download: | /quivings/Solara/raw/main/Files/SolaraB.zip |
Full analysis: | https://app.any.run/tasks/7040de35-392d-4c32-b76d-1788062c9b53 |
Verdict: | Malicious activity |
Analysis date: | July 22, 2024, 23:31:11 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/zip |
File info: | Zip archive data, at least v2.0 to extract, compression method=store |
MD5: | 4EC8143B6DBE27870CF8333711FF5096 |
SHA1: | 693D467EBEC348469011FFEF1BD370B113653147 |
SHA256: | 2510BE907EC476E8375AC7B5431536AE9A32BF99FE77AB695A5100852B111B96 |
SSDEEP: | 96:EUqjU52FPuD85CRbXQSQ4Bl1ZP5MaOS5ZTDCJvuB66EFscY7LO4ivJEzmqAZdXRD:EU+FuNQt6JP5GS5NGMYE7TogARskfl |
.zip | | | ZIP compressed archive (100) |
---|
ZipRequiredVersion: | 20 |
---|---|
ZipBitFlag: | - |
ZipCompression: | None |
ZipModifyDate: | 2024:05:19 18:25:22 |
ZipCRC: | 0x00000000 |
ZipCompressedSize: | - |
ZipUncompressedSize: | - |
ZipFileName: | SolaraB/Solara/ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1264 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\SolaraB.zip | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
1504 | "C:\Users\admin\Desktop\SolaraB\Solara\SolaraBootstrapper.exe" | C:\Users\admin\Desktop\SolaraB\Solara\SolaraBootstrapper.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: SolaraBootstrapper Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
1568 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
3336 | "C:\Users\admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe" | C:\Users\admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe | SolaraBootstrapper.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: WpfApp1 Exit code: 4294967295 Version: 1.0.0.0 Modules
| |||||||||||||||
4940 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | SolaraBootstrapper.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
5032 | C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding | C:\Windows\System32\rundll32.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
5276 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
5560 | "C:\Users\admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe" | C:\Users\admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe | SolaraBootstrapper.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: WpfApp1 Version: 1.0.0.0 Modules
| |||||||||||||||
6284 | "C:\Users\admin\Desktop\SolaraB\Solara\SolaraBootstrapper.exe" | C:\Users\admin\Desktop\SolaraB\Solara\SolaraBootstrapper.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: SolaraBootstrapper Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
6944 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | SolaraBootstrapper.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
|
(PID) Process: | (1264) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtBMP |
Value: | |||
(PID) Process: | (1264) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtIcon |
Value: | |||
(PID) Process: | (1264) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip | |||
(PID) Process: | (1264) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\SolaraB.zip | |||
(PID) Process: | (1264) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | name |
Value: 120 | |||
(PID) Process: | (1264) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | size |
Value: 80 | |||
(PID) Process: | (1264) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | type |
Value: 120 | |||
(PID) Process: | (1264) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | mtime |
Value: 100 | |||
(PID) Process: | (1504) SolaraBootstrapper.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing |
Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
(PID) Process: | (1504) SolaraBootstrapper.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SolaraBootstrapper_RASAPI32 |
Operation: | write | Name: | EnableFileTracing |
Value: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
1504 | SolaraBootstrapper.exe | C:\Users\admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.dll | executable | |
MD5:4D326696FFD80A5BEE016C8B397442C2 | SHA256:DB03B4536FBFDCB570945F5942546A19AFE20A7826713BF12F34347EE618F2CA | |||
1504 | SolaraBootstrapper.exe | C:\Users\admin\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\node_modules\accepts\index.js | binary | |
MD5:4FE4D2C90A2FD19D6E97443A7D24F815 | SHA256:BE2DECBD50610E8F995C1E312EE4DD6D7C1244CFDF03EE4C4A3DA68E572DADA1 | |||
1504 | SolaraBootstrapper.exe | C:\Users\admin\AppData\Local\Temp\Solara.Dir\Microsoft.Web.WebView2.Wpf.dll | executable | |
MD5:34EC990ED346EC6A4F14841B12280C20 | SHA256:1E987B22CD011E4396A0805C73539586B67DF172DF75E3DDED16A77D31850409 | |||
1504 | SolaraBootstrapper.exe | C:\Users\admin\AppData\Local\Temp\Solara.Dir\libcurl.dll | executable | |
MD5:E31F5136D91BAD0FCBCE053AAC798A30 | SHA256:EE94E2201870536522047E6D7FE7B903A63CD2E13E20C8FFFC86D0E95361E671 | |||
1504 | SolaraBootstrapper.exe | C:\Users\admin\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\index.js | binary | |
MD5:E462FB7561F6C9BCCB24E62BB93889D2 | SHA256:FF3FC42D5F912950D1095C43C8EDB8A3BE63C8EEE9DB5CA5D39D5668F68F7B41 | |||
1504 | SolaraBootstrapper.exe | C:\Users\admin\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\node_modules\body-parser\lib\types\urlencoded.js | binary | |
MD5:906A833480CE8841BFA5AEB95B5C085F | SHA256:752717D87AAD57451638AF2073B04EBA964F348910C0BCF0070C43E732DE5EB2 | |||
1504 | SolaraBootstrapper.exe | C:\Users\admin\AppData\Local\Temp\Solara.Dir\bin\version.txt | text | |
MD5:3FFB7E1BE9CDF02EA2F5C403BA1BB670 | SHA256:604751D1D0DE6684FA3D1736599868B1BD8641615F1B1593EAC854CD4589CD27 | |||
1504 | SolaraBootstrapper.exe | C:\Users\admin\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\node_modules\accepts\package.json | binary | |
MD5:32A15D6909FCAE63E52D8664593D32D5 | SHA256:E5716D5D939DB08C5C28EC6AE86ED67BE5320F91089E2673FCA1C5B876E57AA3 | |||
1504 | SolaraBootstrapper.exe | C:\Users\admin\AppData\Local\Temp\Solara.zip | compressed | |
MD5:6C9278827B591E47A451829B8E781D41 | SHA256:E2FDD98EF973F17B70D1B4319649F1C72DFF407F2A2C35CF051C2F5A23449449 | |||
1504 | SolaraBootstrapper.exe | C:\Users\admin\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\node_modules\array-flatten\package.json | binary | |
MD5:CB1AA7F817100A03395DD0163BF6EBE9 | SHA256:5C5E0E10CFA23F163D1FE68AA57A881D09CAC39D720E1361C697B86C4D33E0F5 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
760 | lsass.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAz1vQYrVgL0erhQLCPM8GY%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2628 | RUXIMICS.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6012 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3800 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4204 | svchost.exe | 4.208.221.206:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
7124 | slui.exe | 20.83.72.98:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
1568 | slui.exe | 20.83.72.98:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
1504 | SolaraBootstrapper.exe | 140.82.121.4:443 | github.com | GITHUB | US | unknown |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
github.com |
| shared |
raw.githubusercontent.com |
| shared |
www.bing.com |
| whitelisted |
login.live.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
arc.msn.com |
| whitelisted |
fd.api.iris.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Not Suspicious Traffic | INFO [ANY.RUN] Attempting to access raw user content on GitHub |