File name:

SolaraV3.exe

Full analysis: https://app.any.run/tasks/0af5b7d0-ce94-41db-a356-02d0f662dd2d
Verdict: Malicious activity
Threats:

Blank Grabber is an infostealer written in Python. It is designed to steal a wide array of data, such as browser login credentials, crypto wallets, Telegram sessions, and Discord tokens. It is an open-source malware, with its code available on GitHub and regularly receiving updates. Blank Grabber builder’s simple interface lets threat actors even with basic skills to deploy it and conduct attacks.

Analysis date: September 29, 2024, 23:59:00
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
uac
evasion
blankgrabber
discord
stealer
exfiltration
pyinstaller
susp-powershell
discordgrabber
generic
growtopia
ims-api
upx
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (GUI) x86-64, for MS Windows
MD5:

031A05DC463314DF4904B6AAB7ABB56D

SHA1:

D98F758B0126CC2BBFC59D38B23F59EBC8E21C18

SHA256:

6F722A19A4B6CE08194823F304F49D31B04FA5D9F609F5DDE0FF63BBF307F040

SSDEEP:

98304:66CwbRk+yQq4ANCz0dz3MCF7mbEelmPuxKS1HmTdozujquT3Jb3n64AMXGYwcnDr:y7/V1ppxy27bT

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • BlankGrabber has been detected

      • SolaraV3.exe (PID: 2108)
      • SolaraV3.exe (PID: 6780)
    • Bypass User Account Control (Modify registry)

      • reg.exe (PID: 5244)
    • Bypass User Account Control (ComputerDefaults)

      • ComputerDefaults.exe (PID: 4668)
    • Windows Defender preferences modified via 'Set-MpPreference'

      • cmd.exe (PID: 3916)
    • Adds path to the Windows Defender exclusion list

      • cmd.exe (PID: 5212)
      • SolaraV3.exe (PID: 2268)
      • cmd.exe (PID: 1964)
    • Antivirus name has been found in the command line (generic signature)

      • cmd.exe (PID: 3916)
      • MpCmdRun.exe (PID: 8152)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 7248)
    • Changes powershell execution policy (Bypass)

      • cmd.exe (PID: 3812)
    • DISCORDGRABBER has been detected (YARA)

      • SolaraV3.exe (PID: 2268)
    • GROWTOPIA has been detected (YARA)

      • SolaraV3.exe (PID: 2268)
    • BLANKGRABBER has been detected (SURICATA)

      • SolaraV3.exe (PID: 2268)
    • Stealers network behavior

      • SolaraV3.exe (PID: 2268)
    • Starts CMD.EXE for self-deleting

      • SolaraV3.exe (PID: 2268)
  • SUSPICIOUS

    • Starts a Microsoft application from unusual location

      • SolaraV3.exe (PID: 2108)
      • SolaraV3.exe (PID: 3332)
      • SolaraV3.exe (PID: 6780)
      • SolaraV3.exe (PID: 2268)
    • Process drops legitimate windows executable

      • SolaraV3.exe (PID: 2108)
      • SolaraV3.exe (PID: 6780)
      • SolaraV3.exe (PID: 2268)
    • Executable content was dropped or overwritten

      • SolaraV3.exe (PID: 2108)
      • SolaraV3.exe (PID: 6780)
      • SolaraV3.exe (PID: 2268)
      • csc.exe (PID: 8188)
    • The process drops C-runtime libraries

      • SolaraV3.exe (PID: 2108)
      • SolaraV3.exe (PID: 6780)
    • Process drops python dynamic module

      • SolaraV3.exe (PID: 2108)
      • SolaraV3.exe (PID: 6780)
    • Application launched itself

      • SolaraV3.exe (PID: 2108)
      • SolaraV3.exe (PID: 6780)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 6544)
      • cmd.exe (PID: 6968)
      • cmd.exe (PID: 7096)
    • Starts CMD.EXE for commands execution

      • SolaraV3.exe (PID: 3332)
      • SolaraV3.exe (PID: 2268)
    • Changes default file association

      • reg.exe (PID: 5244)
    • Found strings related to reading or modifying Windows Defender settings

      • SolaraV3.exe (PID: 3332)
      • SolaraV3.exe (PID: 2268)
    • Uses WEVTUTIL.EXE to query events from a log or log file

      • cmd.exe (PID: 876)
      • cmd.exe (PID: 6540)
    • Get information on the list of running processes

      • SolaraV3.exe (PID: 2268)
      • cmd.exe (PID: 1308)
      • cmd.exe (PID: 4892)
      • cmd.exe (PID: 4664)
      • cmd.exe (PID: 1656)
    • Script disables Windows Defender's IPS

      • cmd.exe (PID: 3916)
    • Script disables Windows Defender's real-time protection

      • cmd.exe (PID: 3916)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 3916)
      • cmd.exe (PID: 5212)
      • cmd.exe (PID: 1964)
      • cmd.exe (PID: 3812)
      • cmd.exe (PID: 1460)
      • cmd.exe (PID: 1224)
      • cmd.exe (PID: 7636)
      • cmd.exe (PID: 8028)
      • cmd.exe (PID: 7316)
    • Uses WMIC.EXE to obtain Windows Installer data

      • cmd.exe (PID: 6984)
      • cmd.exe (PID: 876)
      • cmd.exe (PID: 6032)
    • Script adds exclusion path to Windows Defender

      • cmd.exe (PID: 5212)
      • cmd.exe (PID: 1964)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 1156)
    • Uses NETSH.EXE to obtain data on the network

      • cmd.exe (PID: 532)
    • Starts application with an unusual extension

      • cmd.exe (PID: 2064)
      • cmd.exe (PID: 7660)
      • cmd.exe (PID: 7404)
      • cmd.exe (PID: 7776)
      • cmd.exe (PID: 7908)
      • cmd.exe (PID: 8024)
    • Uses WMIC.EXE to obtain a list of video controllers

      • cmd.exe (PID: 3372)
      • cmd.exe (PID: 3972)
      • cmd.exe (PID: 6232)
    • Uses SYSTEMINFO.EXE to read the environment

      • cmd.exe (PID: 4008)
    • CSC.EXE is used to compile C# code

      • csc.exe (PID: 8188)
    • BASE64 encoded PowerShell command has been detected

      • cmd.exe (PID: 3812)
    • Base64-obfuscated command line is found

      • cmd.exe (PID: 3812)
    • The process bypasses the loading of PowerShell profile settings

      • cmd.exe (PID: 3812)
    • The executable file from the user directory is run by the CMD process

      • rar.exe (PID: 4068)
    • Uses WMIC.EXE to obtain operating system information

      • cmd.exe (PID: 7840)
    • Uses WMIC.EXE to obtain computer system information

      • cmd.exe (PID: 8008)
    • Possible usage of Discord/Telegram API has been detected (YARA)

      • SolaraV3.exe (PID: 2268)
    • Checks for external IP

      • svchost.exe (PID: 2256)
      • SolaraV3.exe (PID: 2268)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 4560)
    • Hides command output

      • cmd.exe (PID: 4560)
  • INFO

    • Reads the computer name

      • SolaraV3.exe (PID: 2108)
      • SolaraV3.exe (PID: 6780)
    • Create files in a temporary directory

      • SolaraV3.exe (PID: 2108)
      • SolaraV3.exe (PID: 3332)
      • SolaraV3.exe (PID: 6780)
      • SolaraV3.exe (PID: 2268)
    • Checks supported languages

      • SolaraV3.exe (PID: 2108)
      • SolaraV3.exe (PID: 3332)
      • SolaraV3.exe (PID: 6780)
      • SolaraV3.exe (PID: 2268)
    • The process uses the downloaded file

      • cmd.exe (PID: 1336)
    • Reads security settings of Internet Explorer

      • ComputerDefaults.exe (PID: 4668)
    • The Powershell gets current clipboard

      • powershell.exe (PID: 1156)
    • PyInstaller has been detected (YARA)

      • SolaraV3.exe (PID: 6780)
      • SolaraV3.exe (PID: 2268)
    • Displays MAC addresses of computer network adapters

      • getmac.exe (PID: 2932)
    • Found Base64 encoded reflection usage via PowerShell (YARA)

      • SolaraV3.exe (PID: 2268)
    • UPX packer has been detected

      • SolaraV3.exe (PID: 2268)
    • Attempting to use instant messaging service

      • SolaraV3.exe (PID: 2268)
      • svchost.exe (PID: 2256)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

ims-api

(PID) Process(2268) SolaraV3.exe
Discord-Webhook-Tokens (1)1279610116131389570/5EodVOfV7vKlKvxe2bJjP_IcSs2v5gxj-zDOPmaY9-B6G1xf-_tEZBpZPg9Vt-BnvSXc
Discord-Info-Links
1279610116131389570/5EodVOfV7vKlKvxe2bJjP_IcSs2v5gxj-zDOPmaY9-B6G1xf-_tEZBpZPg9Vt-BnvSXc
Get Webhook Infohttps://discord.com/api/webhooks/1279610116131389570/5EodVOfV7vKlKvxe2bJjP_IcSs2v5gxj-zDOPmaY9-B6G1xf-_tEZBpZPg9Vt-BnvSXc
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:09:17 12:22:38+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.4
CodeSize: 172032
InitializedDataSize: 94208
UninitializedDataSize: -
EntryPoint: 0xcdb0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 10.0.19041.1
ProductVersionNumber: 10.0.19041.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Microsoft Corporation
FileDescription: Extended Copy Utility
FileVersion: 10.0.19041.1 (WinBuild.160101.0800)
InternalName: xcopy
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFileName: XCOPY.EXE
ProductName: Microsoft® Windows® Operating System
ProductVersion: 10.0.19041.1
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
257
Monitored processes
140
Malicious processes
8
Suspicious processes
5

Behavior graph

Click at the process to see the details
start #BLANKGRABBER solarav3.exe solarav3.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs wevtutil.exe no specs cmd.exe no specs conhost.exe no specs computerdefaults.exe no specs computerdefaults.exe no specs computerdefaults.exe THREAT solarav3.exe cmd.exe no specs conhost.exe no specs wevtutil.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs #BLANKGRABBER solarav3.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs powershell.exe no specs wmic.exe no specs powershell.exe no specs mshta.exe no specs svchost.exe cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs attrib.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs tasklist.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs tasklist.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs powershell.exe no specs netsh.exe no specs tasklist.exe no specs tree.com no specs reg.exe no specs powershell.exe no specs systeminfo.exe no specs cmd.exe no specs conhost.exe no specs tree.com no specs cmd.exe no specs conhost.exe no specs tree.com no specs cmd.exe no specs conhost.exe no specs tree.com no specs cmd.exe no specs conhost.exe no specs tree.com no specs cmd.exe no specs conhost.exe no specs tiworker.exe no specs tree.com no specs mpcmdrun.exe no specs csc.exe cvtres.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs getmac.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs rar.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs ping.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
132\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
240\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
400\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
448ping localhost -n 3 C:\Windows\System32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\dnsapi.dll
532C:\WINDOWS\system32\cmd.exe /c "netsh wlan show profile"C:\Windows\System32\cmd.exeSolaraV3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
608\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
796\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
876C:\WINDOWS\system32\cmd.exe /c "wevtutil qe "Microsoft-Windows-Windows Defender/Operational" /f:text"C:\Windows\System32\cmd.exeSolaraV3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
876C:\WINDOWS\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"C:\Windows\System32\cmd.exeSolaraV3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
904C:\WINDOWS\system32\cmd.exe /c "C:\Users\admin\AppData\Local\Temp\_MEI67802\rar.exe a -r -hp"meow" "C:\Users\admin\AppData\Local\Temp\3odoT.zip" *"C:\Windows\System32\cmd.exeSolaraV3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
Total events
60 622
Read events
60 610
Write events
8
Delete events
4

Modification events

(PID) Process:(5244) reg.exeKey:HKEY_CLASSES_ROOT\ms-settings\shell\open\command
Operation:writeName:DelegateExecute
Value:
(PID) Process:(4668) ComputerDefaults.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(4668) ComputerDefaults.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(4668) ComputerDefaults.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(4668) ComputerDefaults.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6592) reg.exeKey:HKEY_CLASSES_ROOT\ms-settings\shell\open\command
Operation:delete keyName:(default)
Value:
(PID) Process:(6592) reg.exeKey:HKEY_CLASSES_ROOT\ms-settings\shell\open
Operation:delete keyName:(default)
Value:
(PID) Process:(6592) reg.exeKey:HKEY_CLASSES_ROOT\ms-settings\shell
Operation:delete keyName:(default)
Value:
(PID) Process:(6592) reg.exeKey:HKEY_CLASSES_ROOT\ms-settings
Operation:delete keyName:(default)
Value:
(PID) Process:(2268) SolaraV3.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Multimedia\DrawDib
Operation:writeName: 1280x720x32(BGR 0)
Value:
31,31,31,31
Executable files
38
Suspicious files
16
Text files
56
Unknown types
0

Dropped files

PID
Process
Filename
Type
2108SolaraV3.exeC:\Users\admin\AppData\Local\Temp\_MEI21082\_bz2.pydexecutable
MD5:82E4F19C1E53EE3E46913D4DF0550AF7
SHA256:78208DA0890AAFC68999C94AC52F1D5383EA75364EAF1A006D8B623ABE0A6BF0
2108SolaraV3.exeC:\Users\admin\AppData\Local\Temp\_MEI21082\base_library.zipcompressed
MD5:ABA776964E87291A556A2D5389476D1E
SHA256:A9790E38C2E50F57E9B892AE16EBF726AF09B185342B76BA57EB600B2D8994D6
2108SolaraV3.exeC:\Users\admin\AppData\Local\Temp\_MEI21082\_ssl.pydexecutable
MD5:E33BF2BC6C19BF37C3CC8BAC6843D886
SHA256:E3532D3F8C5E54371F827B9E6D0FEE175AD0B2B17E25C26FDFB4EFD5126B7288
2108SolaraV3.exeC:\Users\admin\AppData\Local\Temp\_MEI21082\libssl-3.dllexecutable
MD5:264BE59FF04E5DCD1D020F16AAB3C8CB
SHA256:358B59DA9580E7102ADFC1BE9400ACEA18BC49474DB26F2F8BACB4B8839CE49D
2108SolaraV3.exeC:\Users\admin\AppData\Local\Temp\_MEI21082\_lzma.pydexecutable
MD5:BAD668BBF4F0D15429F66865AF4C117B
SHA256:45B1FCDF4F3F97F9881AAA98B00046C4045B897F4095462C0BC4631DBADAC486
2108SolaraV3.exeC:\Users\admin\AppData\Local\Temp\_MEI21082\blank.aesbinary
MD5:A10E5E525212B9C2F73ED543991E8F4F
SHA256:D44B86328D878BA031E9A9CDE119EC15674FEF1D2B65B2CB3E8ED82ABC05A8DC
2108SolaraV3.exeC:\Users\admin\AppData\Local\Temp\_MEI21082\libcrypto-3.dllexecutable
MD5:7F1B899D2015164AB951D04EBB91E9AC
SHA256:41201D2F29CF3BC16BF32C8CECF3B89E82FEC3E5572EB38A578AE0FB0C5A2986
2108SolaraV3.exeC:\Users\admin\AppData\Local\Temp\_MEI21082\_ctypes.pydexecutable
MD5:FA360B7044312E7404704E1A485876D2
SHA256:F06C3491438F6685938789C319731DDF64BA1DA02CD71F43AB8829AF0E3F4E2F
2108SolaraV3.exeC:\Users\admin\AppData\Local\Temp\_MEI21082\libffi-8.dllexecutable
MD5:08B000C3D990BC018FCB91A1E175E06E
SHA256:135C772B42BA6353757A4D076CE03DBF792456143B42D25A62066DA46144FECE
2108SolaraV3.exeC:\Users\admin\AppData\Local\Temp\_MEI21082\rarreg.keytext
MD5:4531984CAD7DACF24C086830068C4ABE
SHA256:58209C8AB4191E834FFE2ECD003FD7A830D3650F0FD1355A74EB8A47C61D4211
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
30
DNS requests
8
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2268
SolaraV3.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
shared
7116
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
204
142.250.185.67:443
https://gstatic.com/generate_204
unknown
unknown
2268
SolaraV3.exe
GET
200
208.95.112.1:80
http://ip-api.com/json/?fields=225545
unknown
shared
POST
404
162.159.128.233:443
https://discord.com/api/webhooks/1279610116131389570/5EodVOfV7vKlKvxe2bJjP_IcSs2v5gxj-zDOPmaY9-B6G1xf-_tEZBpZPg9Vt-BnvSXc
unknown
binary
45 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
7116
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
7116
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
7116
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2268
SolaraV3.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
shared
2268
SolaraV3.exe
172.217.16.131:443
gstatic.com
GOOGLE
US
whitelisted
4
System
192.168.100.255:137
whitelisted
2268
SolaraV3.exe
162.159.138.232:443
discord.com
CLOUDFLARENET
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 20.73.194.208
whitelisted
google.com
  • 216.58.212.142
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
blank-3jsck.in
unknown
ip-api.com
  • 208.95.112.1
shared
gstatic.com
  • 172.217.16.131
whitelisted
discord.com
  • 162.159.138.232
  • 162.159.135.232
  • 162.159.136.232
  • 162.159.128.233
  • 162.159.137.232
whitelisted

Threats

PID
Process
Class
Message
2256
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
2256
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
2268
SolaraV3.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
2256
svchost.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
2268
SolaraV3.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
2268
SolaraV3.exe
A Network Trojan was detected
STEALER [ANY.RUN] BlankGrabber (SkochGrabber) Generic External IP Check
2268
SolaraV3.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
Successful Credential Theft Detected
SUSPICIOUS [ANY.RUN] Host Name Exfiltration Atempt
No debug info