Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-02-2025 18:18

General

  • Target

    Solara.exe

  • Size

    11.5MB

  • MD5

    3e1edf981ca6e7939d6e31ae70734240

  • SHA1

    76b5698a31314c433b73e89e1800cc1bc6b8a00c

  • SHA256

    b0d99638f89532528b1c77662303d51cea8f09cb4cd6440fd01f5128b5ecaeb2

  • SHA512

    781c84789e8de1a1655f40f4996057c42e662284967daf49a826a617feb0a5c53cd8d431ce8b669befe538b79e0f3ac615f44172fe0bcbc2817c244dd9f8fdbb

  • SSDEEP

    98304:/PT0ghip3+ZnMxQ2YMMwdN4u2Xkc14GJmzmBZJZPtT5AbUtVRQt+QT2vaF5r9Y:/I9VkQrN4u2X42m0JZlD2gvay

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Solara.exe
    "C:\Users\Admin\AppData\Local\Temp\Solara.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:848
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 648
      2⤵
      • Program crash
      PID:4560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/848-0-0x000000007463E000-0x000000007463F000-memory.dmp

    Filesize

    4KB

  • memory/848-1-0x0000000000D20000-0x0000000000EE0000-memory.dmp

    Filesize

    1.8MB

  • memory/848-2-0x0000000074630000-0x0000000074D1E000-memory.dmp

    Filesize

    6.9MB

  • memory/848-3-0x0000000004850000-0x000000000495C000-memory.dmp

    Filesize

    1.0MB

  • memory/848-4-0x0000000004E50000-0x0000000004F5C000-memory.dmp

    Filesize

    1.0MB

  • memory/848-8-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-5-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-6-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-12-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-14-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-16-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-18-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-24-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-28-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-26-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-22-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-20-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-10-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-30-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-32-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-46-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-56-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-64-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-34-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-68-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-66-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-62-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-60-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-1327-0x0000000074630000-0x0000000074D1E000-memory.dmp

    Filesize

    6.9MB

  • memory/848-58-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-54-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-52-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-50-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-1328-0x00000000042E0000-0x0000000004346000-memory.dmp

    Filesize

    408KB

  • memory/848-1329-0x0000000004960000-0x00000000049C4000-memory.dmp

    Filesize

    400KB

  • memory/848-48-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-44-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-42-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-40-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-38-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-36-0x0000000004E50000-0x0000000004F57000-memory.dmp

    Filesize

    1.0MB

  • memory/848-1330-0x0000000005330000-0x000000000537C000-memory.dmp

    Filesize

    304KB

  • memory/848-1331-0x0000000074630000-0x0000000074D1E000-memory.dmp

    Filesize

    6.9MB

  • memory/848-1332-0x0000000005510000-0x0000000005564000-memory.dmp

    Filesize

    336KB

  • memory/848-1333-0x0000000074630000-0x0000000074D1E000-memory.dmp

    Filesize

    6.9MB