Resubmissions

27-12-2024 09:03

241227-k1emsstnck 10

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-12-2024 09:03

General

  • Target

    SolaraExecutor.zip

  • Size

    5.6MB

  • MD5

    dd1ef271e374ee04c4b9dd1309d33c3a

  • SHA1

    7fec11e0c363f6e6886d024e6e606739cc173f61

  • SHA256

    f6c659e45fc58a9643cb25deab7e02c893b6b74ee5efab001606fcc7b167dd5e

  • SHA512

    646d50a0472c98d26e13d51da2be5c1e0148b7178fafcdca6791887c62af04be8b00bd02c5fa721491e9cbf9238ae1995786730829756676604b0b3007ddc33d

  • SSDEEP

    98304:lcEaulZ1vojDk3rsWHvE3eX6C7wRk5nEMGLT5lHRkdXbRCPptrFDh3ea:PlZ1v6D+CHuwclG5rkdVuX1ua

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\SolaraExecutor.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2304

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads