Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 21:36
Static task
static1
Behavioral task
behavioral1
Sample
Solara.exe
Resource
win7-20240708-en
General
-
Target
Solara.exe
-
Size
278KB
-
MD5
e6ee570e4a96ccd19ca97d0e7d85dd3c
-
SHA1
9faa35a4184f227fb116ce3d6e71b80d15a669e4
-
SHA256
21861808d8b7988c0216c2516f5d8f1830f919ebae247ceb35f92b93286ed426
-
SHA512
1f161a940d1a2e98ae3b50d04e61fbd5d60c32273eab4f6097c10e713f474e82d2de2e5aa5e60f28f27a62068d9fb2482cf57db4a0b2d8a0baa6a10912ebd4f1
-
SSDEEP
6144:J23PvJ4c0mmd4BdqmAqytMONJry+tl7O3lHGgs:JyPvJzhBdqii1NJrBtl76lHGgs
Malware Config
Extracted
lumma
https://caffegclasiqwp.shop/api
https://stamppreewntnq.shop/api
https://stagedchheiqwo.shop/api
https://millyscroqwp.shop/api
https://evoliutwoqm.shop/api
https://condedqpwqm.shop/api
https://traineiwnqo.shop/api
https://locatedblsoqp.shop/api
https://froytnewqowv.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Solara.exedescription pid process target process PID 2096 set thread context of 2824 2096 Solara.exe RegAsm.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2800 2824 WerFault.exe RegAsm.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Solara.exeRegAsm.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
Solara.exeRegAsm.exedescription pid process target process PID 2096 wrote to memory of 2824 2096 Solara.exe RegAsm.exe PID 2096 wrote to memory of 2824 2096 Solara.exe RegAsm.exe PID 2096 wrote to memory of 2824 2096 Solara.exe RegAsm.exe PID 2096 wrote to memory of 2824 2096 Solara.exe RegAsm.exe PID 2096 wrote to memory of 2824 2096 Solara.exe RegAsm.exe PID 2096 wrote to memory of 2824 2096 Solara.exe RegAsm.exe PID 2096 wrote to memory of 2824 2096 Solara.exe RegAsm.exe PID 2096 wrote to memory of 2824 2096 Solara.exe RegAsm.exe PID 2096 wrote to memory of 2824 2096 Solara.exe RegAsm.exe PID 2096 wrote to memory of 2824 2096 Solara.exe RegAsm.exe PID 2096 wrote to memory of 2824 2096 Solara.exe RegAsm.exe PID 2096 wrote to memory of 2824 2096 Solara.exe RegAsm.exe PID 2096 wrote to memory of 2824 2096 Solara.exe RegAsm.exe PID 2824 wrote to memory of 2800 2824 RegAsm.exe WerFault.exe PID 2824 wrote to memory of 2800 2824 RegAsm.exe WerFault.exe PID 2824 wrote to memory of 2800 2824 RegAsm.exe WerFault.exe PID 2824 wrote to memory of 2800 2824 RegAsm.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 2523⤵
- Program crash
PID:2800
-
-