Analysis
-
max time kernel
75s -
max time network
67s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-11-2024 12:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://excutor-solara.yzz.me/
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
http://excutor-solara.yzz.me/
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
http://excutor-solara.yzz.me/
Resource
win11-20241007-en
General
-
Target
http://excutor-solara.yzz.me/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exeidentity_helper.exepid process 5080 msedge.exe 5080 msedge.exe 3540 msedge.exe 3540 msedge.exe 1304 msedge.exe 1304 msedge.exe 1956 identity_helper.exe 1956 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
msedge.exepid process 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3540 wrote to memory of 4380 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 4380 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2528 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 5080 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 5080 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2036 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2036 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2036 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2036 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2036 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2036 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2036 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2036 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2036 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2036 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2036 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2036 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2036 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2036 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2036 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2036 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2036 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2036 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2036 3540 msedge.exe msedge.exe PID 3540 wrote to memory of 2036 3540 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://excutor-solara.yzz.me/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd0c4e3cb8,0x7ffd0c4e3cc8,0x7ffd0c4e3cd82⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,9052809860072837917,3708321098414953693,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1872 /prefetch:22⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1936,9052809860072837917,3708321098414953693,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1936,9052809860072837917,3708321098414953693,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:82⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,9052809860072837917,3708321098414953693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,9052809860072837917,3708321098414953693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,9052809860072837917,3708321098414953693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,9052809860072837917,3708321098414953693,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2120 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,9052809860072837917,3708321098414953693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,9052809860072837917,3708321098414953693,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1936,9052809860072837917,3708321098414953693,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,9052809860072837917,3708321098414953693,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e9a2c784e6d797d91d4b8612e14d51bd
SHA125e2b07c396ee82e4404af09424f747fc05f04c2
SHA25618ddbb93c981d8006071f9d26924ce3357cad212cbb65f48812d4a474c197ce6
SHA512fc35688ae3cd448ed6b2069d39ce1219612c54f5bb0dd7b707c9e6f39450fe9fb1338cf5bd0b82a45207fac2fbab1e0eae77e5c9e6488371390eab45f76a5df1
-
Filesize
152B
MD51fc959921446fa3ab5813f75ca4d0235
SHA10aeef3ba7ba2aa1f725fca09432d384b06995e2a
SHA2561b1e89d3b2f3da84cc8494d07cf0babc472c426ccb1c4ae13398243360c9d02c
SHA512899d1e1b0feece25ac97527daddcaaeb069cb428532477849eba43a627502c590261f2c26fef31e4e20efd3d7eb0815336a784c4d2888e05afcf5477af872b06
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5f6da5549a5163ff4a3dfa1aaf7d697e1
SHA1f48031cb5c45235a365628a21823dff71cd5e85d
SHA2568c84f71e3401c7d22b15882e453195c195848e56cd39f22a6bab1f756e30a99d
SHA512754e974be1a94cc42f6501b34495f44c5fc051da8cefef90a907a10a9aa1aba1e4f9e30aac35d975bcd2ec934c26c05b92b9c650c3708c9d15f9546a4db94e64
-
Filesize
520B
MD56c992e54e4c7a18c391c17b6b2d8d8bd
SHA1a13008175f8c0a3b6667cb403ceb47a68ff2ad78
SHA25656814258633fdbcb9d847030d993755d7f10d94f1a68f20d4f2ede57d0cd5bf7
SHA512839805d9351f12708f658e13003ca8f706363163ea4fdac8d1a9ad0a598e229e18728e1afaf2e8bc65dbd4e4aad8076d52ab0d84e905dfaa31c2ac7ae798cbbd
-
Filesize
5KB
MD5fcdcd8f7a2c9a754f0f950e556bb5e1e
SHA14e1861b3d66a6f30f87afbc312ab6495a1356dcd
SHA256fa5c637513ecdcfde3f6e2e6acffb3b498af073a8da5b16783722ca292a4f1de
SHA512f5430b0495fe5d7b6d91763d7befe905df9c23818578888c641d6444ec4902c1131f0e772a4f494e9bebe2df58995bca0ca8a86e9908f55c3dc776204ee290ef
-
Filesize
6KB
MD500c6c4663dd1896a09ef0e40d3f382a1
SHA1a62a55e7b9c54feaaa70cfd2e9ae42fa000608a6
SHA256cc0b71964b52e8558e3ee04937858488a77515994295c90c784c84d5bb8fa9ba
SHA512822528bc90afa37b0796ba5b02ad68d18b2960e4d10ba4cd7e8d2a45083753cd5df742b6053869aab9d8b5eba79688df2ec211ad552a01268f182590c4e9d574
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5366f5499b4d13b639fe04c3b3fe80f19
SHA1f15c7f4e2d42c225b9c500e5c9a268f3693fe6f7
SHA256f55816c7a86a787addf9c9752ee1cd8d31a6572b53cfdf1e34bc01ef394a330d
SHA51203d6133c48941cce3962e529ec7e1973af255fadf83c29dc76ab7f4e4fb5e8856c02337be39d793ccca64a40ec25d41f1613bd8888ef972857973199147249a0
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e