Overview
overview
9Static
static
7Solara.Dir.zip
windows11-21h2-x64
7Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...e.json
windows11-21h2-x64
3Solara.Dir...x.html
windows11-21h2-x64
7Solara.Dir...lua.js
windows11-21h2-x64
3Solara.Dir...ain.js
windows11-21h2-x64
3Solara.Dir...nls.js
windows11-21h2-x64
3Solara.Dir...der.js
windows11-21h2-x64
3Solara.Dir...on.dll
windows11-21h2-x64
1Solara.Dir...er.dll
windows11-21h2-x64
1Solara.Dir/Wpf.Ui.dll
windows11-21h2-x64
1Solara.Dir...16.dll
windows11-21h2-x64
9Solara.Dir...16.exe
windows11-21h2-x64
9Solara.Dir...rl.dll
windows11-21h2-x64
1Solara.Dir...40.dll
windows11-21h2-x64
1Solara.Dir/zlib1.dll
windows11-21h2-x64
1Analysis
-
max time kernel
91s -
max time network
128s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/11/2024, 09:50
Behavioral task
behavioral1
Sample
Solara.Dir.zip
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Solara.Dir/Monaco/fileaccess/node_modules/accepts/package.json
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Solara.Dir/Monaco/fileaccess/node_modules/array-flatten/package.json
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
Solara.Dir/Monaco/fileaccess/node_modules/body-parser/package.json
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
Solara.Dir/Monaco/fileaccess/node_modules/bytes/package.json
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
Solara.Dir/Monaco/fileaccess/node_modules/call-bind/package.json
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
Solara.Dir/Monaco/fileaccess/node_modules/content-disposition/package.json
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
Solara.Dir/Monaco/fileaccess/node_modules/content-type/package.json
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
Solara.Dir/Monaco/fileaccess/node_modules/cookie-signature/package.json
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
Solara.Dir/Monaco/fileaccess/node_modules/cookie/package.json
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
Solara.Dir/Monaco/fileaccess/node_modules/debug/package.json
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
Solara.Dir/Monaco/fileaccess/node_modules/define-data-property/package.json
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
Solara.Dir/Monaco/fileaccess/node_modules/depd/package.json
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
Solara.Dir/Monaco/fileaccess/node_modules/destroy/package.json
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
Solara.Dir/Monaco/fileaccess/node_modules/ee-first/package.json
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
Solara.Dir/Monaco/fileaccess/node_modules/encodeurl/package.json
Resource
win11-20241023-en
Behavioral task
behavioral17
Sample
Solara.Dir/Monaco/fileaccess/node_modules/es-define-property/package.json
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
Solara.Dir/Monaco/fileaccess/node_modules/es-errors/package.json
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
Solara.Dir/Monaco/fileaccess/node_modules/escape-html/package.json
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
Solara.Dir/Monaco/index.html
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
Solara.Dir/Monaco/vs/basic-languages/lua/lua.js
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
Solara.Dir/Monaco/vs/editor/editor.main.js
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
Solara.Dir/Monaco/vs/editor/editor.main.nls.js
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
Solara.Dir/Monaco/vs/loader.js
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
Solara.Dir/Newtonsoft.Json.dll
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
Solara.Dir/WebView2Loader.dll
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
Solara.Dir/Wpf.Ui.dll
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
Solara.Dir/cd57e4c171d6e8f5ea8b8f824a6a7316.dll
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
Solara.Dir/cd57e4c171d6e8f5ea8b8f824a6a7316.exe
Resource
win11-20241023-en
Behavioral task
behavioral30
Sample
Solara.Dir/libcurl.dll
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
Solara.Dir/vcruntime140.dll
Resource
win11-20241007-en
Behavioral task
behavioral32
Sample
Solara.Dir/zlib1.dll
Resource
win11-20241007-en
General
-
Target
Solara.Dir/cd57e4c171d6e8f5ea8b8f824a6a7316.exe
-
Size
90KB
-
MD5
d84e7f79f4f0d7074802d2d6e6f3579e
-
SHA1
494937256229ef022ff05855c3d410ac3e7df721
-
SHA256
dcfc2b4fa3185df415855ec54395d9c36612f68100d046d8c69659da01f7d227
-
SHA512
ed7b0ac098c8184b611b83158eaa86619001e74dba079d398b34ac694ce404ba133c2baf43051840132d6a3a089a375550072543b9fab2549d57320d13502260
-
SSDEEP
1536:gea4Ta4b9I3BbbHVlnOXrPBdfeISRAOl801AbcsqD95wSxdRf3:gea4Ta4JMbb1lnOXrPXe7Yhq5Zf
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cd57e4c171d6e8f5ea8b8f824a6a7316.exe -
A potential corporate email address has been identified in the URL: [email protected]
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cd57e4c171d6e8f5ea8b8f824a6a7316.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cd57e4c171d6e8f5ea8b8f824a6a7316.exe -
resource yara_rule behavioral29/memory/1624-11-0x0000000180000000-0x0000000180B57000-memory.dmp themida behavioral29/memory/1624-12-0x0000000180000000-0x0000000180B57000-memory.dmp themida behavioral29/memory/1624-14-0x0000000180000000-0x0000000180B57000-memory.dmp themida behavioral29/memory/1624-15-0x0000000180000000-0x0000000180B57000-memory.dmp themida behavioral29/memory/1624-247-0x0000000180000000-0x0000000180B57000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cd57e4c171d6e8f5ea8b8f824a6a7316.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 1 raw.githubusercontent.com 3 raw.githubusercontent.com 4 raw.githubusercontent.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1624 cd57e4c171d6e8f5ea8b8f824a6a7316.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 124 msedgewebview2.exe 1500 msedgewebview2.exe 2904 msedgewebview2.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1624 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 1624 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 1624 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 5044 msedgewebview2.exe 5044 msedgewebview2.exe 1624 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 1624 cd57e4c171d6e8f5ea8b8f824a6a7316.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 1216 msedgewebview2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1624 cd57e4c171d6e8f5ea8b8f824a6a7316.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1216 msedgewebview2.exe 1216 msedgewebview2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1216 1624 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 80 PID 1624 wrote to memory of 1216 1624 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 80 PID 1216 wrote to memory of 3088 1216 msedgewebview2.exe 81 PID 1216 wrote to memory of 3088 1216 msedgewebview2.exe 81 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 124 1216 msedgewebview2.exe 83 PID 1216 wrote to memory of 5044 1216 msedgewebview2.exe 84 PID 1216 wrote to memory of 5044 1216 msedgewebview2.exe 84 PID 1216 wrote to memory of 1500 1216 msedgewebview2.exe 86 PID 1216 wrote to memory of 1500 1216 msedgewebview2.exe 86 PID 1216 wrote to memory of 1500 1216 msedgewebview2.exe 86 PID 1216 wrote to memory of 1500 1216 msedgewebview2.exe 86 PID 1216 wrote to memory of 1500 1216 msedgewebview2.exe 86 PID 1216 wrote to memory of 1500 1216 msedgewebview2.exe 86 PID 1216 wrote to memory of 1500 1216 msedgewebview2.exe 86 PID 1216 wrote to memory of 1500 1216 msedgewebview2.exe 86 PID 1216 wrote to memory of 1500 1216 msedgewebview2.exe 86 PID 1216 wrote to memory of 1500 1216 msedgewebview2.exe 86 PID 1216 wrote to memory of 1500 1216 msedgewebview2.exe 86 PID 1216 wrote to memory of 1500 1216 msedgewebview2.exe 86 PID 1216 wrote to memory of 1500 1216 msedgewebview2.exe 86 PID 1216 wrote to memory of 1500 1216 msedgewebview2.exe 86 PID 1216 wrote to memory of 1500 1216 msedgewebview2.exe 86 PID 1216 wrote to memory of 1500 1216 msedgewebview2.exe 86 PID 1216 wrote to memory of 1500 1216 msedgewebview2.exe 86 PID 1216 wrote to memory of 1500 1216 msedgewebview2.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe"C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --mojo-named-platform-channel-pipe=1624.2804.23600316081507348012⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0xe0,0x1b4,0x7ffa9fcf3cb8,0x7ffa9fcf3cc8,0x7ffa9fcf3cd83⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1904,5221587549249185098,5790883350038815937,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:23⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:124
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1904,5221587549249185098,5790883350038815937,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2156 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1904,5221587549249185098,5790883350038815937,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2148 /prefetch:83⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1500
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1904,5221587549249185098,5790883350038815937,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:13⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2904
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\2373fe94-d6cc-4966-b6da-fdd997513bba.tmp
Filesize8KB
MD50622abf687c61efeaa439a3831fb4435
SHA1ffd6763df4cc289da97bfb1160d517fec80b8b57
SHA2568cd56791eef6f5e2f3acec23519a3fa178b9300f57a8002a7448f976af2d0da5
SHA51231a90387a556a7ac4606c63f2a809c5dbf33ede800f811ea6306d3a84409d029a682e1482a98c553b1c2f68818c18c86dd3c6006d38923ed8c1369a4d571e35f
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad\settings.dat
Filesize152B
MD5c98cc03bc6382fe1ab7570625f59ac4e
SHA1a3dc76e84cca61c608ca968d11b310d7c15225cd
SHA256779c76307d39ef030a64e79361f11740cc3042e4a9fa0af7b9567080c79b7dd8
SHA5122eb96c866017327cfa811c261c3ed561e12cf2a9ad422d18c740a5336c3a2ebe7e7f1955f2d001e6a502293efc454e4b507f347d668bd03f7d640578bfdc52cd
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad\settings.dat
Filesize152B
MD5eaea5cfb7b2c9f44509096a706a3e824
SHA1a08de7dade482acd79e9cfa98e480fb1477c54d9
SHA256fed0eaccd8928189cdc9c7ebe131b478db95cccf95d951002d210011f9a05a00
SHA512b62c97201f3229518ef2fbc9c8cf7984eb7925e5f647f9012f18ea6909d70e01db352267e54e5ff1bffc4cf3b2fe46d1cae4132397b98374cabb3c1c80028acf
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad\throttle_store.dat
Filesize20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\GPUCache\data_0
Filesize8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\GPUCache\data_3
Filesize8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\Sync Data\LevelDB\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\GrShaderCache\GPUCache\data_2
Filesize8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\ShaderCache\GPUCache\data_1
Filesize264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58