Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 08:15
Behavioral task
behavioral1
Sample
b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe
Resource
win10v2004-20241007-en
General
-
Target
b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe
-
Size
59KB
-
MD5
13f8ea6f22766a2a3fab7161647b1d00
-
SHA1
af696ffbb96d8dbb29077ab11c4d2f91f73b618a
-
SHA256
b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c
-
SHA512
c0903a9880f4560797fa3dcac362990969529811acdbebf78108ca53a636065d3f1915a73e2a6caa7fc059b2b5561d972b4aa62fdb83d1fe8c4116b2294cd9eb
-
SSDEEP
1536:zDT94NmEa2JFvnkbAqjniRfi6N+yOUtvJ7:vTvEa2JhkbAq+xOcvJ7
Malware Config
Extracted
xworm
127.0.0.1:9935
additional-ll.gl.at.ply.gg:9935
-
Install_directory
%AppData%
-
install_file
solara.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1324-1-0x0000000001240000-0x0000000001256000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2544 powershell.exe 2776 powershell.exe 1992 powershell.exe 2064 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\solara.lnk b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\solara.lnk b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\solara = "C:\\Users\\Admin\\AppData\\Roaming\\solara.exe" b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1992 powershell.exe 2064 powershell.exe 2544 powershell.exe 2776 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1324 b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe Token: SeDebugPrivilege 1992 powershell.exe Token: SeDebugPrivilege 2064 powershell.exe Token: SeDebugPrivilege 2544 powershell.exe Token: SeDebugPrivilege 2776 powershell.exe Token: SeDebugPrivilege 1324 b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1324 wrote to memory of 1992 1324 b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe 31 PID 1324 wrote to memory of 1992 1324 b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe 31 PID 1324 wrote to memory of 1992 1324 b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe 31 PID 1324 wrote to memory of 2064 1324 b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe 33 PID 1324 wrote to memory of 2064 1324 b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe 33 PID 1324 wrote to memory of 2064 1324 b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe 33 PID 1324 wrote to memory of 2544 1324 b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe 35 PID 1324 wrote to memory of 2544 1324 b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe 35 PID 1324 wrote to memory of 2544 1324 b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe 35 PID 1324 wrote to memory of 2776 1324 b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe 37 PID 1324 wrote to memory of 2776 1324 b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe 37 PID 1324 wrote to memory of 2776 1324 b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe"C:\Users\Admin\AppData\Local\Temp\b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'b5e520b8f9aa8fba0e106406628802faf9fbc927bf2a09aba6270afe3b0a3c4c.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\solara.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'solara.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5ec6cb741a96f9f98e7daf025b2e70027
SHA1bbb0480f2889ba64c6137b331331635eff6f768b
SHA2564c1c053cbbed1a02c4c57681daa85a25402a596d9d15be79559ab004c9044c86
SHA512afef9529da45f8d6812e51ab87d4732dccc139a3097e2fe5c3bb21e63d23d2ef83e09dff6b9a8bcb1c5df761219f42f3d525ece7a51d7e0f58591c29bb562e3f