Overview
overview
9Static
static
7Solara.Dir.zip
windows11-21h2-x64
7Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...x.html
windows11-21h2-x64
7Solara.Dir...lua.js
windows11-21h2-x64
3Solara.Dir...ain.js
windows11-21h2-x64
3Solara.Dir...nls.js
windows11-21h2-x64
3Solara.Dir...der.js
windows11-21h2-x64
3Solara.Dir...on.dll
windows11-21h2-x64
1Solara.Dir...er.dll
windows11-21h2-x64
1Solara.Dir/Wpf.Ui.dll
windows11-21h2-x64
1Solara.Dir...16.dll
windows11-21h2-x64
9Solara.Dir...16.exe
windows11-21h2-x64
9Solara.Dir...rl.dll
windows11-21h2-x64
1Solara.Dir...40.dll
windows11-21h2-x64
1Solara.Dir/zlib1.dll
windows11-21h2-x64
1Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/11/2024, 09:50
Behavioral task
behavioral1
Sample
Solara.Dir.zip
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Solara.Dir/Monaco/fileaccess/node_modules/accepts/package.json
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Solara.Dir/Monaco/fileaccess/node_modules/array-flatten/package.json
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
Solara.Dir/Monaco/fileaccess/node_modules/body-parser/package.json
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
Solara.Dir/Monaco/fileaccess/node_modules/bytes/package.json
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
Solara.Dir/Monaco/fileaccess/node_modules/call-bind/package.json
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
Solara.Dir/Monaco/fileaccess/node_modules/content-disposition/package.json
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
Solara.Dir/Monaco/fileaccess/node_modules/content-type/package.json
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
Solara.Dir/Monaco/fileaccess/node_modules/cookie-signature/package.json
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
Solara.Dir/Monaco/fileaccess/node_modules/cookie/package.json
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
Solara.Dir/Monaco/fileaccess/node_modules/debug/package.json
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
Solara.Dir/Monaco/fileaccess/node_modules/define-data-property/package.json
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
Solara.Dir/Monaco/fileaccess/node_modules/depd/package.json
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
Solara.Dir/Monaco/fileaccess/node_modules/destroy/package.json
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
Solara.Dir/Monaco/fileaccess/node_modules/ee-first/package.json
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
Solara.Dir/Monaco/fileaccess/node_modules/encodeurl/package.json
Resource
win11-20241023-en
Behavioral task
behavioral17
Sample
Solara.Dir/Monaco/fileaccess/node_modules/es-define-property/package.json
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
Solara.Dir/Monaco/fileaccess/node_modules/es-errors/package.json
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
Solara.Dir/Monaco/fileaccess/node_modules/escape-html/package.json
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
Solara.Dir/Monaco/index.html
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
Solara.Dir/Monaco/vs/basic-languages/lua/lua.js
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
Solara.Dir/Monaco/vs/editor/editor.main.js
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
Solara.Dir/Monaco/vs/editor/editor.main.nls.js
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
Solara.Dir/Monaco/vs/loader.js
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
Solara.Dir/Newtonsoft.Json.dll
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
Solara.Dir/WebView2Loader.dll
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
Solara.Dir/Wpf.Ui.dll
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
Solara.Dir/cd57e4c171d6e8f5ea8b8f824a6a7316.dll
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
Solara.Dir/cd57e4c171d6e8f5ea8b8f824a6a7316.exe
Resource
win11-20241023-en
Behavioral task
behavioral30
Sample
Solara.Dir/libcurl.dll
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
Solara.Dir/vcruntime140.dll
Resource
win11-20241007-en
Behavioral task
behavioral32
Sample
Solara.Dir/zlib1.dll
Resource
win11-20241007-en
General
-
Target
Solara.Dir.zip
-
Size
8.1MB
-
MD5
3e43dcff99c57b4cb9d97e24e25db99d
-
SHA1
5faf0c31e64e5e4f12dbef19b691afe34ca3db91
-
SHA256
11a49e73950aa79c817fed5d9697a1dd54ec0a2a49d6912e242723d9362e93b1
-
SHA512
ffa859d0614a77fd2d77091e2454b1ede57b9754ac49e6dabde10274db089c51ccd9e6106258c6a462ed5250450c0cf0ba858f4466c7a559364018a949e2a901
-
SSDEEP
196608:ejClNpI6dq3CGRJaeDL6wNvTdspttcLcTBk1F/2:LIIq3CuMeD2yT+Ttyb2
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3352 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 4460 cd57e4c171d6e8f5ea8b8f824a6a7316.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1412 7zFM.exe 1412 7zFM.exe 1412 7zFM.exe 1412 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1412 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1412 7zFM.exe Token: 35 1412 7zFM.exe Token: SeSecurityPrivilege 1412 7zFM.exe Token: SeSecurityPrivilege 1412 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1412 7zFM.exe 1412 7zFM.exe 1412 7zFM.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1412 wrote to memory of 3352 1412 7zFM.exe 77 PID 1412 wrote to memory of 3352 1412 7zFM.exe 77 PID 1412 wrote to memory of 4460 1412 7zFM.exe 83 PID 1412 wrote to memory of 4460 1412 7zFM.exe 83
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Solara.Dir.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\7zO485ABE88\cd57e4c171d6e8f5ea8b8f824a6a7316.exe"C:\Users\Admin\AppData\Local\Temp\7zO485ABE88\cd57e4c171d6e8f5ea8b8f824a6a7316.exe"2⤵
- Executes dropped EXE
PID:3352
-
-
C:\Users\Admin\AppData\Local\Temp\7zO485C6DF8\cd57e4c171d6e8f5ea8b8f824a6a7316.exe"C:\Users\Admin\AppData\Local\Temp\7zO485C6DF8\cd57e4c171d6e8f5ea8b8f824a6a7316.exe"2⤵
- Executes dropped EXE
PID:4460
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5d84e7f79f4f0d7074802d2d6e6f3579e
SHA1494937256229ef022ff05855c3d410ac3e7df721
SHA256dcfc2b4fa3185df415855ec54395d9c36612f68100d046d8c69659da01f7d227
SHA512ed7b0ac098c8184b611b83158eaa86619001e74dba079d398b34ac694ce404ba133c2baf43051840132d6a3a089a375550072543b9fab2549d57320d13502260