Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 20:21
Static task
static1
Behavioral task
behavioral1
Sample
Solara_Bootstrap.exe
Resource
win7-20240903-en
General
-
Target
Solara_Bootstrap.exe
-
Size
701.0MB
-
MD5
a4dea35bbfedaf715edf928c850f9062
-
SHA1
9d6fdbd7d96663b54c14182654a4742b11728743
-
SHA256
e5700337351ecb04be3ac19ab2875a2f810a42a11bc1c3a6cdfb6a20c021c346
-
SHA512
6cce303a11105bbab1a903549a6a830612b2a642b00d790065143eef5b3e7a494369a7bb330d6cd1a3988e00573d8785aad1a19dff798379b01dd7a8883d4297
-
SSDEEP
768:t45Ckp/PlWm8WHU6QVySGPoD81umA2SXCY5t2tzskOshCPwiE:/kpcml0fioQfGQ5sCht
Malware Config
Extracted
xworm
-
install_file
System Volume Information Prefetch.exe
-
pastebin_url
https://pastebin.com/raw/ZpWEzbQr
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000012117-8.dat family_xworm behavioral1/memory/2868-9-0x0000000001350000-0x0000000001366000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 1 IoCs
pid Process 2868 grabber.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 9 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2196 Solara_Bootstrap.exe 2196 Solara_Bootstrap.exe 2196 Solara_Bootstrap.exe 2868 grabber.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2196 Solara_Bootstrap.exe Token: SeDebugPrivilege 2868 grabber.exe Token: SeDebugPrivilege 2868 grabber.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2868 grabber.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2868 2196 Solara_Bootstrap.exe 31 PID 2196 wrote to memory of 2868 2196 Solara_Bootstrap.exe 31 PID 2196 wrote to memory of 2868 2196 Solara_Bootstrap.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Solara_Bootstrap.exe"C:\Users\Admin\AppData\Local\Temp\Solara_Bootstrap.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\grabber.exe"C:\Users\Admin\AppData\Local\Temp\grabber.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD55d905f7756242de1e3da56be2eebe5bc
SHA1381d6fa5479211cfb12a9139b6532a99a9be9271
SHA256c930a13333fa6a399179bc6cae01ee2702bfae5dfa65656e7989409b54b1dedd
SHA512a3623368b5aeda117b9e81561bc24d81503295d9f01c13e2204983178c790c5cc4c98bd1bb3ed28fcdf92dc63bdf933a642169d866ec9515ebdecbe625ec7366