Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
178s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2025, 17:08
Static task
static1
General
-
Target
SOLARA_ROBLOX.html
-
Size
8KB
-
MD5
3adc548fd20f4f7a7a504e96e64ce5c1
-
SHA1
fe17430f9849d7f95666bd2bcc8991371ec06bfc
-
SHA256
5eb5b908e559e2974fccbf6c59984a7e9341688cef7fa9463ef7ada3d357c779
-
SHA512
d08a83fdf93daf5245fd257d83e7eab30dab81f337f746c0b03a983698a10030aee0218acbe3de0852d89aab0ed79a4515e42b91e30a070754116a70aeb34f26
-
SSDEEP
192:PN2x2BxukTqfEWnclA0EzrKKRXV1P4N4gPiayCN:AxIuKqDKKRHPkggN
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE 19 IoCs
pid Process 4972 Solara.exe 4768 Solara.exe 4256 Solara.exe 2972 Solara.exe 1472 Solara.exe 3544 Solara.exe 2524 Solara.exe 956 Solara.exe 3748 Solara.exe 544 Solara.exe 1580 Solara.exe 4192 Solara.exe 768 Solara.exe 4712 Solara.exe 4452 Solara.exe 3536 Solara.exe 5076 Solara.exe 1080 Solara.exe 1016 Solara.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 43 mediafire.com 44 mediafire.com 42 mediafire.com -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 4972 set thread context of 4768 4972 Solara.exe 127 PID 4256 set thread context of 1472 4256 Solara.exe 132 PID 3544 set thread context of 2524 3544 Solara.exe 136 PID 956 set thread context of 544 956 Solara.exe 142 PID 3748 set thread context of 1580 3748 Solara.exe 144 PID 4192 set thread context of 768 4192 Solara.exe 147 PID 4712 set thread context of 3536 4712 Solara.exe 152 PID 5076 set thread context of 1016 5076 Solara.exe 157 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133804841100557401" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2556 chrome.exe 2556 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe Token: SeShutdownPrivilege 2556 chrome.exe Token: SeCreatePagefilePrivilege 2556 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe 2556 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2556 wrote to memory of 3728 2556 chrome.exe 83 PID 2556 wrote to memory of 3728 2556 chrome.exe 83 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 5108 2556 chrome.exe 84 PID 2556 wrote to memory of 3160 2556 chrome.exe 85 PID 2556 wrote to memory of 3160 2556 chrome.exe 85 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86 PID 2556 wrote to memory of 2028 2556 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\SOLARA_ROBLOX.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8bb53cc40,0x7ff8bb53cc4c,0x7ff8bb53cc582⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1232,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1900 /prefetch:22⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1836,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1968 /prefetch:32⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2240 /prefetch:82⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:3840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3100,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4480,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4640 /prefetch:82⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4920,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5348,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5548,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:3444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4960,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5040,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3284,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5340,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5776 /prefetch:82⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5268,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3096
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:904
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:384
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2392
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\solarafdh3wy\" -spe -an -ai#7zMap27604:86:7zEvent91141⤵PID:1504
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\" -spe -an -ai#7zMap23309:110:7zEvent79901⤵PID:3132
-
C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4972 -
C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4768
-
-
C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4256 -
C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"2⤵
- Executes dropped EXE
PID:2972
-
-
C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1472
-
-
C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3544 -
C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2524
-
-
C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:956 -
C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:544
-
-
C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3748 -
C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1580
-
-
C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4192 -
C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:768
-
-
C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4712 -
C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"2⤵
- Executes dropped EXE
PID:4452
-
-
C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3536
-
-
C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5076 -
C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"2⤵
- Executes dropped EXE
PID:1080
-
-
C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD51fd21a5228803360e7498b21377bd349
SHA1c028d9a423b995bb2f9d9b56ef09e5a4f9535b38
SHA256920270c469d0fdd572881597d30bae6f24faec32c8a1e7e689186947ac7958d3
SHA512c2324e1b0a32c3d4abdac5ee1c2e663d1e49c24c17f0b5a5dac56cc867f67d2665f29148de2773f2e048292b189d136876b557ae9837517f612155633cbb09b2
-
Filesize
649B
MD52140264a76638a4a61fc08863ecf0462
SHA187862d1418088f4b7243f19957534ad62b3ffdde
SHA25634bad21e4e97af3a633fdd715bae94c3a6090bc06a1270cfe2b372192bcfcc11
SHA5126a2f8d4b61c076ce7bbbe4618ab02004caf6cfae6f46aa06420b683fa5950d74daec5c978e8b339b7598ccf9b62a76317beaa218e261d6aae8b80a34a6cfea40
-
Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
Filesize
1KB
MD52fd3b1b8832cfa6471f3665196ff610a
SHA1d1bf17af38c110514acd814379d7ed3cc5653125
SHA25663babb24828b52f8fe0a5d8f4027584035d3a374dd6fcd69e26ce90a956544b4
SHA512de0f8f3b09af554e099037f4cc774d34035bb65eb8e0d08d279cf3a08ce5a6951bf47afa3695f75ee097adbff3ee84295bb9d9bd9885149d3fb1954c4f6dd343
-
Filesize
1KB
MD50c2737fe69fe50e8a4d01b04be405a5e
SHA1b9b2d9b7473b00656df6dc884341c971744439e6
SHA256eddd69c3bd738a3a94364811907d627c29b116c9edd6ac131c94ede4e49ca9a6
SHA512e8e855a78a3f9459c3277073e51ee0ea095e1fc60bf7e5d0dafa60dbf2432e419a61a6557c0e431fb70e449469eff0cbe74504257db877c7113f508df62c21b7
-
Filesize
1KB
MD5a149d22af2fa930fdea213cfaaf9ed98
SHA13e6268c79b2daa9272a4dbd98085c14b6c1ec2bc
SHA256b6714c5c176ccca4eda271464150d694c93eee17d5f2aed1384f1d3095c19c4c
SHA512addde54fb0674e4732215585ce8c553daeaf337e29f48e12f05cf9895b33e7025936aa86c1a30141aed67ce115095b8d2ec33bbe76e471a516eeebf837a0af85
-
Filesize
14KB
MD52610b84ea72ff6197f71b72c3d39d58e
SHA1695a6d1541c34116bfb9dda8f5aad806e34a6ffc
SHA2568b2b63a1e0e18febb33a912291089e741a219bf463bb5967d34979c526039f04
SHA5121d495fb121391b4e4dc8fba7bf16f684581893efb672c086215854cb3756073306a76c72c2178f58e09c4c47fda7725b33c69e31e956641e71d29407f46c4d33
-
Filesize
9KB
MD511aba277ad576a75970e2886a20697a2
SHA1ade9430276e517bb47d4dcea2c8664614cb792c0
SHA256f85845d442fab1e80d070a5f146ad061b2dc64ab57944684f0407533dd76f69d
SHA512036044d8600543a2bbcd3a4ac0e2ad1289c758f8658beb1e17caf3d19d26e8459166ef96cd153b9d81635e9f22b150f711c8ddb4cba91a591d326868e454b1e2
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD51a59162bfc8a4e5844bc1d1e68ffd4aa
SHA1535a7aac64b905742b0a2bb78b59bedd54a824ac
SHA25624c78720ec6f97627525274126dda790d777582c95e77d0c094648421f5a03af
SHA5121d347a3c2a56e8510dc263d44bca97b734eab017abe2fb634319471f7f0c1ed3c43054621ffde36c3773a7bd3021777d2b0c3f216d60687ff2bdcb810a43e764
-
Filesize
1KB
MD5584755ef82d3446c57fa0ae63aed3bda
SHA125912760f9e691455d3a0ec441222747b9d638b6
SHA25663b3d2aafc72daa2444d69be96bb94f093df6c5117f5a9134d5f6f3b30debd62
SHA512970b6e348644a2491603055deda9741f997ddb3add89f8879f076cc67b5d13b1a4d00fb76ba4dc48652495a9d75d1ed5e3ffa20af9262567230ffd030c2fc9ac
-
Filesize
11KB
MD5eef291298880518d2f3e315592abfa21
SHA1d0ffd5d74869a9e1f2ccfa57f5b2d70647e387f4
SHA256e980c39205c7c0811e773fd200e6f8d59254e876ac58941d2d1ba309c2538e59
SHA5124bf64888cb169f3ebcacae57b9eb6bb7245fd9e550874e6d9f6bea72fde0f894525b8a18b82142cbfe71574d277523b889db68bc144e318fcc5336532d90ab45
-
Filesize
10KB
MD5f7a78a4778d2515aa86364e4e14cf972
SHA10bf485d0374abdca6f657f81a8b9aa25adbe7114
SHA2563b0e6090ee894f6acd79429a34370c2e85157d5434a1d50fe4a99fa1f534df10
SHA5123e442d97e0daf2bd4197a9d4942f432a02825432e3c26722cf9508a9777547aa8d00f87c87ccdd475e664e73739a511c165df341356a5015d7d314fbed8bc6ac
-
Filesize
11KB
MD503b75f7fa9d9d6d8f3676a815b098f3b
SHA1630e08135ba2d6e41cd5d0a88628f43daa9aa9ce
SHA25603ab61a7c70625acf4c0971815c7467f3de7f5099df0613191de65a0f40016c4
SHA512585725fccfee3fa03cf47d66b6e5e86a6c6cc94ceeaa3e0498bac17ccf79c833af00de90f60f7d1193c4b2e95f1e0cd2d45f83add62f037e84ae80b0bf2caa77
-
Filesize
11KB
MD5440b1cbbde6b986062cbcef5637599d5
SHA1e26d66b1eed699bb3ba58f48931ebd70895de166
SHA2567eec5ef67559a607db9d26a5e6741d5868a777183ab38b9c73dcd1af936111c6
SHA51237edd9f199429b9268e528a6a14df8bc8311bdfd056da3163bcbbcf4331fe629c603365e7228f3c3e3ffd070102b2f915b12d25b05c929ca8a3c25d4b031a5d0
-
Filesize
11KB
MD5ec57fdd0a4f53700ec05205d053b4f57
SHA15e03819a9d3e23142510334aec26ced0bccdc33e
SHA2562a2d828e575d2425aa27c97a5aae211bf14b3ee9f03415bdc3494c7734761eff
SHA512503ecfbddc803a2f03c61493ba64c73627121379618251220f52fe4da0ef45f010ed6306f0f14506a392d7ccb79dd8bfc2a344594b05b4c8db524a2bf36b84c5
-
Filesize
9KB
MD51bd6a02835c0b1255fea7fdd1cbad2a5
SHA1be5258fb6130558439a1f8c381d1159b419a9d3c
SHA256dda2c20a8465864594af631c2305b45b909efe16eac4840b46b34e434fc2b3cb
SHA5124f89d81dc49f7071674f9c03a5075877c2825104573c10252aa49b270239906f49cad761e49b1d011fdf366b2a1d5b25ef836eb61806d2b88e4e12ea83b882a9
-
Filesize
9KB
MD575585eb2772cb4139de5a6808b7b9ffd
SHA1c9b5c676ba3acafaf4fc8d5d34028bde07d7b32e
SHA2566e0d704a1342ddb7ae2aa9f7c40de3ee3d76550d9ef4878a1a4d4737604c41a8
SHA512c13f99472901ba2211bd124d88eda2eb5c12bd7232f6763c32ab322e92d2f8ac3fe1ed27173922f787b2c7cd11e798f289efbf0393bb5b0e48bfc79b6313010d
-
Filesize
11KB
MD54deba0e0da4013bd314e7536a6ee9761
SHA1a046d9a741e1c2b2f6f479b4cdacea109ac8fbab
SHA2561d0c40b9a0ad153f539c67b8a89d59db598ab7bc0c63cf2ae0fde5bf24e2cf74
SHA512726e0b9bd92a56dee5d696411a2c175df0f4c0995053990465e775a022f57be4fa4317b5bf53d3cf9ef9a49ecb8f9732d173e237e8beb1a4d4196d4996dae8ac
-
Filesize
9KB
MD550d227d6f0deb08486fe0ecf8172c176
SHA1d19d91f86a2b72175a0114cb9dccde40db142939
SHA2568c33cb66ea4ca9ce5e7c615446204e269d23a8d8477ef945d5e8bbc50979751b
SHA51244c0a21b0a1c99796fd57d9081500b67d5f56f99ce916cbbde233fcac43548670261fcdd34411d3164f4299379502df039f428343fd8defbf5d905d9f08b68f6
-
Filesize
11KB
MD573be5987512bec592f9a05855ef1da27
SHA1c274b15b042a9a6ae48620b26238316756a26b06
SHA256f44b1728e698538fd0b27e4928caa713cb9deba11a36c634529782efb61e360b
SHA51233616eb63e90b6b7c0f2ae9f064c3ba43755c6b4fc9592c3d152826c55f3e62c98c5e8a5caf41fea1da495850274790915e4a4c385b54d8682f8d2a650fbeb2b
-
Filesize
11KB
MD59053c829d91a920f3284933b6aac267d
SHA175c92aab5d6f37e7d3584e04f0fb3804859d6f38
SHA256a74f7ec2ddd3c1f79ddaa8ac9938bfc8a738418956b05a66123135ec0f6208b1
SHA512cb7699781276665204a4aae90b93b0e92665d956c90848cb404249ef8492de5a4f638e80c752ed4519c8dd013bba6217b277a074b3c98997af3613ac68a14528
-
Filesize
11KB
MD5f1ba6dd0a852a9a4c5b422d5c50f898c
SHA14784aee26505cfb9edca59e11b261deb1ebc8c9b
SHA25627637c4d59535b78190178de48d214cfef8ddcfe064eb994df03b2524781a9a6
SHA51262874f55b53009ff8d94f4f231e17dcd6025a7419952c8f6db5af61afb7778155c1c7c56732f3ebe6dc29ca67d2124be994eac6fce099033e8dfe53ac58c1a75
-
Filesize
9KB
MD56b6d08ffeb388a357c5e29b13d7430f8
SHA1acba67d4adb84116ead6509bb0822ee73928da7b
SHA2562f5a87721d644c078fb0ba011a7f0e5e75e56606afb7df5ffc23f23712aa42e0
SHA512ffdb7e208e82b7a11efa8cce76df9afbe7aaf1e08ad4d88adac84a600f8c7cb2d822bc6bcaaba6d8819b29cb422c88b17959c6f6dc2f21bc19b3232ccd92b5b3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD51a991c4178c4ce41331e2a901fda8994
SHA13e4323995cd761b2529dcf9392da3ead6d3aaed2
SHA256e9cc7bf83d722cffd3aeed8b658cf62f95170ea7a7229703343b5b83c227a61e
SHA51272a59ebbcdd9ad1d42988f22169707ff42876316cacc0b06e2506fdaeb59c63dfa872a1e037b5ff8012660fcfeba7d1f9e25e569b55992a0b8978393e94268ac
-
Filesize
116KB
MD59b5ecf13a57edaa21931a8225406e925
SHA1bfbd4c2c0018f96f5beb56be2aa0992a06d8cbe3
SHA25650b74e4eb20091690ea25299c41e7c4edd9fddaa006c910800503887a6ace1de
SHA512925a1b2256888741c1a7db43aefd51b29e48869d8831ca4d2afbae95f6009f44437d084c811117b9e059abef7e67569b7a214e514f6ffc9c96a8d575a23c22f5
-
Filesize
116KB
MD5e05fe8d18df183d42e2e3d36ed22600d
SHA1f1efec8742fb8d7db5486c719110338411eaa9c6
SHA25625862d1842c134b271ac75be63fd25c4b2f723ec8f392814ad436f0ad26a2b91
SHA5121a10cb5886cb5b0a45a472373b42fc245628f95227498f70dae734f870dcb00a3bfe77864c0d7127d6b9d4a1f4a8b76c650c2dfb7b93d21aa0e1c0ba9bc8ebf1
-
Filesize
116KB
MD5c779183e23fe76714bbddee3b9f948b6
SHA1858f585c79f4c17e8785ad81c45e05d1df23a1cb
SHA25621541e73118b30bff3df9c466d6418fd20b5effd1648c80c85cd73a8b8ea56df
SHA5127ca9b36c19751538e1961400776aecb66a2acf6d587a3b226539afe3998dee1f7fb0effafd800199fe62730bdf463a6e7500c34fc43f97cc7263fb778b72637a
-
Filesize
116KB
MD55682a746b2dfa36ee4b23aa33b59bb6d
SHA1165d7bdd9486fd56f4cf9104fdb11651ea755714
SHA256dfa73a7ceec5ab0b51129bb5581987843197f64cbad1a4bd9fba554419d52501
SHA5127842581003aecd79f13d185c7591bdb653b1360990c41a1abedc6dabfca9d43563fb9db524e0050a7d6d8976924a5540c18af6651bb5834f8671603f2624e6f0
-
Filesize
11.7MB
MD55ddea5141ed88d618c761f010d6353c3
SHA1e7332378851fa6f10c2ff7810958209aeed8c025
SHA256d8a54bd7f053c08b287c1689ea241c3585ce171282a8870df250adf514993bf6
SHA5123bcdceee67c647693b80d6a7cdfc6a1f1fdc626ed847f00ac02bac62e4dfb60cdd28b9cc30a4ea2b8de7353fb93c75819df3f2291fdda6028d69d260108f58be
-
Filesize
11.7MB
MD5867a83c560a788bf31991395b6ff62a3
SHA11b9430a986fc3a14d74b8a89e5935088727f0257
SHA256e75fca4d227ff814676e5216bc2010cdf3d24d5095ff13165e3ef8a20f783ab6
SHA512be91472453b6d4914d154a1ae4e0f41f84215db0131320c100f9daec809669d359429636e2db31a2c1ec5ca6ac87d6eb49ff9fdafe41a57c1e5a26f10ff6f4db
-
Filesize
526KB
MD551749a96a9d6c32d40c490e370f1c6c5
SHA1e4c5b079a557e452b19c24ee8e09d45c0d87df23
SHA2567494b75566c33c247a381887f26054acc2ea068c2485d5d0cef2fca6812e70e6
SHA512e4c20bd1bab6f0ef9cea473498d108eda1cf01a29c59da986c350a0834b8fc2d892f6a8810268a2233091d266d4adc4d79699946d974f38672f9815f3b1116f8