Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 01:41
Static task
static1
General
-
Target
BootstrapperNew.exe
-
Size
3.2MB
-
MD5
7e5b05edd4fc5123a6156664e4c37163
-
SHA1
c686009d9f8a4d4c66236c77bbc3d7a0380e4bb7
-
SHA256
eed32abbafc11dcb93a5657cc4a5c651d620b4be6fb935e322de765d3d005b16
-
SHA512
5bab95aa627fe696f05d0d6ebd77e43050b9071e1d753c08e52fe85338018163e773ff8d638c07d789030315ba75ec5379ce55858a4ede72e2db08049b3d9311
-
SSDEEP
98304:zOq7GTRgy8ao7iHl5CjjTwL1cLoGkqI2ouIAS:ibRSVECVkX8
Malware Config
Extracted
xworm
127.0.0.1:34930
minimum-ball.gl.at.ply.gg:34930
-
Install_directory
%AppData%
-
install_file
SolaraX.exe
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023c52-6.dat family_umbral behavioral1/memory/1512-16-0x0000027DFE100000-0x0000027DFE140000-memory.dmp family_umbral -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023c59-27.dat family_xworm behavioral1/memory/764-38-0x0000000000EF0000-0x0000000000F08000-memory.dmp family_xworm -
Umbral family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 688 powershell.exe 4240 powershell.exe 1744 powershell.exe 1100 powershell.exe 3968 powershell.exe 5088 powershell.exe 1600 powershell.exe 3676 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts Solara.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation SolaraX.exe Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation BootstrapperNew.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SolaraX.lnk SolaraX.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SolaraX.lnk SolaraX.exe -
Executes dropped EXE 5 IoCs
pid Process 1512 Solara.exe 812 SolaraNew.exe 764 SolaraX.exe 3344 SolaraX.exe 3416 SolaraX.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SolaraX = "C:\\Users\\Admin\\AppData\\Roaming\\SolaraX.exe" SolaraX.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 19 discord.com 31 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 3584 wmic.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2644 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 688 powershell.exe 688 powershell.exe 1600 powershell.exe 1600 powershell.exe 3676 powershell.exe 3676 powershell.exe 4240 powershell.exe 4240 powershell.exe 3088 powershell.exe 3088 powershell.exe 1744 powershell.exe 1744 powershell.exe 1100 powershell.exe 1100 powershell.exe 3968 powershell.exe 3968 powershell.exe 5088 powershell.exe 5088 powershell.exe 764 SolaraX.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 764 SolaraX.exe Token: SeDebugPrivilege 1512 Solara.exe Token: SeDebugPrivilege 688 powershell.exe Token: SeDebugPrivilege 1600 powershell.exe Token: SeDebugPrivilege 3676 powershell.exe Token: SeDebugPrivilege 4240 powershell.exe Token: SeDebugPrivilege 3088 powershell.exe Token: SeDebugPrivilege 1744 powershell.exe Token: SeDebugPrivilege 1100 powershell.exe Token: SeIncreaseQuotaPrivilege 1976 wmic.exe Token: SeSecurityPrivilege 1976 wmic.exe Token: SeTakeOwnershipPrivilege 1976 wmic.exe Token: SeLoadDriverPrivilege 1976 wmic.exe Token: SeSystemProfilePrivilege 1976 wmic.exe Token: SeSystemtimePrivilege 1976 wmic.exe Token: SeProfSingleProcessPrivilege 1976 wmic.exe Token: SeIncBasePriorityPrivilege 1976 wmic.exe Token: SeCreatePagefilePrivilege 1976 wmic.exe Token: SeBackupPrivilege 1976 wmic.exe Token: SeRestorePrivilege 1976 wmic.exe Token: SeShutdownPrivilege 1976 wmic.exe Token: SeDebugPrivilege 1976 wmic.exe Token: SeSystemEnvironmentPrivilege 1976 wmic.exe Token: SeRemoteShutdownPrivilege 1976 wmic.exe Token: SeUndockPrivilege 1976 wmic.exe Token: SeManageVolumePrivilege 1976 wmic.exe Token: 33 1976 wmic.exe Token: 34 1976 wmic.exe Token: 35 1976 wmic.exe Token: 36 1976 wmic.exe Token: SeIncreaseQuotaPrivilege 1976 wmic.exe Token: SeSecurityPrivilege 1976 wmic.exe Token: SeTakeOwnershipPrivilege 1976 wmic.exe Token: SeLoadDriverPrivilege 1976 wmic.exe Token: SeSystemProfilePrivilege 1976 wmic.exe Token: SeSystemtimePrivilege 1976 wmic.exe Token: SeProfSingleProcessPrivilege 1976 wmic.exe Token: SeIncBasePriorityPrivilege 1976 wmic.exe Token: SeCreatePagefilePrivilege 1976 wmic.exe Token: SeBackupPrivilege 1976 wmic.exe Token: SeRestorePrivilege 1976 wmic.exe Token: SeShutdownPrivilege 1976 wmic.exe Token: SeDebugPrivilege 1976 wmic.exe Token: SeSystemEnvironmentPrivilege 1976 wmic.exe Token: SeRemoteShutdownPrivilege 1976 wmic.exe Token: SeUndockPrivilege 1976 wmic.exe Token: SeManageVolumePrivilege 1976 wmic.exe Token: 33 1976 wmic.exe Token: 34 1976 wmic.exe Token: 35 1976 wmic.exe Token: 36 1976 wmic.exe Token: SeDebugPrivilege 3968 powershell.exe Token: SeIncreaseQuotaPrivilege 3884 wmic.exe Token: SeSecurityPrivilege 3884 wmic.exe Token: SeTakeOwnershipPrivilege 3884 wmic.exe Token: SeLoadDriverPrivilege 3884 wmic.exe Token: SeSystemProfilePrivilege 3884 wmic.exe Token: SeSystemtimePrivilege 3884 wmic.exe Token: SeProfSingleProcessPrivilege 3884 wmic.exe Token: SeIncBasePriorityPrivilege 3884 wmic.exe Token: SeCreatePagefilePrivilege 3884 wmic.exe Token: SeBackupPrivilege 3884 wmic.exe Token: SeRestorePrivilege 3884 wmic.exe Token: SeShutdownPrivilege 3884 wmic.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 764 SolaraX.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 788 wrote to memory of 1512 788 BootstrapperNew.exe 85 PID 788 wrote to memory of 1512 788 BootstrapperNew.exe 85 PID 788 wrote to memory of 812 788 BootstrapperNew.exe 86 PID 788 wrote to memory of 812 788 BootstrapperNew.exe 86 PID 788 wrote to memory of 764 788 BootstrapperNew.exe 87 PID 788 wrote to memory of 764 788 BootstrapperNew.exe 87 PID 1512 wrote to memory of 688 1512 Solara.exe 88 PID 1512 wrote to memory of 688 1512 Solara.exe 88 PID 1512 wrote to memory of 1600 1512 Solara.exe 92 PID 1512 wrote to memory of 1600 1512 Solara.exe 92 PID 1512 wrote to memory of 3676 1512 Solara.exe 94 PID 1512 wrote to memory of 3676 1512 Solara.exe 94 PID 764 wrote to memory of 4240 764 SolaraX.exe 96 PID 764 wrote to memory of 4240 764 SolaraX.exe 96 PID 1512 wrote to memory of 3088 1512 Solara.exe 98 PID 1512 wrote to memory of 3088 1512 Solara.exe 98 PID 764 wrote to memory of 1744 764 SolaraX.exe 100 PID 764 wrote to memory of 1744 764 SolaraX.exe 100 PID 764 wrote to memory of 1100 764 SolaraX.exe 102 PID 764 wrote to memory of 1100 764 SolaraX.exe 102 PID 1512 wrote to memory of 1976 1512 Solara.exe 104 PID 1512 wrote to memory of 1976 1512 Solara.exe 104 PID 764 wrote to memory of 3968 764 SolaraX.exe 107 PID 764 wrote to memory of 3968 764 SolaraX.exe 107 PID 1512 wrote to memory of 3884 1512 Solara.exe 109 PID 1512 wrote to memory of 3884 1512 Solara.exe 109 PID 1512 wrote to memory of 1716 1512 Solara.exe 111 PID 1512 wrote to memory of 1716 1512 Solara.exe 111 PID 1512 wrote to memory of 5088 1512 Solara.exe 113 PID 1512 wrote to memory of 5088 1512 Solara.exe 113 PID 1512 wrote to memory of 3584 1512 Solara.exe 115 PID 1512 wrote to memory of 3584 1512 Solara.exe 115 PID 764 wrote to memory of 2644 764 SolaraX.exe 118 PID 764 wrote to memory of 2644 764 SolaraX.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Solara.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3088
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:1716
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
PID:3584
-
-
-
C:\Users\Admin\AppData\Local\Temp\SolaraNew.exe"C:\Users\Admin\AppData\Local\Temp\SolaraNew.exe"2⤵
- Executes dropped EXE
PID:812
-
-
C:\Users\Admin\AppData\Local\Temp\SolaraX.exe"C:\Users\Admin\AppData\Local\Temp\SolaraX.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\SolaraX.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SolaraX.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\SolaraX.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SolaraX.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SolaraX" /tr "C:\Users\Admin\AppData\Roaming\SolaraX.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2644
-
-
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
PID:3344
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe1⤵
- Executes dropped EXE
PID:3416
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
948B
MD517d8127be94d3c1b6fcc9a4ed585003e
SHA1789874fcc7c778c723f3e89822d8cc8750c6c4c8
SHA256ea357ad1f95863b3618d31e5b0f90495331f64de2b784d9e185b48668c937a7b
SHA512bb18b6d07d82227f5cfbe3eb460df79ec892c560ad2964dcd4782aa26336ae15059843bf46a739bdd4a4daa58057f99102531a756a1cf434ce6449b3cd35a98e
-
Filesize
1KB
MD5244d9cf0a4651b42e7e6ff0dbd754c01
SHA12c474ea8e49a68452fa2832a61a5feb2a9b96d06
SHA2561d6bf92d3d3bd0a91b979c181e264716b3558cf4336a1737820523fd70254f12
SHA512a819c5ac7569b29f345c26f3b665b66826bbd8a7c22cf25e0fd0a6f556a332a9f90ee3347d77cfc8109a28af70b8fbdce3a719e8ff7bc8006b7d78b2c31fb939
-
Filesize
944B
MD5dcb1d875e651037e09d7457b4da582d7
SHA11bdf4a3355a41aca624b2ab63301c4f1485a3ff4
SHA25603a42b0929feb2092246507451be4d2d81ae9d80be3c42464fb4afc1aef2eeb5
SHA512e2788161375e6a0f9a23124eaefce8771c6c1a229937896e0bff4e13cb66112eee658ea04a7669e0db57839a36b5d17ba0a3213763ad7a48fdd4797bf7dc2c5f
-
Filesize
944B
MD598baf5117c4fcec1692067d200c58ab3
SHA15b33a57b72141e7508b615e17fb621612cb8e390
SHA25630bf8496e9a08f4fdfe4767abcd565f92b6da06ca1c7823a70cb7cab16262e51
SHA512344a70bfc037d54176f12db91f05bf4295bb587a5062fd1febe6f52853571170bd8ef6042cb87b893185bbae1937cf77b679d7970f8cc1c2666b0b7c1b32987d
-
Filesize
944B
MD534f595487e6bfd1d11c7de88ee50356a
SHA14caad088c15766cc0fa1f42009260e9a02f953bb
SHA2560f9a4b52e01cb051052228a55d0515911b7ef5a8db3cf925528c746df511424d
SHA51210976c5deaf9fac449e703e852c3b08d099f430de2d7c7b8e2525c35d63e28b890e5aab63feff9b20bca0aaf9f35a3ba411aee3fbeee9ea59f90ed25bd617a0b
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
227KB
MD5bbd1b92a0e94bf1f227d32711bb436ea
SHA12e8e3dc48fd65826044b1136ae1ea977c40dc3bd
SHA256b45452e51c142d03827435699e9f60027b71d38dda754dd503ee4a12f8b9ffc6
SHA512fd076757149a1fad1fb762d2ddf6e454012a45a16f8ce24219d872839e5bd7bb9898f8b4b3a4ebd90b59fe9c39c4728def5aa3de02c839ecbb0b2da005e2899b
-
Filesize
2.9MB
MD5f227cdfd423b3cc03bb69c49babf4da3
SHA13db5a97d9b0f2545e7ba97026af6c28512200441
SHA256cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8
SHA512b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e
-
Filesize
74KB
MD5aef41983064b12d1e648100e8141bf19
SHA1b258d4a810e818e9c9dcaba62f75f34036b60fcd
SHA256834bcea2665dc99b4c16fe87095f3e2b44e2e013ec1017407a061a1203c2f3cf
SHA5122e4e3fdf7cd1892b73cf1989dfd82d91c677653a4501f44bb2d74b153b72982e069998b5bef097a7645970838c13ac86ec546173f6baf3afb7cbc26e6c9d5524
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82