Analysis
-
max time kernel
79s -
max time network
81s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
31-12-2024 21:26
Static task
static1
General
-
Target
Solara.zip
-
Size
2.8MB
-
MD5
0c5525f5bcd0c9610cd6ebf5923dfa41
-
SHA1
df7a895642b88cd99c6e3ddd30d5585778cd866e
-
SHA256
34055dd74bee23c85ea6d2d8649915ed976ee750989c64be9b7b97ff36621d83
-
SHA512
08d66ad5e41f215002e858585a4e3367e5f50102d370f811d0d8a67680ffb66495d40d54196c6e353dacdc87322b2bf38c3f13191d5d3b067b3c4d0deee316dc
-
SSDEEP
49152:nfEkBcsjT/TcQvOVnFjfy/AMWQ1XyGZGhLPJhJkwNmRTsfO+Ykf24/LIzKlbTOUA:hBcsjfFvWFTyZXhfGpJhJ3A5eQkf2UkH
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 2 IoCs
pid Process 4740 Solara.exe 3428 Solara.exe -
Loads dropped DLL 2 IoCs
pid Process 4740 Solara.exe 3428 Solara.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4740 set thread context of 3372 4740 Solara.exe 90 PID 3428 set thread context of 1496 3428 Solara.exe 98 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3312 4740 WerFault.exe 86 4404 3428 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2256 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeRestorePrivilege 2256 7zFM.exe Token: 35 2256 7zFM.exe Token: SeShutdownPrivilege 1732 wmplayer.exe Token: SeCreatePagefilePrivilege 1732 wmplayer.exe Token: SeShutdownPrivilege 3704 unregmp2.exe Token: SeCreatePagefilePrivilege 3704 unregmp2.exe Token: SeSecurityPrivilege 2256 7zFM.exe Token: SeSecurityPrivilege 2256 7zFM.exe Token: SeSecurityPrivilege 2256 7zFM.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2256 7zFM.exe 1732 wmplayer.exe 2256 7zFM.exe 2256 7zFM.exe 2256 7zFM.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1732 wrote to memory of 792 1732 wmplayer.exe 79 PID 1732 wrote to memory of 792 1732 wmplayer.exe 79 PID 1732 wrote to memory of 792 1732 wmplayer.exe 79 PID 792 wrote to memory of 3704 792 unregmp2.exe 80 PID 792 wrote to memory of 3704 792 unregmp2.exe 80 PID 4740 wrote to memory of 3372 4740 Solara.exe 90 PID 4740 wrote to memory of 3372 4740 Solara.exe 90 PID 4740 wrote to memory of 3372 4740 Solara.exe 90 PID 4740 wrote to memory of 3372 4740 Solara.exe 90 PID 4740 wrote to memory of 3372 4740 Solara.exe 90 PID 4740 wrote to memory of 3372 4740 Solara.exe 90 PID 4740 wrote to memory of 3372 4740 Solara.exe 90 PID 4740 wrote to memory of 3372 4740 Solara.exe 90 PID 4740 wrote to memory of 3372 4740 Solara.exe 90 PID 4740 wrote to memory of 3372 4740 Solara.exe 90 PID 4740 wrote to memory of 3372 4740 Solara.exe 90 PID 4740 wrote to memory of 3372 4740 Solara.exe 90 PID 4740 wrote to memory of 3372 4740 Solara.exe 90 PID 3428 wrote to memory of 1496 3428 Solara.exe 98 PID 3428 wrote to memory of 1496 3428 Solara.exe 98 PID 3428 wrote to memory of 1496 3428 Solara.exe 98 PID 3428 wrote to memory of 1496 3428 Solara.exe 98 PID 3428 wrote to memory of 1496 3428 Solara.exe 98 PID 3428 wrote to memory of 1496 3428 Solara.exe 98 PID 3428 wrote to memory of 1496 3428 Solara.exe 98 PID 3428 wrote to memory of 1496 3428 Solara.exe 98 PID 3428 wrote to memory of 1496 3428 Solara.exe 98 PID 3428 wrote to memory of 1496 3428 Solara.exe 98 PID 3428 wrote to memory of 1496 3428 Solara.exe 98 PID 3428 wrote to memory of 1496 3428 Solara.exe 98 PID 3428 wrote to memory of 1496 3428 Solara.exe 98
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Solara.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2256
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:224
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1576
-
C:\Users\Admin\Desktop\SOLARA\Solara.exe"C:\Users\Admin\Desktop\SOLARA\Solara.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 10762⤵
- Program crash
PID:3312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4740 -ip 47401⤵PID:3136
-
C:\Users\Admin\Desktop\SOLARA\Solara.exe"C:\Users\Admin\Desktop\SOLARA\Solara.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 10482⤵
- Program crash
PID:4404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3428 -ip 34281⤵PID:1168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5066f6e5acfff197d12b550ef7d452d41
SHA1aaa8cfa5a56519594490d069f31a42a15ca515a2
SHA256cac3a8354c7766b4ce0900bf4d8097bf372ec405a6af4bba63a6d92132932a30
SHA51221c3985bdc883b7c0fcdfb660a577eb03870943d9e812a24726158b6c06cc36b00425fdeafddcb099fddd1488173280563f7241c9589e69d04d1eb1b5daa786b
-
Filesize
1024KB
MD53baf18f17e5040fcdd4657f973cafb16
SHA19668e5193fc28e18893fd4cc6ca50baadbc40411
SHA25668c3c80a254c37dba7d64bab2965ff53b4b05655be97432168a17909db8e5c2a
SHA5123a94ed8383f7998d9a806ed709d111a1a609df37258e69df7e66927ac878a69dce593ff38ae05b2574261fcab97a1be5acc3d00c4ec3f047967dd52e10266fb8
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5cea15dec8e0763d8b8e2ff05f8172d27
SHA1afe34afd4bfbfc1aa4275b44814d027a9ac1f201
SHA256084217b395c3a5c0b9d8a818ea0374ee1d151c427e20e16fcf31851f4181d3e7
SHA512e81d5bbb3d5a34b82dd27d04f313c3f0de87d5c175663d56394c791d10e657d37cbeb48b443a1f76f03f6ac026f179fe98407692506d5805ba5dca7e514dbfeb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize3KB
MD5fa244beb8c43635c1fd9252c281c135b
SHA18fd23ff8d0edc8c981aff80439cc71237e251b76
SHA2566abf28b50bfae7c7af276dc34adc003f67d40f83ede6849149242cceb298ab8c
SHA5120eb877ffce2cc3104929b85fff401c1fde745fb0fa6e6762e50982bb0d06e1762f297a9c60bed0881b56615d66ca7e4ba7635dd1d50dabb8e437cccf70b535f2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize1KB
MD5eed965c8f65044d040ff962a37520d06
SHA1efab92aa279e4fc00c8852ab8d5968add7fd95c5
SHA256913fc1cdc2515f9616b4c29efae67504b233b08960ecaa9916800775c0da8b5c
SHA5125489f2f00a925236bb4128bbfd7417f6d5fea39f7049ad7d6042fd01a5dae36f045b0d5396a045ab89fd0d695540d7ec5bab1a529a8760b6e0fd47f0295d6029
-
Filesize
428KB
MD59322e3bdd1e2f0595164f0da0b61c268
SHA1ab93fd6515fb0aa78b61477c8acb59ac2adf9438
SHA25693464247ecced5e02ed5d06e643116744602924321510ffaef159f99d7cb5b03
SHA512e5180992c1d8ba7b3359eb12432aac611246b87ad3dc56d8c204d0a8fb7308f306fcd4946ed93dc225d18fd218f1cdb643db74aec4e52274f5f43cc662e5fde4
-
Filesize
687KB
MD57ec34df0a7309de040f3d8377c8b9624
SHA16d94948fcd2473ecc1cc9566f7bbf0904dcfdd17
SHA2565b22523ae17968cddb6c6c0c580beec2c79d17e7f263370fb09a8970faee1176
SHA512dbafd9e62c18962f4e4b2e2ac2d3551327f30dac3f23653dfd4e548025d694a02c3ee4b752ffb76ebf4110e06647e7a4506b3307778db6f4d676d797981c9524