Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/12/2024, 13:07
Behavioral task
behavioral1
Sample
Solara.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Solara.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
Solara.exe
Resource
win11-20241007-en
General
-
Target
Solara.exe
-
Size
43KB
-
MD5
a5c594f36fccf6f04552fd2ef8cca82a
-
SHA1
654fd3bbe89442840010a7cbeccb2346adb0c2d1
-
SHA256
b3448f4ae8060638bdad47bc3000afd0d5980fe66e09b6b64ae9da9134dcd9b5
-
SHA512
a66c8ee6212235006b969148a37bc47b4715ef276bd632581c80a39b28f565f5c12235c315ba78e1e251d7c51126af0bd6e2ea32b087616edf595665538a142e
-
SSDEEP
768:OAoPDwgJOSpuqldThkwh77RXk6mJomGSvFFRPa9Kb6POChgOObKY:OVDwgJOSp7ZvZu19dFA9Kb6POCSHGY
Malware Config
Extracted
xworm
5.0
someone-proportion.gl.at.ply.gg:16444
pLZANQ75KjAVVEWN
-
Install_directory
%ProgramData%
-
install_file
System.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral3/memory/5256-1-0x00000000006B0000-0x00000000006C2000-memory.dmp family_xworm behavioral3/files/0x002000000002aac5-55.dat family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3344 powershell.exe 4092 powershell.exe 1416 powershell.exe 6124 powershell.exe 780 powershell.exe 788 powershell.exe 6064 powershell.exe 2060 powershell.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk Solara.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk Solara.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk System.exe -
Executes dropped EXE 3 IoCs
pid Process 4556 System.exe 920 System.exe 2128 System.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "C:\\ProgramData\\System.exe" Solara.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "C:\\ProgramData\\System.exe" System.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4224 schtasks.exe 5628 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 780 powershell.exe 780 powershell.exe 788 powershell.exe 788 powershell.exe 6064 powershell.exe 6064 powershell.exe 2060 powershell.exe 2060 powershell.exe 5256 Solara.exe 3344 powershell.exe 3344 powershell.exe 4092 powershell.exe 4092 powershell.exe 1416 powershell.exe 1416 powershell.exe 6124 powershell.exe 6124 powershell.exe 2128 System.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 5256 Solara.exe Token: SeDebugPrivilege 780 powershell.exe Token: SeDebugPrivilege 788 powershell.exe Token: SeDebugPrivilege 6064 powershell.exe Token: SeDebugPrivilege 2060 powershell.exe Token: SeDebugPrivilege 5256 Solara.exe Token: SeDebugPrivilege 4556 System.exe Token: SeDebugPrivilege 920 System.exe Token: SeDebugPrivilege 2128 System.exe Token: SeDebugPrivilege 3344 powershell.exe Token: SeDebugPrivilege 4092 powershell.exe Token: SeDebugPrivilege 1416 powershell.exe Token: SeDebugPrivilege 6124 powershell.exe Token: SeDebugPrivilege 2128 System.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5256 Solara.exe 2128 System.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 5256 wrote to memory of 780 5256 Solara.exe 77 PID 5256 wrote to memory of 780 5256 Solara.exe 77 PID 5256 wrote to memory of 788 5256 Solara.exe 79 PID 5256 wrote to memory of 788 5256 Solara.exe 79 PID 5256 wrote to memory of 6064 5256 Solara.exe 81 PID 5256 wrote to memory of 6064 5256 Solara.exe 81 PID 5256 wrote to memory of 2060 5256 Solara.exe 83 PID 5256 wrote to memory of 2060 5256 Solara.exe 83 PID 5256 wrote to memory of 4224 5256 Solara.exe 85 PID 5256 wrote to memory of 4224 5256 Solara.exe 85 PID 2128 wrote to memory of 3344 2128 System.exe 91 PID 2128 wrote to memory of 3344 2128 System.exe 91 PID 2128 wrote to memory of 4092 2128 System.exe 93 PID 2128 wrote to memory of 4092 2128 System.exe 93 PID 2128 wrote to memory of 1416 2128 System.exe 95 PID 2128 wrote to memory of 1416 2128 System.exe 95 PID 2128 wrote to memory of 6124 2128 System.exe 97 PID 2128 wrote to memory of 6124 2128 System.exe 97 PID 2128 wrote to memory of 5628 2128 System.exe 99 PID 2128 wrote to memory of 5628 2128 System.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5256 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Solara.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Solara.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\System.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "System" /tr "C:\ProgramData\System.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4224
-
-
C:\ProgramData\System.exeC:\ProgramData\System.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
C:\ProgramData\System.exeC:\ProgramData\System.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:920
-
C:\ProgramData\System.exeC:\ProgramData\System.exe1⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\System.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3344
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\System.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6124
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "System" /tr "C:\ProgramData\System.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5628
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5a5c594f36fccf6f04552fd2ef8cca82a
SHA1654fd3bbe89442840010a7cbeccb2346adb0c2d1
SHA256b3448f4ae8060638bdad47bc3000afd0d5980fe66e09b6b64ae9da9134dcd9b5
SHA512a66c8ee6212235006b969148a37bc47b4715ef276bd632581c80a39b28f565f5c12235c315ba78e1e251d7c51126af0bd6e2ea32b087616edf595665538a142e
-
Filesize
654B
MD52cbbb74b7da1f720b48ed31085cbd5b8
SHA179caa9a3ea8abe1b9c4326c3633da64a5f724964
SHA256e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3
SHA512ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
944B
MD5b0a85f07903eaad4aace8865ff28679f
SHA1caa147464cf2e31bf9b482c3ba3c5c71951566d1
SHA256c85c7915e0bcc6cc3d7dd2f6b9d9e4f9a3cf0ccefa043b1c500facac8428bfd5
SHA5127a650a74a049e71b748f60614723de2b9d2385a0f404606bcb22ae807e22a74c53cf672df9e7a23605dfff37865443a5899eafea323134a818eb59c96e0f94bd
-
Filesize
944B
MD51a9fa92a4f2e2ec9e244d43a6a4f8fb9
SHA19910190edfaccece1dfcc1d92e357772f5dae8f7
SHA2560ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888
SHA5125d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64
-
Filesize
944B
MD54093e5ab3812960039eba1a814c2ffb0
SHA1b5e4a98a80be72fccd3cc910e93113d2febef298
SHA256c0794e2b7036ce5612446a8b15e0c8387773bbc921f63cf8849f8a1f4ef3878c
SHA512f3555b45aa1a1dd5214716dc81a05905c4ecd5a3e1276d35e08c65623ab1d14d469b3b576a5d9638264c1222d73889d2cc1ee43fb579d9ca3fcddd9f557cac7b
-
Filesize
944B
MD54914eb0b2ff51bfa48484b5cc8454218
SHA16a7c3e36ce53b42497884d4c4a3bda438dd4374b
SHA2567e510fc9344ef239ab1ab650dc95bb25fd44e2efba8b8246a3ac17880ee8b69e
SHA51283ab35f622f4a5040ca5cb615a30f83bb0741449225f1fd1815b6923e225c28241d0c02d34f83f743349a5e57f84ca1c6f44016797a93d5985be41d11be79500
-
Filesize
944B
MD5050567a067ffea4eb40fe2eefebdc1ee
SHA16e1fb2c7a7976e0724c532449e97722787a00fec
SHA2563952d5b543e5cb0cb84014f4ad9f5f1b7166f592d28640cbc3d914d0e6f41d2e
SHA512341ad71ef7e850b10e229666312e4bca87a0ed9fe25ba4b0ab65661d5a0efa855db0592153106da07134d8fc2c6c0e44709bf38183c9a574a1fa543189971259
-
Filesize
944B
MD56d84f220217a01836884dc544f29ff06
SHA1a8798d636cd85c05d7d48e30a5b604715bded7a0
SHA256ddfcf871b2e9aca8cac3aaa5d72d7b19e8e785dcdacc81b5329146798a91c7a5
SHA512664cb6141d01343b5816b2bfec35a6424eede2f5f633bb318833e0e47a06b0c3aac6a16064baa2ece47a51c9625a234791c8ceba8435c025dcfb0ba77f2fb15e
-
Filesize
944B
MD50b59f3fa12628f63b5713c4833570d7f
SHA1badcf18f1fdc94b1eadf63f27c09ad092c4a6ccb
SHA2562332e52881483559d787508831c00192c4f0a4fedc232b0309e566a30247af1d
SHA51201724fd9f7a20ec5ff3d2686593d5d95069135834e9b156ced36985067fb36e7b3ec2a0018e41fa125ad5d1e42c80be9e148632a9b655f2d41c1400a4320abe7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
665B
MD50638eebe00460c08f59aafe75e20f54a
SHA1c158521c2058c656540f63d434cebafc361e3c52
SHA256ba032ed5626d322ec16eabf59757becd98f23503b54802130ebb6633eab30644
SHA512df4f0fad0304aa7ab74f77790c0f16e4f735de7efeb3055ffffd40a2e4bdfae7307e6bfedffc9a3840c75c30472f45f32a5772faa53aad07f934ea2504f738dd