Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 17:43
Behavioral task
behavioral1
Sample
Solara.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Solara.exe
Resource
win10v2004-20250217-en
General
-
Target
Solara.exe
-
Size
44KB
-
MD5
1150929a02621ff0d0be6733e29384b9
-
SHA1
492a4b13def38b1b62c41450a3b885a18c979c52
-
SHA256
6d7a1d6a51fcb0bf6ef1068a108f53b492337f63cad4555d706e835da63519a9
-
SHA512
a98cb8995b4634e9d8fb636be85715aac9012b9809f8fb294900e3380660379575ab33c4d01b79ddf9508afa6e03847bdf26b242dbb45bcc6cd79c49486b3639
-
SSDEEP
768:ohMJ+n2DNw1N1QbEblsUUdvFFRPG9+h2P/6OOChEvmbWT:QMUn2uBEbvFw9+8/6OOC+uiT
Malware Config
Extracted
xworm
5.0
127.0.0.1:46867
10.9.76.6:46867
192.168.56.1:46867
192.168.1.6:46867
172.23.0.1:46867
disease-tattoo.gl.at.ply.gg:46867
g7MF6jpeNipSWFbJ
-
Install_directory
%AppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/memory/2532-1-0x0000000000920000-0x0000000000932000-memory.dmp family_xworm behavioral1/files/0x000a0000000120fd-36.dat family_xworm behavioral1/memory/2936-38-0x0000000000A80000-0x0000000000A92000-memory.dmp family_xworm behavioral1/memory/824-41-0x00000000003F0000-0x0000000000402000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2776 powershell.exe 2860 powershell.exe 2676 powershell.exe 2584 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk Solara.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk Solara.exe -
Executes dropped EXE 2 IoCs
pid Process 2936 svchost.exe 824 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" Solara.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1124 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2776 powershell.exe 2860 powershell.exe 2676 powershell.exe 2584 powershell.exe 2532 Solara.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2532 Solara.exe Token: SeDebugPrivilege 2776 powershell.exe Token: SeDebugPrivilege 2860 powershell.exe Token: SeDebugPrivilege 2676 powershell.exe Token: SeDebugPrivilege 2584 powershell.exe Token: SeDebugPrivilege 2532 Solara.exe Token: SeDebugPrivilege 2936 svchost.exe Token: SeDebugPrivilege 824 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2532 Solara.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2776 2532 Solara.exe 29 PID 2532 wrote to memory of 2776 2532 Solara.exe 29 PID 2532 wrote to memory of 2776 2532 Solara.exe 29 PID 2532 wrote to memory of 2860 2532 Solara.exe 31 PID 2532 wrote to memory of 2860 2532 Solara.exe 31 PID 2532 wrote to memory of 2860 2532 Solara.exe 31 PID 2532 wrote to memory of 2676 2532 Solara.exe 33 PID 2532 wrote to memory of 2676 2532 Solara.exe 33 PID 2532 wrote to memory of 2676 2532 Solara.exe 33 PID 2532 wrote to memory of 2584 2532 Solara.exe 35 PID 2532 wrote to memory of 2584 2532 Solara.exe 35 PID 2532 wrote to memory of 2584 2532 Solara.exe 35 PID 2532 wrote to memory of 1124 2532 Solara.exe 37 PID 2532 wrote to memory of 1124 2532 Solara.exe 37 PID 2532 wrote to memory of 1124 2532 Solara.exe 37 PID 2916 wrote to memory of 2936 2916 taskeng.exe 40 PID 2916 wrote to memory of 2936 2916 taskeng.exe 40 PID 2916 wrote to memory of 2936 2916 taskeng.exe 40 PID 2916 wrote to memory of 824 2916 taskeng.exe 42 PID 2916 wrote to memory of 824 2916 taskeng.exe 42 PID 2916 wrote to memory of 824 2916 taskeng.exe 42 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Solara.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Solara.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1124
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {939A1482-9C53-4ADE-BC95-F7C1F2B429E0} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:824
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5732adba27b27458bc52392c77ba8cff2
SHA10914e7dc30cccfd2f81d29023ed08b5d06933d5f
SHA25622760fdc056298741fb309ddfd272e3136b411e32f8858d9a67c71080f47d61d
SHA512ca0664cc81f091f8892bfcc338e34d85df45886411f9f28c74ed8d80aa0f3743f97877dc253dfc192209825097ea909e051dd78fd683c76980fb2d78e1279589
-
Filesize
44KB
MD51150929a02621ff0d0be6733e29384b9
SHA1492a4b13def38b1b62c41450a3b885a18c979c52
SHA2566d7a1d6a51fcb0bf6ef1068a108f53b492337f63cad4555d706e835da63519a9
SHA512a98cb8995b4634e9d8fb636be85715aac9012b9809f8fb294900e3380660379575ab33c4d01b79ddf9508afa6e03847bdf26b242dbb45bcc6cd79c49486b3639