Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 16:25
Static task
static1
Behavioral task
behavioral1
Sample
SolaraExecutor.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SolaraExecutor.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
vstdlib_s.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
vstdlib_s.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
vstdlib_s64.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
vstdlib_s64.dll
Resource
win10v2004-20241007-en
General
-
Target
SolaraExecutor.exe
-
Size
690KB
-
MD5
f2fa9c21d9543d8ccbdf62d5a93e2389
-
SHA1
844101977d9d3e1fb2b8e3bf61f99a77a1cf0a3c
-
SHA256
024f81f9366285841b3ebd223c0d734978d71532ffb42d32d1ced685f9e33d4f
-
SHA512
39370f67a108d7e51cd7bb97e34c13e76c2560dbdd726f93bacf6332c0f1e7473c17b7129ff6ce3259f242f850e8a1d29cb9847dacc0c26e058827c7ce17b30b
-
SSDEEP
12288:tsFQwb0b2PL59QiwwEI9PO7LQahtplxiKxKrPrzA/tvS2oQ/ZiXCzz33ZrgB+TNr:KFQHyPbECPJcDlxiKxKns/1vL/Zi
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://ingreem-eilish.biz/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Loads dropped DLL 1 IoCs
pid Process 1520 SolaraExecutor.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1520 set thread context of 4808 1520 SolaraExecutor.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 1608 1520 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SolaraExecutor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1520 wrote to memory of 4808 1520 SolaraExecutor.exe 83 PID 1520 wrote to memory of 4808 1520 SolaraExecutor.exe 83 PID 1520 wrote to memory of 4808 1520 SolaraExecutor.exe 83 PID 1520 wrote to memory of 4808 1520 SolaraExecutor.exe 83 PID 1520 wrote to memory of 4808 1520 SolaraExecutor.exe 83 PID 1520 wrote to memory of 4808 1520 SolaraExecutor.exe 83 PID 1520 wrote to memory of 4808 1520 SolaraExecutor.exe 83 PID 1520 wrote to memory of 4808 1520 SolaraExecutor.exe 83 PID 1520 wrote to memory of 4808 1520 SolaraExecutor.exe 83 PID 1520 wrote to memory of 4808 1520 SolaraExecutor.exe 83 PID 1520 wrote to memory of 4808 1520 SolaraExecutor.exe 83 PID 1520 wrote to memory of 4808 1520 SolaraExecutor.exe 83 PID 1520 wrote to memory of 4808 1520 SolaraExecutor.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\SolaraExecutor.exe"C:\Users\Admin\AppData\Local\Temp\SolaraExecutor.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 10282⤵
- Program crash
PID:1608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1520 -ip 15201⤵PID:4192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD587ddb8dce8de1152608b3ba3c30c421a
SHA11cc599ffd91de94a93b578bb1ac56efe0776f5e5
SHA25679d1305a1832db5ec20a7d7b08e6cda6377884828e74a548287a496097b3c434
SHA51257af66e39687efce94615cfcb59b934104faf07d62b119eec29465e1142c4110d1f956dddce800180e6eb070709d7657b545109ae96b0eb74e6dd0e40058243c