Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2025, 19:26

General

  • Target

    Solara.exe

  • Size

    44KB

  • MD5

    cb5aa995d9843fd0f787743a2a860dec

  • SHA1

    ff1de916764d817ed1ac6dd036d5b02f1810d016

  • SHA256

    f82ebddace7d6290ddbd12051aa19e3cd1355762196936f686e26dd5e5c47b60

  • SHA512

    8c5500738e06c6701c29019a5d6bb391ae1c1e9fccbbceed0d6c44669a35450074052540ee40a100df0b9c0cc4273d618f6151c094a00538f6583f3969f03529

  • SSDEEP

    768:BFM3oVOl50FADMe/e2TJblsUUdvFFRPG9+l56OOChwvmbWp:vMK650osOevFw9+76OOC+uip

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:46867

disease-tattoo.gl.at.ply.gg:46867

Mutex

0vTMyU9SDotxIpQj

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

aes.plain

Signatures

  • Detect Xworm Payload 4 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Solara.exe
    "C:\Users\Admin\AppData\Local\Temp\Solara.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Solara.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2260
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Solara.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2720
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2948
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2916
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2664
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {4AEFE119-7936-49E5-9C8E-E445A8372811} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      C:\Users\Admin\AppData\Roaming\svchost.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2404
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      C:\Users\Admin\AppData\Roaming\svchost.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:628
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      C:\Users\Admin\AppData\Roaming\svchost.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    0e676b080d32a2aa641b65a8ee1f3eba

    SHA1

    5af6fae3896a2f267ddd1845c744ac3fa1dcdd6b

    SHA256

    9fc3c521f3014c461bc78ee2f5d1470aaca37eef9f038fc82093d0383007887b

    SHA512

    e7037328fdf6a5487d1b353e3fc334b16527be6abb72f3ee8db3aa1b298d631a581732aaa24141cb988b739c6bb77d7e74b9f13833a14e52d558f3fb06a780db

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    44KB

    MD5

    cb5aa995d9843fd0f787743a2a860dec

    SHA1

    ff1de916764d817ed1ac6dd036d5b02f1810d016

    SHA256

    f82ebddace7d6290ddbd12051aa19e3cd1355762196936f686e26dd5e5c47b60

    SHA512

    8c5500738e06c6701c29019a5d6bb391ae1c1e9fccbbceed0d6c44669a35450074052540ee40a100df0b9c0cc4273d618f6151c094a00538f6583f3969f03529

  • memory/2260-6-0x0000000002990000-0x0000000002A10000-memory.dmp

    Filesize

    512KB

  • memory/2260-7-0x000000001B760000-0x000000001BA42000-memory.dmp

    Filesize

    2.9MB

  • memory/2260-8-0x0000000001FC0000-0x0000000001FC8000-memory.dmp

    Filesize

    32KB

  • memory/2264-40-0x0000000000020000-0x0000000000032000-memory.dmp

    Filesize

    72KB

  • memory/2400-32-0x000007FEF5023000-0x000007FEF5024000-memory.dmp

    Filesize

    4KB

  • memory/2400-0-0x000007FEF5023000-0x000007FEF5024000-memory.dmp

    Filesize

    4KB

  • memory/2400-1-0x0000000000A00000-0x0000000000A12000-memory.dmp

    Filesize

    72KB

  • memory/2404-36-0x00000000011B0000-0x00000000011C2000-memory.dmp

    Filesize

    72KB

  • memory/2720-15-0x0000000002340000-0x0000000002348000-memory.dmp

    Filesize

    32KB

  • memory/2720-14-0x000000001B730000-0x000000001BA12000-memory.dmp

    Filesize

    2.9MB