Analysis
-
max time kernel
35s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 04:12
Static task
static1
General
-
Target
solarafdh3wy (6868).zip
-
Size
371KB
-
MD5
06f129971e7657b5c33929df3f7a3494
-
SHA1
6463b90cf44d7ffc87833868e3e13089a288b6f3
-
SHA256
fee7771775597b5552bf7fe898d0f2fe2c7945b7208c78fad912b9902a8b0f87
-
SHA512
ade80ea45ca3551a61f1acd31245741d34b225d06790e3a7e52d6b94babc0dc83a5b885ab770084b5439c294cf8afa43bf142237ebf6a8643b5d03a9059c94e0
-
SSDEEP
6144:IorbNB4hcAyHu6py+hHp0zL9lV9mWjxznuUy/ygfj1yghILCU+NIi3Fd1Pyh8MgN:Iorb34hcH0oJ0zLTnuUy6m1ygh2+NIi3
Malware Config
Extracted
lumma
https://robinsharez.shop/api
https://handscreamny.shop/api
https://chipdonkeruz.shop/api
https://versersleep.shop/api
https://crowdwarek.shop/api
https://apporholis.shop/api
https://femalsabler.shop/api
https://soundtappysk.shop/api
Signatures
-
Lumma family
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x0007000000023cae-4.dat net_reactor behavioral1/memory/2376-7-0x00000000008D0000-0x000000000093A000-memory.dmp net_reactor -
Executes dropped EXE 2 IoCs
pid Process 2376 Solara.exe 3564 Solara.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2376 set thread context of 3564 2376 Solara.exe 87 -
Program crash 1 IoCs
pid pid_target Process procid_target 3584 2376 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3356 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3356 7zFM.exe Token: 35 3356 7zFM.exe Token: SeSecurityPrivilege 3356 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3356 7zFM.exe 3356 7zFM.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2376 wrote to memory of 3564 2376 Solara.exe 87 PID 2376 wrote to memory of 3564 2376 Solara.exe 87 PID 2376 wrote to memory of 3564 2376 Solara.exe 87 PID 2376 wrote to memory of 3564 2376 Solara.exe 87 PID 2376 wrote to memory of 3564 2376 Solara.exe 87 PID 2376 wrote to memory of 3564 2376 Solara.exe 87 PID 2376 wrote to memory of 3564 2376 Solara.exe 87 PID 2376 wrote to memory of 3564 2376 Solara.exe 87 PID 2376 wrote to memory of 3564 2376 Solara.exe 87
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\solarafdh3wy (6868).zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3356
-
C:\Users\Admin\Desktop\Solara.exe"C:\Users\Admin\Desktop\Solara.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\Desktop\Solara.exe"C:\Users\Admin\Desktop\Solara.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 1682⤵
- Program crash
PID:3584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2376 -ip 23761⤵PID:1968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
399KB
MD5f2759e4fa7603993a732113cada342d4
SHA1420abe07c73fe7b08358bebea98931dc84e28fc6
SHA25666ca1f366c728aefd74e3abe35f3ea0987ec474128c68a5ed68921ae4c8809f4
SHA512172be4edacd32b3b835f73f2216a47caeae73924d31576b769c9196bced5dc41eaed3070a5feab6472a78504cdc6d8261c55443d2ee6182491db6f5868994fa0