Analysis
-
max time kernel
10s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-11-2024 21:23
Static task
static1
General
-
Target
Solara.exe
-
Size
278KB
-
MD5
e6ee570e4a96ccd19ca97d0e7d85dd3c
-
SHA1
9faa35a4184f227fb116ce3d6e71b80d15a669e4
-
SHA256
21861808d8b7988c0216c2516f5d8f1830f919ebae247ceb35f92b93286ed426
-
SHA512
1f161a940d1a2e98ae3b50d04e61fbd5d60c32273eab4f6097c10e713f474e82d2de2e5aa5e60f28f27a62068d9fb2482cf57db4a0b2d8a0baa6a10912ebd4f1
-
SSDEEP
6144:J23PvJ4c0mmd4BdqmAqytMONJry+tl7O3lHGgs:JyPvJzhBdqii1NJrBtl76lHGgs
Malware Config
Extracted
lumma
https://caffegclasiqwp.shop/api
https://stamppreewntnq.shop/api
https://stagedchheiqwo.shop/api
https://millyscroqwp.shop/api
https://evoliutwoqm.shop/api
https://condedqpwqm.shop/api
https://traineiwnqo.shop/api
https://locatedblsoqp.shop/api
https://froytnewqowv.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Solara.exedescription pid process target process PID 4820 set thread context of 2392 4820 Solara.exe RegAsm.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4680 2392 WerFault.exe RegAsm.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Solara.exeRegAsm.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Solara.exedescription pid process target process PID 4820 wrote to memory of 2392 4820 Solara.exe RegAsm.exe PID 4820 wrote to memory of 2392 4820 Solara.exe RegAsm.exe PID 4820 wrote to memory of 2392 4820 Solara.exe RegAsm.exe PID 4820 wrote to memory of 2392 4820 Solara.exe RegAsm.exe PID 4820 wrote to memory of 2392 4820 Solara.exe RegAsm.exe PID 4820 wrote to memory of 2392 4820 Solara.exe RegAsm.exe PID 4820 wrote to memory of 2392 4820 Solara.exe RegAsm.exe PID 4820 wrote to memory of 2392 4820 Solara.exe RegAsm.exe PID 4820 wrote to memory of 2392 4820 Solara.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 4163⤵
- Program crash
PID:4680
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2392 -ip 23921⤵PID:336