Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 06:00
Behavioral task
behavioral1
Sample
SolaraBootstrapperV1.1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SolaraBootstrapperV1.1.exe
Resource
win10v2004-20241007-en
General
-
Target
SolaraBootstrapperV1.1.exe
-
Size
75.4MB
-
MD5
d80507f67a518eca7d96c5ef4bb72461
-
SHA1
668790131a3c0d877bd91adee4b048ab40478219
-
SHA256
07037656adb04ece9b447b5842d7f7139a1428cd7f3b06cd4aabb3a0a8fb9d83
-
SHA512
0459ec3c4f5e81deca7ae7694ef116caf03d5b6fdfe492a3476089c09694827e58241e0c9ec9fa58973d4fce9c4ee1b5b6ab7a34f76034deca75bdc7cf6bac89
-
SSDEEP
1572864:JvhQ6li9WF7vDSk8IpG7V+VPhq6+fE7WTmlP8iY4MHHLeqPNLtDzoZ2d3:Jvh109gPSkB05aw6+9Tm5XMHVLtIO3
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2092 SolaraBootstrapperV1.1.exe -
resource yara_rule behavioral1/files/0x0003000000020ab5-1260.dat upx behavioral1/memory/2092-1262-0x000007FEF5D30000-0x000007FEF6196000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2092 1908 SolaraBootstrapperV1.1.exe 31 PID 1908 wrote to memory of 2092 1908 SolaraBootstrapperV1.1.exe 31 PID 1908 wrote to memory of 2092 1908 SolaraBootstrapperV1.1.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapperV1.1.exe"C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapperV1.1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapperV1.1.exe"C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapperV1.1.exe"2⤵
- Loads dropped DLL
PID:2092
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD53f782cf7874b03c1d20ed90d370f4329
SHA108a2b4a21092321de1dcad1bb2afb660b0fa7749
SHA2562a382aff16533054e6de7d13b837a24d97ea2957805730cc7b08b75e369f58d6
SHA512950c039eb23ed64ca8b2f0a9284ebdb6f0efe71dde5bbf0187357a66c3ab0823418edca34811650270eea967f0e541eece90132f9959d5ba5984405630a99857