Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
15-02-2025 15:17
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
xenorat
193.161.193.99
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
Solara Bootstrapper Dependinces
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023d18-51.dat family_xenorat behavioral1/memory/5248-85-0x00000000009D0000-0x00000000009E2000-memory.dmp family_xenorat -
Xenorat family
-
Downloads MZ/PE file 2 IoCs
flow pid Process 20 4332 msedge.exe 51 2396 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Control Panel\International\Geo\Nation BootstrapperNew1.exe -
Executes dropped EXE 8 IoCs
pid Process 5248 BootstrapperNew1.exe 5464 BootstrapperNew1.exe 5748 BootstrapperNew1.exe 5496 BootstrapperNew1.exe 4464 BootstrapperNew1.exe 5772 BootstrapperNew1.exe 6068 BootstrapperNew1.exe 816 BootstrapperNew1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 18 raw.githubusercontent.com 20 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BootstrapperNew1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BootstrapperNew1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BootstrapperNew1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BootstrapperNew1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BootstrapperNew1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BootstrapperNew1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BootstrapperNew1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BootstrapperNew1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2716 MicrosoftEdgeUpdate.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000_Classes\Local Settings msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 487079.crdownload:SmartScreen msedge.exe File created C:\Users\Admin\AppData\Roaming\XenoManager\BootstrapperNew1.exe\:SmartScreen:$DATA BootstrapperNew1.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6044 schtasks.exe 5564 schtasks.exe 1976 schtasks.exe 5440 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4332 msedge.exe 4332 msedge.exe 1296 msedge.exe 1296 msedge.exe 4284 identity_helper.exe 4284 identity_helper.exe 4340 msedge.exe 4340 msedge.exe 5484 msedge.exe 5484 msedge.exe 5484 msedge.exe 5484 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1296 wrote to memory of 4676 1296 msedge.exe 87 PID 1296 wrote to memory of 4676 1296 msedge.exe 87 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4804 1296 msedge.exe 88 PID 1296 wrote to memory of 4332 1296 msedge.exe 89 PID 1296 wrote to memory of 4332 1296 msedge.exe 89 PID 1296 wrote to memory of 1656 1296 msedge.exe 90 PID 1296 wrote to memory of 1656 1296 msedge.exe 90 PID 1296 wrote to memory of 1656 1296 msedge.exe 90 PID 1296 wrote to memory of 1656 1296 msedge.exe 90 PID 1296 wrote to memory of 1656 1296 msedge.exe 90 PID 1296 wrote to memory of 1656 1296 msedge.exe 90 PID 1296 wrote to memory of 1656 1296 msedge.exe 90 PID 1296 wrote to memory of 1656 1296 msedge.exe 90 PID 1296 wrote to memory of 1656 1296 msedge.exe 90 PID 1296 wrote to memory of 1656 1296 msedge.exe 90 PID 1296 wrote to memory of 1656 1296 msedge.exe 90 PID 1296 wrote to memory of 1656 1296 msedge.exe 90 PID 1296 wrote to memory of 1656 1296 msedge.exe 90 PID 1296 wrote to memory of 1656 1296 msedge.exe 90 PID 1296 wrote to memory of 1656 1296 msedge.exe 90 PID 1296 wrote to memory of 1656 1296 msedge.exe 90 PID 1296 wrote to memory of 1656 1296 msedge.exe 90 PID 1296 wrote to memory of 1656 1296 msedge.exe 90 PID 1296 wrote to memory of 1656 1296 msedge.exe 90 PID 1296 wrote to memory of 1656 1296 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Mikeykorby/Educational-Purposes./raw/refs/heads/main/BootstrapperNew1.exe1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5d3f46f8,0x7ffe5d3f4708,0x7ffe5d3f47182⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,7615633966830624040,16010295520280503307,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2304 /prefetch:22⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,7615633966830624040,16010295520280503307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,7615633966830624040,16010295520280503307,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7615633966830624040,16010295520280503307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7615633966830624040,16010295520280503307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,7615633966830624040,16010295520280503307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,7615633966830624040,16010295520280503307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2112,7615633966830624040,16010295520280503307,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5032 /prefetch:82⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7615633966830624040,16010295520280503307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2112,7615633966830624040,16010295520280503307,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6000 /prefetch:82⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2112,7615633966830624040,16010295520280503307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Users\Admin\Downloads\BootstrapperNew1.exe"C:\Users\Admin\Downloads\BootstrapperNew1.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:5248 -
C:\Users\Admin\AppData\Roaming\XenoManager\BootstrapperNew1.exe"C:\Users\Admin\AppData\Roaming\XenoManager\BootstrapperNew1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5464 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Solara Bootstrapper Dependinces" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF8F6.tmp" /F4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6044
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7615633966830624040,16010295520280503307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:5528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7615633966830624040,16010295520280503307,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:12⤵PID:5536
-
-
C:\Users\Admin\Downloads\BootstrapperNew1.exe"C:\Users\Admin\Downloads\BootstrapperNew1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7615633966830624040,16010295520280503307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6412 /prefetch:12⤵PID:5848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7615633966830624040,16010295520280503307,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:5856
-
-
C:\Users\Admin\Downloads\BootstrapperNew1.exe"C:\Users\Admin\Downloads\BootstrapperNew1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5496 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Solara Bootstrapper Dependinces" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8D18.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5564
-
-
-
C:\Users\Admin\Downloads\BootstrapperNew1.exe"C:\Users\Admin\Downloads\BootstrapperNew1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4464
-
-
C:\Users\Admin\Downloads\BootstrapperNew1.exe"C:\Users\Admin\Downloads\BootstrapperNew1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,7615633966830624040,16010295520280503307,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5484
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1152
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7OTIzNDk0QUItN0ZBRC00Mjg0LUJFNjAtODcxMTFDRTczRTYwfSIgdXNlcmlkPSJ7MzREMzUyNDctODRDNy00Q0VBLUI4RjMtOERCQzVDMzMyQ0QwfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7QUM5RTY1OEYtMjFCOS00RkIwLTkwODMtRDlBNTVCNjlBNjA1fSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI3IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY0MzMiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODc1OTU2NTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0OTEyMjg0MDM5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2716
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5660
-
C:\Users\Admin\Downloads\BootstrapperNew1.exe"C:\Users\Admin\Downloads\BootstrapperNew1.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6068 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Solara Bootstrapper Dependinces" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB958.tmp" /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1976
-
-
C:\Users\Admin\Downloads\BootstrapperNew1.exe"C:\Users\Admin\Downloads\BootstrapperNew1.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:816 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Solara Bootstrapper Dependinces" /XML "C:\Users\Admin\AppData\Local\Temp\tmp15C0.tmp" /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
152B
MD5fcf94d924e300004c62e049d61583507
SHA18766787aaa4da97473871889984cef4d7f766400
SHA256473cd69192e6702bccf48922210fe7a989dff989c9560094823e408d51327901
SHA5126cba5f48d335d3bc9ebc25d1ecfd68a3dad77c084c940e69ee05081cf88605f68951b6daacbdc2ca7388a306132419be1c13e1b4a18b1402a7bff6381cc626b3
-
Filesize
152B
MD5295568b858cc6dd30e8eced3638eec7d
SHA1c0b59c5bf28be1a6b9ae90708caa52ffd564838e
SHA2563791807df84354d4c60d3c614eb059992321fc86375561dbd35e11def84c6a81
SHA51238bb32014edfd0e417f7a2bec8a782420d558a1dcd5adfc9732ab1b89272bf43ce9fd64110b7d541e24666a2afca4a8a836706af7805a39b0b4de015849a370b
-
Filesize
261B
MD52c2e6472d05e3832905f0ad4a04d21c3
SHA1007edbf35759af62a5b847ab09055e7d9b86ffcc
SHA256283d954fa21caa1f3b4aba941b154fab3e626ff27e7b8029f5357872c48cbe03
SHA5128c4ce1ea02da6ffb7e7041c50528da447d087d9ee3c9f4a8c525d2d856cf48e46f5dd9a1fedd23dd047634e719c8886457f7e7240aa3cc36f1a6216e4c00ee37
-
Filesize
6KB
MD5e0319ee370069f65db06c299569331ae
SHA1bab0536802a8fcdc78f16bf20d12d7081854010c
SHA25618583b1f4e26c304f7524ab4cf441b1ea5c7b4e84aa7d64afd7f86d62b6e385c
SHA51227a52b24d78b656c74940664ae5a274d8235a8fffbc0b25872d68276bbc0e6adddd6c099339fab7e0dabea86c767ed9dbc60d72ed419f555400553603a0ad23a
-
Filesize
6KB
MD5a526a044bd02c31b225aff8f89c1902e
SHA183769cb41952d0a723b74a7d1822347fda614a54
SHA2562284c7cf9a0a692e808ed6e4fdf2f55cce08b153325e5c77cd01c539af110d21
SHA512c7933fa3f17c5f52b3458ff158eb4f71dfc3a2a9bbb19d9a3376f852ed5020b949202a854af68c03e33bb8b09b601abf5a03845e245720e8350acc494b19f905
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD56dae94a4c66a6d2d1770f9c2d5dae9c8
SHA1ba6f536486d2eb6f82cd9295440e091403a5f438
SHA256b2ff8dc25fc7d4e4179a30b28a4536260a88273f47156a00bf86dc9fe6339d99
SHA5122ac9a6193dae48f244cd994186dfc5520853176dfa972d6cba14ee48042037902b65aac637ed5f4a722a0a4e694cfcc3f4133b2445b3a836a24bb856b72d32b0
-
Filesize
11KB
MD5713cc366c539cb7c71c6b64b42fdba21
SHA1e67758a3c76d56fec5436aeb185a73eec7591f41
SHA2561d79736a9168da10907ed78aa8dd5e7e69fde962fab3b5da57eb7a6f1ae03127
SHA5121f33ae6cd19dcfeda99c76e93c241fcf59318d91d2f30608890fcf60cb99c2809fad612f6230d9c4498345442ff0ab24f75ae823941f1f0365f366cdf4987379
-
Filesize
1KB
MD5555b9d3e51fa165f27f4e00fc4e5fde9
SHA169213cdeac165e3e38e40481fc0b694d0b1f8690
SHA256ec970116455c60c05f754f7018668d66c4ad24bdefe4036e27c7ee2ba18e17a6
SHA5120a0c3a978f55b82afff9be8a722e0e148fa10d76aca52038d3a1558d263402df924550e4987de47a604ba8236d9cac8b31deb069a47efd40d1d22121ae97e9ac
-
Filesize
1KB
MD54f1a3f65c726a5d1b6738fc85f4a9925
SHA1e207b950c2f65eb9e4f59967afefa139748f4a6f
SHA2564820306e4bbf03801fb906ef2fcdd956b9d8a5949870ece25ac21244e3285d93
SHA512fc836daa24cf6245f3fb6261c06e6735925a17149e7297ea4c24b297ea91eb4d9f17d8b090f0e24e970d58ba797498c390735192c5352e32ac88b1312e665339
-
Filesize
50KB
MD52db839a013bb2742e80cdcf4edc63f39
SHA18b94a91e13f1ff30a3ca2627d3b43affacbb66b0
SHA25647497f110de244113679de02a3eefc50a9831c13e7c86b45ea3e0ce8d0072f7d
SHA5123f0210b4a1245d67c96f563a191b4c11455137afee436ec2b41d2b672a93aed4ebeb5ac0814217ef9fc3c1706c371028670583876d829bccc244206af34e324a