Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 20:44
Behavioral task
behavioral1
Sample
SolaraBootStrapper-main/Bootstrapper.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SolaraBootStrapper-main/Bootstrapper.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
SolaraBootStrapper-main/SolaraBootstrapper.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
SolaraBootStrapper-main/SolaraBootstrapper.exe
Resource
win10v2004-20241007-en
General
-
Target
SolaraBootStrapper-main/SolaraBootstrapper.exe
-
Size
766KB
-
MD5
d994d58e87f0deda637e325d0a54a347
-
SHA1
8b72ea95b3569ba1ca12cb7ead4edd6e5694614d
-
SHA256
6607cc8e27767479f97d55d7f4e8073589836bd5bf832ae951f3b565ab0541e3
-
SHA512
cc9959f52a5c55644b85a24d203137ad43408014ea63bf453bd2b36b7a1ad9f937f5e2cae45f6c6a5c732a5928d9edf14f00e768a5584e43ca1c70c7cef94ca9
-
SSDEEP
12288:GMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9i8Oj:GnsJ39LyjbJkQFMhmC+6GD9i
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation SolaraBootstrapper.exe -
Executes dropped EXE 3 IoCs
pid Process 2200 ._cache_SolaraBootstrapper.exe 232 Synaptics.exe 3600 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" SolaraBootstrapper.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 10 raw.githubusercontent.com 16 raw.githubusercontent.com 9 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SolaraBootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_SolaraBootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ SolaraBootstrapper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2796 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2200 ._cache_SolaraBootstrapper.exe 2200 ._cache_SolaraBootstrapper.exe 3600 ._cache_Synaptics.exe 3600 ._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2200 ._cache_SolaraBootstrapper.exe Token: SeDebugPrivilege 3600 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2796 EXCEL.EXE 2796 EXCEL.EXE 2796 EXCEL.EXE 2796 EXCEL.EXE 2796 EXCEL.EXE 2796 EXCEL.EXE 2796 EXCEL.EXE 2796 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3972 wrote to memory of 2200 3972 SolaraBootstrapper.exe 82 PID 3972 wrote to memory of 2200 3972 SolaraBootstrapper.exe 82 PID 3972 wrote to memory of 2200 3972 SolaraBootstrapper.exe 82 PID 3972 wrote to memory of 232 3972 SolaraBootstrapper.exe 84 PID 3972 wrote to memory of 232 3972 SolaraBootstrapper.exe 84 PID 3972 wrote to memory of 232 3972 SolaraBootstrapper.exe 84 PID 232 wrote to memory of 3600 232 Synaptics.exe 85 PID 232 wrote to memory of 3600 232 Synaptics.exe 85 PID 232 wrote to memory of 3600 232 Synaptics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\SolaraBootStrapper-main\SolaraBootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\SolaraBootStrapper-main\SolaraBootstrapper.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\SolaraBootStrapper-main\._cache_SolaraBootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\SolaraBootStrapper-main\._cache_SolaraBootstrapper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\SolaraBootStrapper-main\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\SolaraBootStrapper-main\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
766KB
MD5d994d58e87f0deda637e325d0a54a347
SHA18b72ea95b3569ba1ca12cb7ead4edd6e5694614d
SHA2566607cc8e27767479f97d55d7f4e8073589836bd5bf832ae951f3b565ab0541e3
SHA512cc9959f52a5c55644b85a24d203137ad43408014ea63bf453bd2b36b7a1ad9f937f5e2cae45f6c6a5c732a5928d9edf14f00e768a5584e43ca1c70c7cef94ca9
-
Filesize
21KB
MD5094e52c14e8efbd1d6a028088bd494b5
SHA186b4de5b55e9b2be12677c19e011e8bdbce91bf5
SHA2567b002373c1d4212656796ff21c2e1d27b93adf3b8e7a55cb7b9a433f7f0597d5
SHA512a6acf4a266ef3c3cc5e4b3e908520e1c133e47c0f74d66b2931c2a13aeb40904b1caa7209e26c9da6719da3d1675605da29fe6db641b37c9c81cf08d303c6f6d
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
13KB
MD56557bd5240397f026e675afb78544a26
SHA1839e683bf68703d373b6eac246f19386bb181713
SHA256a7fecfc225dfdd4e14dcd4d1b4ba1b9f8e4d1984f1cdd8cda3a9987e5d53c239
SHA512f2399d34898a4c0c201372d2dd084ee66a66a1c3eae949e568421fe7edada697468ef81f4fcab2afd61eaf97bcb98d6ade2d97295e2f674e93116d142e892e97