Analysis
-
max time kernel
82s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
Solara/Solara.exe
Resource
win10v2004-20250410-en
General
-
Target
Solara/Solara.exe
-
Size
432KB
-
MD5
3ad28512794a4e91397f2903543e7220
-
SHA1
514e414f6bbcf4fc4991d4df3b48d66c6c8efa8a
-
SHA256
115c0569f04cd121172cb2b7689a67715db4f7e33cb2c0a04eaa4de59078293b
-
SHA512
f1dc4a8f6d69cc9589e2dea82aca91c3f46da1d322e0138862d9be3ccd6754c8624cb77b37d8884f7402cc1c747845f10993aa80ac9b50e2f19feaac9589e3a6
-
SSDEEP
6144:yzEo3MgLXCbN91YdOnCjhIoCQ8uUiEXJTUfs5wOSzmaq55SeFrLVNaG:TQMgAjCaoguvE59uzmaqnx/
Malware Config
Extracted
rhadamanthys
https://135.181.4.162:2423/97e9fc994198e76/5vasbsn8.w2nxs
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2920 set thread context of 5828 2920 Solara.exe 89 -
Program crash 2 IoCs
pid pid_target Process procid_target 1148 5828 WerFault.exe 89 3036 2920 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3630502724-2561614198-3854231964-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 2348 NOTEPAD.EXE 3860 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2116 OpenWith.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2920 wrote to memory of 5828 2920 Solara.exe 89 PID 2920 wrote to memory of 5828 2920 Solara.exe 89 PID 2920 wrote to memory of 5828 2920 Solara.exe 89 PID 2920 wrote to memory of 5828 2920 Solara.exe 89 PID 2920 wrote to memory of 5828 2920 Solara.exe 89 PID 2920 wrote to memory of 5828 2920 Solara.exe 89 PID 2920 wrote to memory of 5828 2920 Solara.exe 89 PID 2920 wrote to memory of 5828 2920 Solara.exe 89 PID 2920 wrote to memory of 5828 2920 Solara.exe 89 PID 2920 wrote to memory of 5828 2920 Solara.exe 89 PID 2920 wrote to memory of 5828 2920 Solara.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Solara\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara\Solara.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5828 -s 5523⤵
- Program crash
PID:1148
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 8882⤵
- Program crash
PID:3036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5828 -ip 58281⤵PID:6032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2920 -ip 29201⤵PID:6036
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4264
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost1⤵PID:4052
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2116
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Temp1_payload.zip\Solara\Debug\Autoupdater.ini1⤵
- Opens file in notepad (likely ransom note)
PID:2348
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Temp1_payload.zip\Solara\Packaged\Main.ini1⤵
- Opens file in notepad (likely ransom note)
PID:3860