Analysis
-
max time kernel
4s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 17:08
Behavioral task
behavioral1
Sample
SolaraV2.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
SolaraV2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
�����e.pyc
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
�����e.pyc
Resource
win10v2004-20241007-en
General
-
Target
SolaraV2.exe
-
Size
17.7MB
-
MD5
260b6ec6ffbc775e27d9dc168f2c904e
-
SHA1
21d618b1704ec72e7c59a7796176aa6db1f6ca18
-
SHA256
988023b9ee83128ca6b4d5417992e1f4325759040bf98947726351b5a82fcf3a
-
SHA512
b4359aaf7dd30b9855cc20f647d00a7f3a2f74106af1defc916221c2947d05c3ce0a023f6f3c8b8dea668c0d6936212bc1b0989d63aa1233f7b1b93fbb7351bf
-
SSDEEP
393216:w+cKNkHwDKDHkO+2M8gCLrUgJZFwIHziK1piXLGVE4Ue0VJ5:HNkAKDEb2HJIgVDiXHi0L5
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
SolaraV2.exepid Process 2492 SolaraV2.exe -
Processes:
resource yara_rule behavioral1/files/0x0006000000016d6b-22.dat upx behavioral1/memory/2492-24-0x000007FEF5960000-0x000007FEF5FC3000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
SolaraV2.exedescription pid Process procid_target PID 2408 wrote to memory of 2492 2408 SolaraV2.exe 30 PID 2408 wrote to memory of 2492 2408 SolaraV2.exe 30 PID 2408 wrote to memory of 2492 2408 SolaraV2.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD56ef5d2f77064df6f2f47af7ee4d44f0f
SHA10003946454b107874aa31839d41edcda1c77b0af
SHA256ab7c640f044d2eb7f4f0a4dfe5e719dfd9e5fcd769943233f5cece436870e367
SHA5121662cc02635d63b8114b41d11ec30a2af4b0b60209196aac937c2a608588fee47c6e93163ea6bf958246c32759ac5c82a712ea3d690e796e2070ac0ff9104266