readme.txt
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
readme.txt
Resource
win10v2004-20240802-en
General
-
Target
SolaraFgyr3wg.zip
-
Size
51.5MB
-
MD5
4d8f9bcedf3ffb755215e1715d1542e2
-
SHA1
3c5b28451d50f8701822eec25c427390e0463412
-
SHA256
3ad72cdbee191f6bb0ce6dff149e3b327f6a081fe360fa06bce5e6d433313eb6
-
SHA512
46e7e074cc41625f64f29f276eaee44e199ba2e54e5857919f4b2a138d13f9d3a6c2b2c3599d4617198992fbb9526458bba8d500218797daf4abd71de0dc87a6
-
SSDEEP
786432:9HSwEsBXsW+YBV/Ux1JXTdy02KP2QE+Yj8zhdgayVzD004KHsjFPvwuPyLV1uY0u:nXsdOV/ELpD6QU8cwFPpPW70JPly
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation SolaraV3.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation SolaraV3.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation SolaraV3.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation SolaraV3.exe -
Executes dropped EXE 13 IoCs
pid Process 1300 SolaraV3.exe 3304 Joy.pif 1708 SolaraV3.exe 5004 Joy.pif 4752 RegAsm.exe 1528 RegAsm.exe 1060 RegAsm.exe 4552 SolaraV3.exe 2972 SolaraV3.exe 404 Joy.pif 244 Joy.pif 4516 RegAsm.exe 4396 RegAsm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist 1 TTPs 8 IoCs
pid Process 3964 tasklist.exe 4892 tasklist.exe 4360 tasklist.exe 4492 tasklist.exe 2908 tasklist.exe 2480 tasklist.exe 3512 tasklist.exe 2116 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 52 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Joy.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Joy.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SolaraV3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Joy.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SolaraV3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Joy.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SolaraV3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SolaraV3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel\ShowCmd = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel\ShowCmd = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\NodeSlot = "4" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000010000001800000030f125b7ef471a10a5f102608c9eebac0a000000a0000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "18874369" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\FirewallControlPanel.dll,-12122#immutable1 = "Windows Defender Firewall" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "18874369" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000010000001800000030f125b7ef471a10a5f102608c9eebac0a000000a0000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "48" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "18874385" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "18874369" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0 = 0c0001008421de39050000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\0 = 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 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel\HotKey = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 = 14001f706806ee260aa0d7449371beb064c986830000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "48" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 020000000100000000000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\0\NodeSlot = "5" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000010000001800000030f125b7ef471a10a5f102608c9eebac0a000000a0000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel\WFlags = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel\WFlags = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" explorer.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 716 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4252 explorer.exe 4552 explorer.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 3304 Joy.pif 3304 Joy.pif 3304 Joy.pif 3304 Joy.pif 3304 Joy.pif 3304 Joy.pif 5004 Joy.pif 5004 Joy.pif 5004 Joy.pif 5004 Joy.pif 5004 Joy.pif 5004 Joy.pif 3304 Joy.pif 3304 Joy.pif 3304 Joy.pif 3304 Joy.pif 5004 Joy.pif 5004 Joy.pif 5004 Joy.pif 5004 Joy.pif 5004 Joy.pif 5004 Joy.pif 5004 Joy.pif 5004 Joy.pif 1528 RegAsm.exe 1528 RegAsm.exe 1528 RegAsm.exe 1528 RegAsm.exe 1528 RegAsm.exe 1528 RegAsm.exe 1528 RegAsm.exe 1528 RegAsm.exe 1528 RegAsm.exe 1528 RegAsm.exe 1528 RegAsm.exe 1060 RegAsm.exe 404 Joy.pif 404 Joy.pif 404 Joy.pif 404 Joy.pif 404 Joy.pif 404 Joy.pif 244 Joy.pif 244 Joy.pif 244 Joy.pif 244 Joy.pif 244 Joy.pif 244 Joy.pif 404 Joy.pif 404 Joy.pif 404 Joy.pif 404 Joy.pif 244 Joy.pif 244 Joy.pif 244 Joy.pif 244 Joy.pif 4516 RegAsm.exe 4396 RegAsm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3724 OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeShutdownPrivilege 4252 explorer.exe Token: SeCreatePagefilePrivilege 4252 explorer.exe Token: SeShutdownPrivilege 4552 explorer.exe Token: SeCreatePagefilePrivilege 4552 explorer.exe Token: 33 3816 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3816 AUDIODG.EXE Token: SeRestorePrivilege 4988 7zG.exe Token: 35 4988 7zG.exe Token: SeSecurityPrivilege 4988 7zG.exe Token: SeSecurityPrivilege 4988 7zG.exe Token: SeRestorePrivilege 1420 7zG.exe Token: 35 1420 7zG.exe Token: SeSecurityPrivilege 1420 7zG.exe Token: SeSecurityPrivilege 1420 7zG.exe Token: SeDebugPrivilege 4360 tasklist.exe Token: SeDebugPrivilege 4492 tasklist.exe Token: SeDebugPrivilege 2908 tasklist.exe Token: SeDebugPrivilege 2480 tasklist.exe Token: SeBackupPrivilege 1528 RegAsm.exe Token: SeSecurityPrivilege 1528 RegAsm.exe Token: SeSecurityPrivilege 1528 RegAsm.exe Token: SeSecurityPrivilege 1528 RegAsm.exe Token: SeSecurityPrivilege 1528 RegAsm.exe Token: SeDebugPrivilege 1528 RegAsm.exe Token: SeBackupPrivilege 1060 RegAsm.exe Token: SeSecurityPrivilege 1060 RegAsm.exe Token: SeSecurityPrivilege 1060 RegAsm.exe Token: SeSecurityPrivilege 1060 RegAsm.exe Token: SeSecurityPrivilege 1060 RegAsm.exe Token: SeDebugPrivilege 1060 RegAsm.exe Token: SeDebugPrivilege 3512 tasklist.exe Token: SeDebugPrivilege 2116 tasklist.exe Token: SeDebugPrivilege 3964 tasklist.exe Token: SeDebugPrivilege 4892 tasklist.exe Token: SeBackupPrivilege 4516 RegAsm.exe Token: SeSecurityPrivilege 4516 RegAsm.exe Token: SeSecurityPrivilege 4516 RegAsm.exe Token: SeSecurityPrivilege 4516 RegAsm.exe Token: SeSecurityPrivilege 4516 RegAsm.exe Token: SeBackupPrivilege 4396 RegAsm.exe Token: SeSecurityPrivilege 4396 RegAsm.exe Token: SeSecurityPrivilege 4396 RegAsm.exe Token: SeSecurityPrivilege 4396 RegAsm.exe Token: SeSecurityPrivilege 4396 RegAsm.exe Token: SeDebugPrivilege 4516 RegAsm.exe Token: SeDebugPrivilege 4396 RegAsm.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 4252 explorer.exe 4552 explorer.exe 4552 explorer.exe 4552 explorer.exe 4988 7zG.exe 1420 7zG.exe 3304 Joy.pif 3304 Joy.pif 3304 Joy.pif 5004 Joy.pif 5004 Joy.pif 5004 Joy.pif 404 Joy.pif 404 Joy.pif 404 Joy.pif 244 Joy.pif 244 Joy.pif 244 Joy.pif -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3304 Joy.pif 3304 Joy.pif 3304 Joy.pif 5004 Joy.pif 5004 Joy.pif 5004 Joy.pif 404 Joy.pif 404 Joy.pif 404 Joy.pif 244 Joy.pif 244 Joy.pif 244 Joy.pif -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3724 wrote to memory of 716 3724 OpenWith.exe 153 PID 3724 wrote to memory of 716 3724 OpenWith.exe 153 PID 1300 wrote to memory of 816 1300 SolaraV3.exe 155 PID 1300 wrote to memory of 816 1300 SolaraV3.exe 155 PID 1300 wrote to memory of 816 1300 SolaraV3.exe 155 PID 816 wrote to memory of 4360 816 cmd.exe 157 PID 816 wrote to memory of 4360 816 cmd.exe 157 PID 816 wrote to memory of 4360 816 cmd.exe 157 PID 816 wrote to memory of 3524 816 cmd.exe 158 PID 816 wrote to memory of 3524 816 cmd.exe 158 PID 816 wrote to memory of 3524 816 cmd.exe 158 PID 816 wrote to memory of 4492 816 cmd.exe 160 PID 816 wrote to memory of 4492 816 cmd.exe 160 PID 816 wrote to memory of 4492 816 cmd.exe 160 PID 816 wrote to memory of 2044 816 cmd.exe 161 PID 816 wrote to memory of 2044 816 cmd.exe 161 PID 816 wrote to memory of 2044 816 cmd.exe 161 PID 816 wrote to memory of 1116 816 cmd.exe 162 PID 816 wrote to memory of 1116 816 cmd.exe 162 PID 816 wrote to memory of 1116 816 cmd.exe 162 PID 816 wrote to memory of 1596 816 cmd.exe 163 PID 816 wrote to memory of 1596 816 cmd.exe 163 PID 816 wrote to memory of 1596 816 cmd.exe 163 PID 816 wrote to memory of 2324 816 cmd.exe 164 PID 816 wrote to memory of 2324 816 cmd.exe 164 PID 816 wrote to memory of 2324 816 cmd.exe 164 PID 816 wrote to memory of 3304 816 cmd.exe 165 PID 816 wrote to memory of 3304 816 cmd.exe 165 PID 816 wrote to memory of 3304 816 cmd.exe 165 PID 816 wrote to memory of 3796 816 cmd.exe 166 PID 816 wrote to memory of 3796 816 cmd.exe 166 PID 816 wrote to memory of 3796 816 cmd.exe 166 PID 1708 wrote to memory of 772 1708 SolaraV3.exe 168 PID 1708 wrote to memory of 772 1708 SolaraV3.exe 168 PID 1708 wrote to memory of 772 1708 SolaraV3.exe 168 PID 772 wrote to memory of 2908 772 cmd.exe 170 PID 772 wrote to memory of 2908 772 cmd.exe 170 PID 772 wrote to memory of 2908 772 cmd.exe 170 PID 772 wrote to memory of 976 772 cmd.exe 171 PID 772 wrote to memory of 976 772 cmd.exe 171 PID 772 wrote to memory of 976 772 cmd.exe 171 PID 772 wrote to memory of 2480 772 cmd.exe 172 PID 772 wrote to memory of 2480 772 cmd.exe 172 PID 772 wrote to memory of 2480 772 cmd.exe 172 PID 772 wrote to memory of 4452 772 cmd.exe 173 PID 772 wrote to memory of 4452 772 cmd.exe 173 PID 772 wrote to memory of 4452 772 cmd.exe 173 PID 772 wrote to memory of 1956 772 cmd.exe 174 PID 772 wrote to memory of 1956 772 cmd.exe 174 PID 772 wrote to memory of 1956 772 cmd.exe 174 PID 772 wrote to memory of 3744 772 cmd.exe 175 PID 772 wrote to memory of 3744 772 cmd.exe 175 PID 772 wrote to memory of 3744 772 cmd.exe 175 PID 772 wrote to memory of 5004 772 cmd.exe 176 PID 772 wrote to memory of 5004 772 cmd.exe 176 PID 772 wrote to memory of 5004 772 cmd.exe 176 PID 772 wrote to memory of 2172 772 cmd.exe 177 PID 772 wrote to memory of 2172 772 cmd.exe 177 PID 772 wrote to memory of 2172 772 cmd.exe 177 PID 3304 wrote to memory of 1528 3304 Joy.pif 180 PID 3304 wrote to memory of 1528 3304 Joy.pif 180 PID 3304 wrote to memory of 1528 3304 Joy.pif 180 PID 3304 wrote to memory of 1528 3304 Joy.pif 180 PID 5004 wrote to memory of 4752 5004 Joy.pif 181
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\SolaraFgyr3wg.zip1⤵PID:1512
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1284,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=4380 /prefetch:81⤵PID:3188
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4488
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaultc8d8ade2h52a6h4c74hadachc5b8ca9bb9991⤵PID:2644
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault5948729bh1bddh462ah9c59hdd0898da6ed01⤵PID:2500
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:5048
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4252
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:3336
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:1728
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:3896
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault9991d8c0hbbcch4b32h9cc8h0b38780b9eba1⤵PID:216
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:4340
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4552
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:4272
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x510 0x4f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault165db7feh190ch47a0ha8fch2a375d1089e91⤵PID:3088
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:1948
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1684,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=3900 /prefetch:81⤵PID:3596
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\SolaraFgyr3wg\" -spe -an -ai#7zMap7522:84:7zEvent64851⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4988
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\S0laraG\" -spe -an -ai#7zMap17461:72:7zEvent321921⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1420
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\S0laraG\locales\resources\app.asar.unpacked\node_modules\btime\binding.node2⤵
- Opens file in notepad (likely ransom note)
PID:716
-
-
C:\Users\Admin\Desktop\S0laraG\SolaraV3.exe"C:\Users\Admin\Desktop\S0laraG\SolaraV3.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Knight Knight.bat & Knight.bat & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3524
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2044
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 512503⤵
- System Location Discovery: System Language Discovery
PID:1116
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "HospitalityGrayOracleRisk" Select3⤵
- System Location Discovery: System Language Discovery
PID:1596
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Beijing + ..\Collection + ..\Methods + ..\Conducted + ..\Gain + ..\Aye + ..\Fallen + ..\Elements + ..\Alberta + ..\Started + ..\Beliefs w3⤵
- System Location Discovery: System Language Discovery
PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\51250\Joy.pifJoy.pif w3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\51250\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\51250\RegAsm.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:3796
-
-
-
C:\Users\Admin\Desktop\S0laraG\SolaraV3.exe"C:\Users\Admin\Desktop\S0laraG\SolaraV3.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Knight Knight.bat & Knight.bat & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:976
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4452
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 512503⤵
- System Location Discovery: System Language Discovery
PID:1956
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Beijing + ..\Collection + ..\Methods + ..\Conducted + ..\Gain + ..\Aye + ..\Fallen + ..\Elements + ..\Alberta + ..\Started + ..\Beliefs w3⤵
- System Location Discovery: System Language Discovery
PID:3744
-
-
C:\Users\Admin\AppData\Local\Temp\51250\Joy.pifJoy.pif w3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\51250\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\51250\RegAsm.exe4⤵
- Executes dropped EXE
PID:4752
-
-
C:\Users\Admin\AppData\Local\Temp\51250\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\51250\RegAsm.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:2172
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\New Text Document.txt1⤵PID:672
-
C:\Users\Admin\Desktop\S0laraG\SolaraV3.exe"C:\Users\Admin\Desktop\S0laraG\SolaraV3.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4552 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Knight Knight.bat & Knight.bat & exit2⤵
- System Location Discovery: System Language Discovery
PID:4740 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1608
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2956
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 512503⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "HospitalityGrayOracleRisk" Select3⤵
- System Location Discovery: System Language Discovery
PID:4392
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Beijing + ..\Collection + ..\Methods + ..\Conducted + ..\Gain + ..\Aye + ..\Fallen + ..\Elements + ..\Alberta + ..\Started + ..\Beliefs w3⤵
- System Location Discovery: System Language Discovery
PID:4196
-
-
C:\Users\Admin\AppData\Local\Temp\51250\Joy.pifJoy.pif w3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:404 -
C:\Users\Admin\AppData\Local\Temp\51250\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\51250\RegAsm.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:2376
-
-
-
C:\Users\Admin\Desktop\S0laraG\SolaraV3.exe"C:\Users\Admin\Desktop\S0laraG\SolaraV3.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Knight Knight.bat & Knight.bat & exit2⤵
- System Location Discovery: System Language Discovery
PID:3780 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4080
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4416
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 512503⤵
- System Location Discovery: System Language Discovery
PID:4376
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Beijing + ..\Collection + ..\Methods + ..\Conducted + ..\Gain + ..\Aye + ..\Fallen + ..\Elements + ..\Alberta + ..\Started + ..\Beliefs w3⤵
- System Location Discovery: System Language Discovery
PID:3232
-
-
C:\Users\Admin\AppData\Local\Temp\51250\Joy.pifJoy.pif w3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:244 -
C:\Users\Admin\AppData\Local\Temp\51250\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\51250\RegAsm.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:376
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding1⤵PID:4380
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5dacc82e6e6b88e8e99998baa34b684c5
SHA1c10ffeebbfea0522f5cb3a3afd159d362c90a89a
SHA2563961907179b99e833cdd64406120a73363c21cfa05cbbb13826450f71b374046
SHA512b2fbd2ace8a9ef986932c90cb5d78ec9fd6a2ab4e8793bb47e879edfab328ca05a34076c1b729f45e861030c85e2f435e215b7144c5c248e48573ba3ade03749
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
780KB
MD51b5348a1599210168f5d5ff12b0ce411
SHA18e6e563eca492f5df2d840658968c4a27bce7850
SHA2564ce6e0215ed84b96c3d147ca013e97e6631d5991644edd7f2c0b6cf4cec25350
SHA512e0f90d52c50c71df5a864ed7643c4733a966870c128d6ccc8572e6b8509abb16cd48fb5be6546de887fa625341ab56745bc03f36e130e5a6295e83c965e77066
-
Filesize
55KB
MD5cd72c52725b1aa5033c6eb98950b01f6
SHA14f562a2cfc1e6bfd9a014d02465621d2627a8fcb
SHA25689f74c6adbe334237876b1c67b1daaa05801987db0156e9f8d5cd5095181db8a
SHA512d0638a2af12feaa492d16b658768b3dc9c76864baf160a92c28cfb2a9571d8214f6fbde05c05f66caa215aa9d386ab0712ad830877b0a676e0a3359be75b61fd
-
Filesize
98KB
MD549b03332149aaae0c5c66bfa3d9b214d
SHA151d8abbed0ad2760821c72d48824932ecc272b05
SHA256d8e492dc4febcca35259f78dc9793d597d6db802fb0e70aa421bc93fbc6bd61f
SHA512563deb69972d01a74cc948fea7a2a16344663b3de6fa4549dc0028c82d98e2070c9c856d927cfbbc0d0ad0bab763d0a336689a007ae2fb9e5bc3c212ba4eab65
-
Filesize
54KB
MD55e2d089f89a33af335801f2c31b4243e
SHA104c8b940d3a0784a4023eacc9726bae4e8b4234b
SHA25676f9e27ec08943a9ff6b48080be9989766bbb55613c7ee1deb750fc128ce74d1
SHA512fe78fc7a7c9d845ff71edb876b6bb0c441dfc69746535e722de5994f64726a18fdc04b51d7f6af70972f65e889d9ff396495058ccfcd93f71e3f6ebffd2fee2a
-
Filesize
52KB
MD5af6e8b68c585b1cdeb4477f03eca27a4
SHA17ed30e5cb75ffe40952490fe0b892143512015de
SHA25621eb0a889e1b4b0ae0a8d7e466c6bd7eebaee19ab8685353c85a858a42c1517b
SHA51263e05ed66e8627305ac1b587c365e4aafa32854251ad0cd465cab104136164da68d84d1e23ceb8d82c208b02bf494dca18b31a56aa2cd54a04e68cb8da724ce9
-
Filesize
70KB
MD5bdc8c2e3f0206682d7a0320771963cda
SHA1cda06d65a2da3b819fb5730ffb69cebc58587fcc
SHA2564346ef1a6295ec31e197de3f2931a632dfaa5ab9875f5bf6e4a9a23f44b12a5c
SHA512b4a2d3374d4cba5045c483fdcc23e3d4e7a3d0ab9a0c18d7fafd7e4431cf54e2d7ae84b5af2df42d3804b4347bb51394239e90b9eaa992790d165300a519107b
-
Filesize
75KB
MD59a41d927835d049bcf6314379cc8c775
SHA137b3b502aa7d3b2a80eceecef506048e1dc96bd9
SHA2563177807ffa5c1f0e19bbdb906b54e16f05da2943f62abc70db2e1aad51e70e21
SHA512c6b75be5ef3f057bb962e3cdb79cf9c2c832e423931238927b8afc6bbf2b3487c68614301a6101b71410f7211454db6b7e09cb465a1979cf283fcf03c7e58c0f
-
Filesize
60KB
MD5610036564fff5e8d8493934325f59de7
SHA1a2bf604c885ba955fd670e4fc9980b780572e9ec
SHA256b5686a8f08197d566f91d6caa87398f0f798604f9ab4a011bb9f604fddb04ec7
SHA51260d6bbec574cdc334fb9b14508f11e73e9b15dad67f124fbb81ede70144a2a0a1497a2cd6cdcf4585ed5e15766e0cd944836ecab7314859fc11fc6fe94ccab2f
-
Filesize
53KB
MD59f9bdb6b14d06bc389b909aaffb31917
SHA1da57ba8e3c83f6d38980645d92729c733173a8bc
SHA256caa52bd8fa6da9253ff05ed42377dc91ac40729fac32b84d5651e50418008517
SHA5120cf1a37d939f8e6dbf51694fb4f948f4e266014e40bf32f510aff77d0a7aa63eb3acc83ed7dab54d7adf1c8832fc77c5f231e98d7fa751d02e3d42dc48cc4989
-
Filesize
97KB
MD50a605f07fcb9b9e9adfa6bfc6541af3f
SHA115437b552f4d21b83c6f01f4ff915b1e1d5325e1
SHA25634f734fef8f49cb06f0178d361fef39526084d036a5be9944b813289fa3e0e9f
SHA512b7aa1d875afb2859ad85040e80b4b006067e3b22063f2557e7e565e17d9f59c7afe40fd953031c83c6ea397aa5fcedde374845c9d64f94aaf0042105a500d9d9
-
Filesize
11KB
MD575d442f074ab3ea857779e6a97f1a230
SHA14d614662fefaabe0c63c673b81aa10fdffe11130
SHA25661cfd32c8c21ba01c8788e85f96b777beb84f7a111f32cf9cb9e2ebeef39e34d
SHA51272e1dcb1d405952aa97a3a250ed50b3d5052beab234d71019bbfeca9fb0783cd6197313a6672b70757678391fdc364d0a9a83daa0a2117832994f4c86e9f7702
-
Filesize
872KB
MD5aaa9630d8d79b3e4145f73cc6c5d91eb
SHA178d39afc0b90b92f8cebfeee3f410c0547bfc0b6
SHA25666b99fdc10bc9cdc905e7e4a76f8c747aa439d7c8deaba8f31f2476a30c57f70
SHA51250f865aeffbc338c772034e171ca72ef20ec9fefe154a3883352823dccc18df0ec0a16bc1177c03ea15ae0ffd0413e9093ed5e0b8d8ca525c532dd6c32609247
-
Filesize
313KB
MD5d0fda828fc29cc5ea329c5f5af45ad9f
SHA1c831e8b9ca12142da7aab205a5dd0e72fac499ad
SHA25675561bb5daa42e869709749280e467803d9bb5f088cf13cd2b6c382c773af26b
SHA51286ddfa0f7aab59484e2545df72332c6055afb4b4bc963761d90c81ccb8ddd6ea2c1578efab45b6a54ff0f643d34b5fb92bbddbf3807dd1bfdd2b04a12f0877f7
-
Filesize
94KB
MD5de7e87e6475862919bd7b0a684f3c7e9
SHA126950c42ddfd72288cfb60040bcfe3360edcad20
SHA256c494f967437b6392c5a6a03351306dd1252f23935b43385f302c31f70f8f6abc
SHA512ae2dc4547be1de3a37677247db241066f305a423fc698937a1e9b6993c07619c56a81c83abdbaf2b8b42044c12515361c7fe43970bccc5c0b3ba28026896a216
-
Filesize
449B
MD59a8aba730b113e3d91d21a9de3bb0f4e
SHA1b631379d9f689646cdc2c743179151dfc6556f7e
SHA256f984acc46910e887927f3c97f5557409493849b803a23b32aa292e79596469fd
SHA512c80334cb31d08a6ce097442e3b3108dc831e63479a561c03a469e21cf87cf824108b1aa0128ca72309cde09bf9404ee1f6ac331ed82a5220dcd311942ce319f1
-
Filesize
72KB
MD54318f454e38bfbff18bd966f8fa723e2
SHA1b7ec4e2ec3a233b33cb66cd22322e5a89dadb012
SHA2560be726ca8c6d9aafd6b04ac6ace2d924d7844c33e73b9c74e2a8b8b7daeb158d
SHA51284a5c224246d7fcb66de131c04ef68a49cbb58412f71391c42ea055a7db6e1dcfbdb6b9b7bb827e074d1af8a1598aa81cdae95ebbf90dcd1ac32a978ced64dbb
-
Filesize
1.5MB
MD560742d56ad06f62f3474674a2c88459a
SHA1a991c2f571834dab72ad67de25edc5d28837cfe7
SHA2561f012d9ed24338e0656971ab05265dc28c476d9e2d290d3356a858ef6fadca2b
SHA512e391e17f10ae3572547304e5c149af8c85d1106556d361001672b59b045b3abd0e7728b715fa3cc83da727660b80a1723ee36c4c594e8a7bfec941d6b6635c98
-
Filesize
118KB
MD513a2579ed95366185a6247c9e4b9f0cc
SHA161fef12da622484e44b3c9ddcd61706c9af00aa0
SHA25698c51303c38dc03faeeba13f26fa3c6645d0c1a502b8a5d28177ce015dacf35f
SHA5127aae5a45f5333355c81e4a7468d40c9d814a1b242c99a39747fea9b66e277dd1060bda290fc980e958beccab2ac0232fc4aba078426ac5ae39c19968ae8f58d0
-
Filesize
369KB
MD5234e628a62f822bd7b3546b91e79cab2
SHA110f48382495bdbfa3b30c15b91768817df13d828
SHA256d0415bfa061b36a6eb93fa2c78563448da8b63c91e0523086c7eb2714933ab99
SHA51251234fc3fb5199a3a86dcb7ca68d3c471f1b97897b1a9f90139cfff9846a6c6fd039a0c817e7611e0e59637746cc51045f6ce493cd6f2d4e144fec1c6a561456