Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2025, 05:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Solara.exe
Resource
win7-20240903-en
8 signatures
150 seconds
General
-
Target
Solara.exe
-
Size
512KB
-
MD5
3ef15046b94f9d359f066f84c740edde
-
SHA1
5895a89064d57b7272dc0075838c48b2449da637
-
SHA256
cec70d29baa94f9bccf2c4ebd4a0acd661413561129b1ae43ccc9b31ffef91aa
-
SHA512
e4f94e513b1b6fa34108b1e1bd83950f16943e1262663d02d56f178f02b7926e9b72ac3cb3442a4ad2fafd9d02103d74993f5913a72a0c90108c4b122d38f3ee
-
SSDEEP
12288:Pj/MhZMZ8xVm3Tywsu6jxfDV1OZzMqW97YZzGlt2EJNAJ:yuZ8fmOwsPfDV1Oc97G0AJ
Malware Config
Extracted
Family
lumma
C2
https://toppyneedus.biz/api
Signatures
-
Lumma family
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/3344-1-0x0000000000690000-0x0000000000712000-memory.dmp net_reactor -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3344 set thread context of 1004 3344 Solara.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 4536 3344 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3344 wrote to memory of 1004 3344 Solara.exe 83 PID 3344 wrote to memory of 1004 3344 Solara.exe 83 PID 3344 wrote to memory of 1004 3344 Solara.exe 83 PID 3344 wrote to memory of 1004 3344 Solara.exe 83 PID 3344 wrote to memory of 1004 3344 Solara.exe 83 PID 3344 wrote to memory of 1004 3344 Solara.exe 83 PID 3344 wrote to memory of 1004 3344 Solara.exe 83 PID 3344 wrote to memory of 1004 3344 Solara.exe 83 PID 3344 wrote to memory of 1004 3344 Solara.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3344 -s 8122⤵
- Program crash
PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3344 -ip 33441⤵PID:2824