Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-02-2025 18:18

General

  • Target

    Solara.exe

  • Size

    11.5MB

  • MD5

    3e1edf981ca6e7939d6e31ae70734240

  • SHA1

    76b5698a31314c433b73e89e1800cc1bc6b8a00c

  • SHA256

    b0d99638f89532528b1c77662303d51cea8f09cb4cd6440fd01f5128b5ecaeb2

  • SHA512

    781c84789e8de1a1655f40f4996057c42e662284967daf49a826a617feb0a5c53cd8d431ce8b669befe538b79e0f3ac615f44172fe0bcbc2817c244dd9f8fdbb

  • SSDEEP

    98304:/PT0ghip3+ZnMxQ2YMMwdN4u2Xkc14GJmzmBZJZPtT5AbUtVRQt+QT2vaF5r9Y:/I9VkQrN4u2X42m0JZlD2gvay

Score
10/10

Malware Config

Extracted

Family

vidar

C2

https://t.me/sok33tn

https://steamcommunity.com/profiles/76561199824159981

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3404
      • C:\Users\Admin\AppData\Local\Temp\Solara.exe
        "C:\Users\Admin\AppData\Local\Temp\Solara.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3104
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2404

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VHQUNTV1\76561199824159981[1].htm

      Filesize

      25KB

      MD5

      57647829c84dd0d22d6da11a86e15309

      SHA1

      63dd7e4abc35e17b2d87e0a6a4aeffe0978c4ab0

      SHA256

      4a5b3f73b57ecb12e10bcd0f90e8c0100759c29873bf6e12c87a73b5d9451cb5

      SHA512

      6fb2ce259acb68e3cd5f08755e72b1aa9970917d86640d896ee044e8b1919f811675b9b31d2b32a8523fda274112f4ebde45d31ae2a23612b5bbac971e7a0de3

    • memory/2404-1345-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/3104-0-0x0000000074EAE000-0x0000000074EAF000-memory.dmp

      Filesize

      4KB

    • memory/3104-1-0x0000000000B30000-0x0000000000CF0000-memory.dmp

      Filesize

      1.8MB

    • memory/3104-2-0x0000000074EA0000-0x0000000075650000-memory.dmp

      Filesize

      7.7MB

    • memory/3104-3-0x0000000005640000-0x000000000574C000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-4-0x00000000058C0000-0x00000000059CC000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-12-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-20-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-68-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-64-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-62-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-60-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-66-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-58-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-56-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-54-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-52-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-51-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-48-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-44-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-42-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-38-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-36-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-34-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-32-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-30-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-28-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-26-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-24-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-22-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-18-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-16-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-14-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-10-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-46-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-8-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-40-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-6-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-5-0x00000000058C0000-0x00000000059C7000-memory.dmp

      Filesize

      1.0MB

    • memory/3104-1327-0x0000000074EA0000-0x0000000075650000-memory.dmp

      Filesize

      7.7MB

    • memory/3104-1328-0x0000000005AF0000-0x0000000005B56000-memory.dmp

      Filesize

      408KB

    • memory/3104-1329-0x0000000005B60000-0x0000000005BC4000-memory.dmp

      Filesize

      400KB

    • memory/3104-1330-0x0000000005BC0000-0x0000000005C0C000-memory.dmp

      Filesize

      304KB

    • memory/3104-1331-0x0000000074EA0000-0x0000000075650000-memory.dmp

      Filesize

      7.7MB

    • memory/3104-1332-0x00000000064D0000-0x0000000006A74000-memory.dmp

      Filesize

      5.6MB

    • memory/3104-1333-0x0000000005CB0000-0x0000000005D04000-memory.dmp

      Filesize

      336KB

    • memory/3104-1337-0x0000000074EA0000-0x0000000075650000-memory.dmp

      Filesize

      7.7MB

    • memory/3104-1338-0x0000000074EA0000-0x0000000075650000-memory.dmp

      Filesize

      7.7MB

    • memory/3104-1342-0x0000000074EA0000-0x0000000075650000-memory.dmp

      Filesize

      7.7MB

    • memory/3104-1344-0x0000000074EA0000-0x0000000075650000-memory.dmp

      Filesize

      7.7MB