Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2024 20:28

General

  • Target

    Solara/BootstrapperV1.18.exe

  • Size

    11.2MB

  • MD5

    7b7c9af10f65f91d0dfa704b47df1ab3

  • SHA1

    56001ae93e167310c4c93e626599b2189717ab46

  • SHA256

    06ec992467d151d23b2574124b6e7955087c3f32a684627acb8d505938bd1220

  • SHA512

    1280660abf697fd92610224cd09b3b0db6539acea64bc715dc2605fb17a2be706c4595183744d4cb5b5781cb5aef7d5a2ad89a5bfdceb67f27b89921cd367582

  • SSDEEP

    196608:gzzuYRi/rQvzqTYzbmP3zxfY1gD5MC7ZFWdaZSABYVNx6VyM70vEu:8uIizQrOemPDxg1qHs+EVNMyM708

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 16 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Solara\BootstrapperV1.18.exe
    "C:\Users\Admin\AppData\Local\Temp\Solara\BootstrapperV1.18.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Users\Admin\AppData\Local\Temp\Exela.exe
      "C:\Users\Admin\AppData\Local\Temp\Exela.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Users\Admin\AppData\Local\Temp\Exela.exe
        "C:\Users\Admin\AppData\Local\Temp\Exela.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2280
    • C:\Users\Admin\AppData\Local\Temp\BootstrapperV1.18.exe
      "C:\Users\Admin\AppData\Local\Temp\BootstrapperV1.18.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:868
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 868 -s 1064
        3⤵
        • Loads dropped DLL
        PID:1344

Network

  • flag-us
    DNS
    getsolara.dev
    BootstrapperV1.18.exe
    Remote address:
    8.8.8.8:53
    Request
    getsolara.dev
    IN A
    Response
    getsolara.dev
    IN A
    172.67.203.125
    getsolara.dev
    IN A
    104.21.93.27
  • 172.67.203.125:443
    getsolara.dev
    tls
    BootstrapperV1.18.exe
    399 B
    219 B
    6
    5
  • 172.67.203.125:443
    getsolara.dev
    tls
    BootstrapperV1.18.exe
    347 B
    219 B
    5
    5
  • 8.8.8.8:53
    getsolara.dev
    dns
    BootstrapperV1.18.exe
    59 B
    91 B
    1
    1

    DNS Request

    getsolara.dev

    DNS Response

    172.67.203.125
    104.21.93.27

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Exela.exe

    Filesize

    10.3MB

    MD5

    b2e9b15dcac736d8369b071a0d1e522a

    SHA1

    4806153d01b3eb85f71fd65732749344341196f4

    SHA256

    f055295249d55f006eb5a8d5394ab2f25afebaba2d5dacdd4e8f41a139477575

    SHA512

    f6738d420a97ca40435efee845147af7e2d32a37d85c7e6831bff1bde2bee6f0bbfe78eb39d65c75747066dccc2c3af2a8f8242179f8af52bb2e367318507433

  • \Users\Admin\AppData\Local\Temp\BootstrapperV1.18.exe

    Filesize

    971KB

    MD5

    2458f330cda521460cc077238ab01b25

    SHA1

    13312b4dffbdda09da2f1848cc713bbe781c5543

    SHA256

    dc67b264b90e29cf5cffed4453de4567398faa7f3bf18e69e84033c5b33ab05c

    SHA512

    8f027ebd96901f5a22aad34191244b1786dfb66843cbe05a8470d930415d85d86430267da09e7f1a69b8011b170d229e7fb25ecf0bf7d9209d7b910b2cbab48b

  • \Users\Admin\AppData\Local\Temp\_MEI22882\api-ms-win-core-file-l1-2-0.dll

    Filesize

    21KB

    MD5

    1c58526d681efe507deb8f1935c75487

    SHA1

    0e6d328faf3563f2aae029bc5f2272fb7a742672

    SHA256

    ef13dce8f71173315dfc64ab839b033ab19a968ee15230e9d4d2c9d558efeee2

    SHA512

    8edb9a0022f417648e2ece9e22c96e2727976332025c3e7d8f15bcf6d7d97e680d1bf008eb28e2e0bd57787dcbb71d38b2deb995b8edc35fa6852ab1d593f3d1

  • \Users\Admin\AppData\Local\Temp\_MEI22882\api-ms-win-core-file-l2-1-0.dll

    Filesize

    18KB

    MD5

    bfffa7117fd9b1622c66d949bac3f1d7

    SHA1

    402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2

    SHA256

    1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e

    SHA512

    b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

  • \Users\Admin\AppData\Local\Temp\_MEI22882\api-ms-win-core-localization-l1-2-0.dll

    Filesize

    21KB

    MD5

    724223109e49cb01d61d63a8be926b8f

    SHA1

    072a4d01e01dbbab7281d9bd3add76f9a3c8b23b

    SHA256

    4e975f618df01a492ae433dff0dd713774d47568e44c377ceef9e5b34aad1210

    SHA512

    19b0065b894dc66c30a602c9464f118e7f84d83010e74457d48e93aaca4422812b093b15247b24d5c398b42ef0319108700543d13f156067b169ccfb4d7b6b7c

  • \Users\Admin\AppData\Local\Temp\_MEI22882\api-ms-win-core-processthreads-l1-1-1.dll

    Filesize

    21KB

    MD5

    517eb9e2cb671ae49f99173d7f7ce43f

    SHA1

    4ccf38fed56166ddbf0b7efb4f5314c1f7d3b7ab

    SHA256

    57cc66bf0909c430364d35d92b64eb8b6a15dc201765403725fe323f39e8ac54

    SHA512

    492be2445b10f6bfe6c561c1fc6f5d1af6d1365b7449bc57a8f073b44ae49c88e66841f5c258b041547fcd33cbdcb4eb9dd3e24f0924db32720e51651e9286be

  • \Users\Admin\AppData\Local\Temp\_MEI22882\api-ms-win-core-timezone-l1-1-0.dll

    Filesize

    21KB

    MD5

    d12403ee11359259ba2b0706e5e5111c

    SHA1

    03cc7827a30fd1dee38665c0cc993b4b533ac138

    SHA256

    f60e1751a6ac41f08e46480bf8e6521b41e2e427803996b32bdc5e78e9560781

    SHA512

    9004f4e59835af57f02e8d9625814db56f0e4a98467041da6f1367ef32366ad96e0338d48fff7cc65839a24148e2d9989883bcddc329d9f4d27cae3f843117d0

  • \Users\Admin\AppData\Local\Temp\_MEI22882\python310.dll

    Filesize

    1.4MB

    MD5

    65015e7bf59f0af4f74f8462112e0ba2

    SHA1

    a3ce5d867b3f0ad81e7dad089db814d76400493d

    SHA256

    6f2c1c5ba0392319d41b8a4869053274cc728a05b3ee30dfc8bcf038a6c017fc

    SHA512

    cb0929d1e92ae6a12ad823b9faf7478b02b91e187300091a123d1c0e95e7fa7def54faa1fc2daacf4161e3922429ba8f711ae3220b01d3395fff8a7c28f96e6a

  • \Users\Admin\AppData\Local\Temp\_MEI22882\ucrtbase.dll

    Filesize

    992KB

    MD5

    0e0bac3d1dcc1833eae4e3e4cf83c4ef

    SHA1

    4189f4459c54e69c6d3155a82524bda7549a75a6

    SHA256

    8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

    SHA512

    a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

  • memory/868-13-0x0000000000070000-0x000000000016A000-memory.dmp

    Filesize

    1000KB

  • memory/868-11-0x000007FEF5883000-0x000007FEF5884000-memory.dmp

    Filesize

    4KB

  • memory/868-115-0x000007FEF5880000-0x000007FEF626C000-memory.dmp

    Filesize

    9.9MB

  • memory/868-124-0x000007FEF5883000-0x000007FEF5884000-memory.dmp

    Filesize

    4KB

  • memory/868-125-0x000007FEF5880000-0x000007FEF626C000-memory.dmp

    Filesize

    9.9MB

  • memory/2280-116-0x000007FEF1C00000-0x000007FEF2066000-memory.dmp

    Filesize

    4.4MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.