Analysis
-
max time kernel
1049s -
max time network
1050s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 21:44
General
-
Target
X.exe
-
Size
82KB
-
MD5
b201ce5dcb58284da7a5ef6294418e56
-
SHA1
27573051f80debfd74e1a72d27cfd29f58c76d7e
-
SHA256
188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed
-
SHA512
f282f9efa40ce5e753faf803079af9aae478711e6e2f3dcf09c744ae3e670c6ef0cb18b62c8e57ba825faef8c396dd481768ef0680681d4b1b80ad1c3433f11c
-
SSDEEP
1536:D2wgD0/WhgBpRCn3wtSD+bQ6QqTMj34Al6G4tIzOasNnP6UO:ywkeWQCn1+bQdjrytuOa6Sz
Malware Config
Extracted
xworm
127.0.0.1:36623
fax-scenarios.gl.at.ply.gg:36623
-
Install_directory
%AppData%
-
install_file
SolaraX.exe
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/1604-78-0x0000000000D20000-0x0000000000D2E000-memory.dmp disable_win_def -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/1604-1-0x00000000003F0000-0x000000000040A000-memory.dmp family_xworm behavioral1/files/0x000f000000023bad-59.dat family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2000 powershell.exe 3224 powershell.exe 4984 powershell.exe 1524 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation X.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SolaraX.lnk X.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SolaraX.lnk X.exe -
Executes dropped EXE 18 IoCs
pid Process 60 SolaraX.exe 452 SolaraX.exe 376 SolaraX.exe 4020 SolaraX.exe 2572 SolaraX.exe 396 SolaraX.exe 4796 SolaraX.exe 3272 SolaraX.exe 2140 SolaraX.exe 1964 SolaraX.exe 4308 SolaraX.exe 2552 SolaraX.exe 556 SolaraX.exe 3688 SolaraX.exe 1272 SolaraX.exe 2292 SolaraX.exe 1232 SolaraX.exe 4132 SolaraX.exe -
Loads dropped DLL 1 IoCs
pid Process 1604 X.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SolaraX = "C:\\Users\\Admin\\AppData\\Roaming\\SolaraX.exe" X.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4152 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 2000 powershell.exe 2000 powershell.exe 2000 powershell.exe 3224 powershell.exe 3224 powershell.exe 3224 powershell.exe 4984 powershell.exe 4984 powershell.exe 4984 powershell.exe 1524 powershell.exe 1524 powershell.exe 1524 powershell.exe 1604 X.exe 1604 X.exe 1604 X.exe 1604 X.exe 1604 X.exe 1604 X.exe 1604 X.exe 1604 X.exe 1604 X.exe 1604 X.exe 1604 X.exe 1604 X.exe 1604 X.exe 1604 X.exe 1604 X.exe 1604 X.exe 1604 X.exe 1604 X.exe 1604 X.exe 1604 X.exe 1604 X.exe 1604 X.exe 1392 msedge.exe 1392 msedge.exe 2004 msedge.exe 2004 msedge.exe 1768 identity_helper.exe 1768 identity_helper.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1604 X.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeDebugPrivilege 1604 X.exe Token: SeDebugPrivilege 2000 powershell.exe Token: SeDebugPrivilege 3224 powershell.exe Token: SeDebugPrivilege 4984 powershell.exe Token: SeDebugPrivilege 1524 powershell.exe Token: SeDebugPrivilege 1604 X.exe Token: SeDebugPrivilege 60 SolaraX.exe Token: SeDebugPrivilege 452 SolaraX.exe Token: SeDebugPrivilege 376 SolaraX.exe Token: SeDebugPrivilege 4020 SolaraX.exe Token: SeDebugPrivilege 2572 SolaraX.exe Token: SeDebugPrivilege 396 SolaraX.exe Token: SeDebugPrivilege 4796 SolaraX.exe Token: SeDebugPrivilege 3272 SolaraX.exe Token: 33 3540 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3540 AUDIODG.EXE Token: SeDebugPrivilege 2140 SolaraX.exe Token: SeDebugPrivilege 1964 SolaraX.exe Token: SeDebugPrivilege 4308 SolaraX.exe Token: SeDebugPrivilege 2552 SolaraX.exe Token: SeDebugPrivilege 556 SolaraX.exe Token: SeDebugPrivilege 3688 SolaraX.exe Token: SeDebugPrivilege 1272 SolaraX.exe Token: SeDebugPrivilege 2292 SolaraX.exe Token: SeDebugPrivilege 1232 SolaraX.exe Token: SeDebugPrivilege 4132 SolaraX.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1604 X.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1604 wrote to memory of 2000 1604 X.exe 93 PID 1604 wrote to memory of 2000 1604 X.exe 93 PID 1604 wrote to memory of 3224 1604 X.exe 95 PID 1604 wrote to memory of 3224 1604 X.exe 95 PID 1604 wrote to memory of 4984 1604 X.exe 97 PID 1604 wrote to memory of 4984 1604 X.exe 97 PID 1604 wrote to memory of 1524 1604 X.exe 100 PID 1604 wrote to memory of 1524 1604 X.exe 100 PID 1604 wrote to memory of 4152 1604 X.exe 102 PID 1604 wrote to memory of 4152 1604 X.exe 102 PID 1604 wrote to memory of 2004 1604 X.exe 159 PID 1604 wrote to memory of 2004 1604 X.exe 159 PID 2004 wrote to memory of 3692 2004 msedge.exe 160 PID 2004 wrote to memory of 3692 2004 msedge.exe 160 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 4180 2004 msedge.exe 161 PID 2004 wrote to memory of 1392 2004 msedge.exe 162 PID 2004 wrote to memory of 1392 2004 msedge.exe 162 PID 2004 wrote to memory of 3124 2004 msedge.exe 163 PID 2004 wrote to memory of 3124 2004 msedge.exe 163 PID 2004 wrote to memory of 3124 2004 msedge.exe 163 PID 2004 wrote to memory of 3124 2004 msedge.exe 163 PID 2004 wrote to memory of 3124 2004 msedge.exe 163 PID 2004 wrote to memory of 3124 2004 msedge.exe 163 PID 2004 wrote to memory of 3124 2004 msedge.exe 163 PID 2004 wrote to memory of 3124 2004 msedge.exe 163 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\X.exe"C:\Users\Admin\AppData\Local\Temp\X.exe"1⤵
- Checks computer location settings
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\X.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'X.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\SolaraX.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SolaraX.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SolaraX" /tr "C:\Users\Admin\AppData\Roaming\SolaraX.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://roblox.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc6bb46f8,0x7ffcc6bb4708,0x7ffcc6bb47183⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16384698466634848635,14869669700163084085,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:23⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,16384698466634848635,14869669700163084085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,16384698466634848635,14869669700163084085,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:83⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16384698466634848635,14869669700163084085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:13⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16384698466634848635,14869669700163084085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:13⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16384698466634848635,14869669700163084085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:13⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16384698466634848635,14869669700163084085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:83⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16384698466634848635,14869669700163084085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16384698466634848635,14869669700163084085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:13⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16384698466634848635,14869669700163084085,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:13⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16384698466634848635,14869669700163084085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:13⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16384698466634848635,14869669700163084085,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:13⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16384698466634848635,14869669700163084085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:13⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16384698466634848635,14869669700163084085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:13⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16384698466634848635,14869669700163084085,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5844 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:744
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://gmail.com/2⤵PID:2304
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc6bb46f8,0x7ffcc6bb4708,0x7ffcc6bb47183⤵PID:800
-
-
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:60
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:452
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:376
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:396
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3272
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x464 0x2f81⤵
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4308
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4996
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:556
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3688
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4132
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
152B
MD556361f50f0ee63ef0ea7c91d0c8b847a
SHA135227c31259df7a652efb6486b2251c4ee4b43fc
SHA2567660beecfee70d695225795558f521c3fb2b01571c224b373d202760b02055c0
SHA51294582035220d2a78dfea9dd3377bec3f4a1a1c82255b3b74f4e313f56eb2f7b089e36af9fceea9aa83b7c81432622c3c7f900008a1bdb6b1cd12c4073ae4b8a2
-
Filesize
152B
MD50621e31d12b6e16ab28de3e74462a4ce
SHA10af6f056aff6edbbc961676656d8045cbe1be12b
SHA2561fd3365fdb49f26471ce9e348ce54c9bc7b66230118302b32074029d88fb6030
SHA512bf0aa5b97023e19013d01abd3387d074cdd5b57f98ec4b0241058b39f9255a7bbab296dce8617f3368601a3d751a6a66dc207d8dd3fc1cba9cac5f98e3127f6f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD54e81e799b0e624481a7d267e9031ab20
SHA19d6036191ed68a102682e1921c040fd7afa49656
SHA256379cff777bb591af8a9575ae82c9379d0404271988e6a96e4cecf371db8145c1
SHA5126e132dcd15c3e6eb9f633d81d8630fc9a2c98e573e34ac4675d74f40fc0dcc55bcd88397d30c378c15db7bbf0dcb25b527ead6e490475690858b802086d2651b
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5c5bb6bd57e45ee7a58b43fa1ef9db164
SHA16a7f78a38a747a6d40ffb968c2b9ebb1e8ad75fc
SHA256deb7125229e448ba5107860af13af3e2d8d65677c106d3012342d38bbb40938b
SHA5123fc39f014f70e8462e548d37793ebf28164be16e19566af676e89c64090d0cda691867116baad856032231752ab0da900bd0f5cb0420aa35c7a56a6cb17f7526
-
Filesize
1KB
MD50f20806abaa47b8f4d638c5cb9fefed1
SHA1ea640e289e43e540d23240430ef1f040a50ea967
SHA256921f88bba52bfdff2df15837e59a76bbebb73afc1a42559b39b52e2c36bb4f12
SHA512427070a140276a4ec3549076dc27523c3df83429afe3d3ec54ff42bb690b63751df42ba1e7a97e54122d7ed23acf4a987c3d75e9dc31040e8cb0740c68690715
-
Filesize
5KB
MD51a5de438a4f57de316da6a3e963c0816
SHA1ae6c5a5c659cc9c3d0ca1bb4aeb433ac3bb37da0
SHA25600cf4d30fd1da37fd3cd18e289bd5ed90931120f1957019e647f4b5d395397b6
SHA51258d024d2c2b34f831ac22ecb62c83a1597ed2521dc0ce18b719c922c52e824a566bc7d51fbc247aa03b180f0099b6d56c0f096a3fc6f349204c6b254a7511109
-
Filesize
7KB
MD5114da867912df626ce8a2744becd14f5
SHA195ed6399c72ca5275c2c387d1c9a7478f60c403b
SHA2561ce5f3eba34330f86105588d75af2359addf0d4879fc2be53b554555bd07cc09
SHA51250526b66ab3c88cfbeff4aac6c920df310b2c0147002f9eb114aaa9535c947329a6ccb58f498edbe00f426a2360d97e851788e7546c10fec0aafee7755eb1447
-
Filesize
6KB
MD5421ae6f23ef53e439a62804b354e3ad0
SHA1b9ac691c0f04b629595629adbe853a5d18acfd74
SHA2564b3b35396330cb77e10209b579c2ee66531e207a8ad37e4c8f4ba7f1c318c78c
SHA5124b30042cf9ad7b53c770728a3b8eaa810540bffa220f2cafb71997dec24d4891837e61c8c307020721d58f6884fe4a74e2c29e7f6eeced882a02317c0e6a3087
-
Filesize
1KB
MD5eb74a71f1810fadd5a1e7fa763996d67
SHA1cf5fcb03e7b515070c0b4afbe951af4fab21404a
SHA25607341d945c3b86888d6ced97fdfc7907f841e013faffea62e60b3cf2c0ab3a58
SHA5122d3ffa41847f43c2f6375ac3033d9b966c64b7ee41e5c28f15b743f1f4f26e5e610b6aa4ca26b68dd949d657b3eaef73f5ab6396a4950f40d98b4efccdb28d81
-
Filesize
1KB
MD5f2fa3483d9829192fd98a58dc436e588
SHA1f204f7a6c1a7df2165b29f06f51c53b94229e2d0
SHA256f586a03a3c4790c025706d4318523af6e78783bbcbb4553d5b31c47d7b4983d9
SHA512bfb6a0d81e771260d9ea320adb6ae718fd23ddb70cf5ca9c422c6ce891b689a1cbfdf794a8827e05277165acd7b35c57fcbf49a2d7a76b868655707cd51c5e01
-
Filesize
1KB
MD582ed432ed0f27407163c4d563740f0ab
SHA198f8f15e536e77dc28b6af6bc0812bc7cab2485a
SHA256126bea66d90b15137b72551cdbe351a25d04ac29ec2ab10e79e1193599b2cab8
SHA512d2e0a7f8391a6d75330027e790fc0263dba7400a8e16dcf99c015fa0973677011175179cdb2028356cd0d1012405d13ad1d089d26ec47280a24be6c251db556d
-
Filesize
1KB
MD53a3e528aa75fd8178bf6a6ce94929eed
SHA1c931142645932419f838068e35878d9f4c12a131
SHA2563f4a2daccdf6715b8a6d81d5b5721a978bce05ce5e40b22361f4e5e102a37cd9
SHA512ab341d0d0593f0e03a56e83e5f4f87dd53e9f51cdc6523fd553ca31cbcac6800632c66e0df42685ad3ee2a83f2baa95358fbb89b4622447f21a5ad3ddf4d84f5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59254edc72686e85b6f427d81e99b64bc
SHA1e10cfaec5344586d7095c1a1bbcde2d85daae214
SHA2569dd870cef2f00d54a269e549ec6c209a399c3cc2e3313aa5fa2e632064d8f53a
SHA512e01aeaa2895d0e85429b8944a9fd4d8de977f0612cd5ec7d33ea618eda4f2225d6731d4ef61a2bbeb2ae9ab785468eaec3d13f771c66c59ee5224926a1ad242c
-
Filesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
Filesize
944B
MD5d66078cfc91eb0328389f2a488ad735e
SHA1c532c251856d3220593e975fc9bac92bcb54e33a
SHA256d03d6d2b24b2011d0a12b9956eaa7a1180b92e2243834f37424efad928ef54bc
SHA512372dfc58d94ab8343f599175b0dc645b4fd7b9eadd36480ca78fc8c745198a0fc80b35bd040c52096fc53654c4815b93745ef515c1cf11bd8d821eb910c69cea
-
Filesize
944B
MD5b51dc9e5ec3c97f72b4ca9488bbb4462
SHA15c1e8c0b728cd124edcacefb399bbd5e25b21bd3
SHA256976f9534aa2976c85c2455bdde786a3f55d63aefdd40942eba1223c4c93590db
SHA5120e5aa6cf64c535aefb833e5757b68e1094c87424abe2615a7d7d26b1b31eff358d12e36e75ca57fd690a9919b776600bf4c5c0e5a5df55366ba62238bdf3f280
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
100KB
MD51b942faa8e8b1008a8c3c1004ba57349
SHA1cd99977f6c1819b12b33240b784ca816dfe2cb91
SHA256555ccb7ecd9ae52a75135fdd81ab443a49d5785b0621ed6468d28c4234e46ccc
SHA5125aee3d59478d41ddd5885c99b394c9c4983064e2b3528db1a3f7fc289662bced4f57d072517bbe7573c6d1789435e987ef1aa9cc91f372bcfd30bc016675fa43
-
Filesize
82KB
MD5b201ce5dcb58284da7a5ef6294418e56
SHA127573051f80debfd74e1a72d27cfd29f58c76d7e
SHA256188d525daed5c014ea5ae62a1fd1841d783693e41712ea58b9906cda2b60dbed
SHA512f282f9efa40ce5e753faf803079af9aae478711e6e2f3dcf09c744ae3e670c6ef0cb18b62c8e57ba825faef8c396dd481768ef0680681d4b1b80ad1c3433f11c