Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 00:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
SolaraBootStrapper.exe
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
SolaraBootStrapper.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
14 signatures
150 seconds
General
-
Target
SolaraBootStrapper.exe
-
Size
971KB
-
MD5
2458f330cda521460cc077238ab01b25
-
SHA1
13312b4dffbdda09da2f1848cc713bbe781c5543
-
SHA256
dc67b264b90e29cf5cffed4453de4567398faa7f3bf18e69e84033c5b33ab05c
-
SHA512
8f027ebd96901f5a22aad34191244b1786dfb66843cbe05a8470d930415d85d86430267da09e7f1a69b8011b170d229e7fb25ecf0bf7d9209d7b910b2cbab48b
-
SSDEEP
12288:SKAnSKWYWXlX12QmVdooRkajphRdP7E10TjHeApBH:vAVWbm0oRkajjRZ7Q0PHeS
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2500 SolaraBootStrapper.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2500 wrote to memory of 324 2500 SolaraBootStrapper.exe 31 PID 2500 wrote to memory of 324 2500 SolaraBootStrapper.exe 31 PID 2500 wrote to memory of 324 2500 SolaraBootStrapper.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\SolaraBootStrapper.exe"C:\Users\Admin\AppData\Local\Temp\SolaraBootStrapper.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2500 -s 10722⤵PID:324
-