Analysis
-
max time kernel
116s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 22:01
Behavioral task
behavioral1
Sample
Solara3.0s.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Solara3.0s.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
Solara3.0s.exe
-
Size
469KB
-
MD5
1f532632777673e522d5c17cd4aed0c0
-
SHA1
707964883b3168810be0f977e54c7db09fed3668
-
SHA256
e63b5f8bfd7ef1d06b57fef57e2704592b003a653d132844abf776e2e0752181
-
SHA512
f5772edfe378b1f283d449c515dc8d36609a017745b8395968681efc1de7e0a3b9fc0c69b193b15c39ea44b9f1163355861fa5000e2fb1ab3734dc20250576ce
-
SSDEEP
12288:umnk7iLJbpIpiRL6I2WhSKQ9ZsfZQS2n9:WiLJbpI7I2WhQqZ729
Malware Config
Extracted
remcos
RemoteHost
accessories-retrieve.gl.at.ply.gg:13970
accessories-retrieve.gl.at.ply.gg:9999
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Solara2.exe
-
copy_folder
Health
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%WinDir%\System32
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
filer32
-
keylog_path
%WinDir%\System32
-
mouse_option
false
-
mutex
Rmc-X97XC1
-
screenshot_crypt
true
-
screenshot_flag
true
-
screenshot_folder
Screenshots
-
screenshot_path
%WinDir%\System32
-
screenshot_time
10
-
startup_value
WindowsHealth
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\WindowsHealth = "\"C:\\Windows\\SysWOW64\\Health\\Solara2.exe\"" Solara2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Solara3.0s.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\WindowsHealth = "\"C:\\Windows\\SysWOW64\\Health\\Solara2.exe\"" Solara3.0s.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Solara2.exe -
Deletes itself 1 IoCs
pid Process 2120 WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 2372 Solara2.exe -
Loads dropped DLL 2 IoCs
pid Process 2304 cmd.exe 2304 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsHealth = "\"C:\\Windows\\SysWOW64\\Health\\Solara2.exe\"" Solara3.0s.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsHealth = "\"C:\\Windows\\SysWOW64\\Health\\Solara2.exe\"" Solara3.0s.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsHealth = "\"C:\\Windows\\SysWOW64\\Health\\Solara2.exe\"" Solara2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsHealth = "\"C:\\Windows\\SysWOW64\\Health\\Solara2.exe\"" Solara2.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Screenshots\time_20240917_220201.dat iexplore.exe File opened for modification C:\Windows\SysWOW64\filer32\logs.dat iexplore.exe File created C:\Windows\SysWOW64\filer32\logs.dat iexplore.exe File created C:\Windows\SysWOW64\Health\Solara2.exe Solara3.0s.exe File opened for modification C:\Windows\SysWOW64\Health\Solara2.exe Solara3.0s.exe File opened for modification C:\Windows\SysWOW64\Health Solara3.0s.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2372 set thread context of 2812 2372 Solara2.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara3.0s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry key 1 TTPs 3 IoCs
pid Process 2504 reg.exe 1660 reg.exe 1324 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2812 iexplore.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2372 Solara2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2812 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2812 iexplore.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1840 wrote to memory of 3060 1840 Solara3.0s.exe 29 PID 1840 wrote to memory of 3060 1840 Solara3.0s.exe 29 PID 1840 wrote to memory of 3060 1840 Solara3.0s.exe 29 PID 1840 wrote to memory of 3060 1840 Solara3.0s.exe 29 PID 3060 wrote to memory of 2504 3060 cmd.exe 31 PID 3060 wrote to memory of 2504 3060 cmd.exe 31 PID 3060 wrote to memory of 2504 3060 cmd.exe 31 PID 3060 wrote to memory of 2504 3060 cmd.exe 31 PID 1840 wrote to memory of 2120 1840 Solara3.0s.exe 32 PID 1840 wrote to memory of 2120 1840 Solara3.0s.exe 32 PID 1840 wrote to memory of 2120 1840 Solara3.0s.exe 32 PID 1840 wrote to memory of 2120 1840 Solara3.0s.exe 32 PID 2120 wrote to memory of 2304 2120 WScript.exe 33 PID 2120 wrote to memory of 2304 2120 WScript.exe 33 PID 2120 wrote to memory of 2304 2120 WScript.exe 33 PID 2120 wrote to memory of 2304 2120 WScript.exe 33 PID 2304 wrote to memory of 2372 2304 cmd.exe 35 PID 2304 wrote to memory of 2372 2304 cmd.exe 35 PID 2304 wrote to memory of 2372 2304 cmd.exe 35 PID 2304 wrote to memory of 2372 2304 cmd.exe 35 PID 2372 wrote to memory of 2808 2372 Solara2.exe 36 PID 2372 wrote to memory of 2808 2372 Solara2.exe 36 PID 2372 wrote to memory of 2808 2372 Solara2.exe 36 PID 2372 wrote to memory of 2808 2372 Solara2.exe 36 PID 2372 wrote to memory of 2812 2372 Solara2.exe 37 PID 2372 wrote to memory of 2812 2372 Solara2.exe 37 PID 2372 wrote to memory of 2812 2372 Solara2.exe 37 PID 2372 wrote to memory of 2812 2372 Solara2.exe 37 PID 2372 wrote to memory of 2812 2372 Solara2.exe 37 PID 2812 wrote to memory of 2876 2812 iexplore.exe 39 PID 2812 wrote to memory of 2876 2812 iexplore.exe 39 PID 2812 wrote to memory of 2876 2812 iexplore.exe 39 PID 2812 wrote to memory of 2876 2812 iexplore.exe 39 PID 2808 wrote to memory of 1660 2808 cmd.exe 41 PID 2808 wrote to memory of 1660 2808 cmd.exe 41 PID 2808 wrote to memory of 1660 2808 cmd.exe 41 PID 2808 wrote to memory of 1660 2808 cmd.exe 41 PID 2876 wrote to memory of 1324 2876 cmd.exe 42 PID 2876 wrote to memory of 1324 2876 cmd.exe 42 PID 2876 wrote to memory of 1324 2876 cmd.exe 42 PID 2876 wrote to memory of 1324 2876 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\Solara3.0s.exe"C:\Users\Admin\AppData\Local\Temp\Solara3.0s.exe"1⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2504
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Windows\SysWOW64\Health\Solara2.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\Health\Solara2.exeC:\Windows\SysWOW64\Health\Solara2.exe4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1660
-
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f7⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1324
-
-
-
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2276
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:328
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
530B
MD59d64cc6c95afcee920c8622263d8fb81
SHA194704b00e785f117cba04b460d8b095ec2438c50
SHA256bbaa62e42e70a9b6634434666cb2eb6a8440e7c14ef8ccba3a38da6df55ce991
SHA5126c779cb6189aafa69d9f7a8d00b90c871b68fb0e10ca867f06d0afb6ccfbef0f4fc7c8ea07ee8523209751dc5cfa865fb7d6a7dcd3a27d473193615b57a7fde8
-
Filesize
184B
MD54de946bce00a33d8aa36f60b5607a8cb
SHA1502cb49c189ba60063a9f5be15fd8500ab5100a7
SHA256e7a5837430a5a02cdd2408aea018ac9387a0d000e17bcded469f189523a06432
SHA5126689a34b34ff4ba28d999db7800bb25ff8f7d980f2704cd6273a301de182e8e775252246670a85585985e5b113fffc4121393896303bb4a7fdf58ae890105a75
-
Filesize
469KB
MD51f532632777673e522d5c17cd4aed0c0
SHA1707964883b3168810be0f977e54c7db09fed3668
SHA256e63b5f8bfd7ef1d06b57fef57e2704592b003a653d132844abf776e2e0752181
SHA512f5772edfe378b1f283d449c515dc8d36609a017745b8395968681efc1de7e0a3b9fc0c69b193b15c39ea44b9f1163355861fa5000e2fb1ab3734dc20250576ce