File name:

Solara.exe

Full analysis: https://app.any.run/tasks/b4c21f76-789d-4025-b456-da201e008315
Verdict: Malicious activity
Threats:

MetaStealer is an info-stealing malware primarily targeting sensitive data like login credentials, payment details, and browser history. It typically infects systems via phishing emails or malicious downloads and can exfiltrate data to a command and control (C2) server. MetaStealer is known for its stealthy techniques, including evasion and persistence mechanisms, which make it difficult to detect. This malware has been actively used in various cyberattacks, particularly for financial theft and credential harvesting from individuals and organizations.

Analysis date: August 03, 2024, 02:15:45
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
redline
metastealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

235974B1DF44F0484D8210536DAB5D41

SHA1:

DE52848EA0FEDF2F7491E81147139A2D80FE4A6C

SHA256:

8B4ACF13AD30350ADABED9AA814134FE1065AAFFEB04B2403B400986859DC19D

SSDEEP:

98304:cvlGwaW50mKPdx0e/sOKFVZuRWd8MGbwIZDPs:I

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Solara.exe (PID: 6728)
      • cmd.exe (PID: 6772)
      • Statistical.pif (PID: 7076)
    • Antivirus name has been found in the command line (generic signature)

      • findstr.exe (PID: 6848)
      • findstr.exe (PID: 6960)
    • REDLINE has been detected (YARA)

      • RegAsm.exe (PID: 7156)
    • Steals credentials from Web Browsers

      • RegAsm.exe (PID: 7156)
    • Stealers network behavior

      • RegAsm.exe (PID: 7156)
    • METASTEALER has been detected (SURICATA)

      • RegAsm.exe (PID: 7156)
    • Connects to the CnC server

      • RegAsm.exe (PID: 7156)
    • REDLINE has been detected (SURICATA)

      • RegAsm.exe (PID: 7156)
    • Actions looks like stealing of personal data

      • RegAsm.exe (PID: 7156)
  • SUSPICIOUS

    • Reads the date of Windows installation

      • Solara.exe (PID: 6728)
    • Reads security settings of Internet Explorer

      • Solara.exe (PID: 6728)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 6772)
    • Get information on the list of running processes

      • cmd.exe (PID: 6772)
    • Starts CMD.EXE for commands execution

      • Solara.exe (PID: 6728)
      • cmd.exe (PID: 6772)
    • Executing commands from ".cmd" file

      • Solara.exe (PID: 6728)
    • Application launched itself

      • cmd.exe (PID: 6772)
    • Drops a file with a rarely used extension (PIF)

      • cmd.exe (PID: 6772)
    • Executable content was dropped or overwritten

      • cmd.exe (PID: 6772)
      • Statistical.pif (PID: 7076)
    • Suspicious file concatenation

      • cmd.exe (PID: 7056)
    • Starts application with an unusual extension

      • cmd.exe (PID: 6772)
    • The process creates files with name similar to system file names

      • Statistical.pif (PID: 7076)
    • Starts a Microsoft application from unusual location

      • RegAsm.exe (PID: 7156)
    • Process drops legitimate windows executable

      • Statistical.pif (PID: 7076)
    • The executable file from the user directory is run by the CMD process

      • Statistical.pif (PID: 7076)
    • Searches for installed software

      • RegAsm.exe (PID: 7156)
    • Connects to unusual port

      • RegAsm.exe (PID: 7156)
  • INFO

    • Checks supported languages

      • Solara.exe (PID: 6728)
      • Statistical.pif (PID: 7076)
      • RegAsm.exe (PID: 7156)
    • Process checks computer location settings

      • Solara.exe (PID: 6728)
    • Create files in a temporary directory

      • Solara.exe (PID: 6728)
      • Statistical.pif (PID: 7076)
    • Reads the computer name

      • Solara.exe (PID: 6728)
      • Statistical.pif (PID: 7076)
      • RegAsm.exe (PID: 7156)
    • Reads mouse settings

      • Statistical.pif (PID: 7076)
    • Manual execution by a user

      • RegAsm.exe (PID: 7156)
    • Reads the machine GUID from the registry

      • RegAsm.exe (PID: 7156)
    • Creates files or folders in the user directory

      • RegAsm.exe (PID: 7156)
    • Reads Environment values

      • RegAsm.exe (PID: 7156)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

RedLine

(PID) Process(7156) RegAsm.exe
C2 (1)185.196.9.26:6302
Botnet@dxrkl0rd
Options
ErrorMessage
Keys
XorBepaint
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:02:24 19:20:04+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 29696
InitializedDataSize: 489984
UninitializedDataSize: 16896
EntryPoint: 0x38af
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
124
Monitored processes
13
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start solara.exe no specs cmd.exe conhost.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs statistical.pif choice.exe no specs #REDLINE regasm.exe

Process information

PID
CMD
Path
Indicators
Parent process
6728"C:\Users\admin\Desktop\Solara.exe" C:\Users\admin\Desktop\Solara.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\solara.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6772"C:\Windows\System32\cmd.exe" /k move Sector Sector.cmd & Sector.cmd & exitC:\Windows\SysWOW64\cmd.exe
Solara.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
9009
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6784\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6840tasklist C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6848findstr /I "wrsa.exe opssvc.exe" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6952tasklist C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6960findstr /I "avastui.exe avgui.exe ekrn.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7012cmd /c md 240488C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7032findstr /V "DefiningUtilitySophisticatedPartition" Louis C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7056cmd /c copy /b Author + Blvd + Principles + Des + Legendary + Occurrence 240488\F C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
4 249
Read events
4 230
Write events
13
Delete events
6

Modification events

(PID) Process:(6728) Solara.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6728) Solara.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6728) Solara.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(6728) Solara.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(7156) RegAsm.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
F41B0000D147A82D4BE5DA01
(PID) Process:(7156) RegAsm.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
8CE0E04D293389516C770B14553E7461514F603DC917BBB4DAEE01199BD2BF47
(PID) Process:(7156) RegAsm.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(7156) RegAsm.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:RegFiles0000
Value:
C:\Users\admin\AppData\Local\Google\Chrome\User Data\lockfile
(PID) Process:(7156) RegAsm.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:RegFilesHash
Value:
FF22EF24EC17CCD2BC6F86BADF08E5E5771F8C0F8AB6B7C76F7DA25967188328
(PID) Process:(7156) RegAsm.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFilesHash
Value:
⋿⓯៬틌澼몆ࣟίྌ뚊잷絯妢ᡧ⢃
Executable files
2
Suspicious files
32
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6728Solara.exeC:\Users\admin\AppData\Local\Temp\Hydrogenbinary
MD5:513F1801C0B5455886191627BF6EFCB1
SHA256:BD074649A4183530F8A983BB76E7E21266760EFC8416D97F4176FF9522F164D3
6728Solara.exeC:\Users\admin\AppData\Local\Temp\Sectortext
MD5:EBD72DD73B8B2BDFDB42C9B126485F82
SHA256:26CD65B6145E7ACA6E0D7E20EA73A6546D99705C2E26A506F26D2B1AD4823A3D
6728Solara.exeC:\Users\admin\AppData\Local\Temp\Aquaticbinary
MD5:9BDB4BDB710497DDF28C97EFA7C1B9B4
SHA256:4582148400BBCEDA2EDE955687EF07D3753C8095A25A7B339556D250A5EF9ED7
6728Solara.exeC:\Users\admin\AppData\Local\Temp\Mphbinary
MD5:3647ECA55027DCE3C13ACD875794D212
SHA256:E3276B522631EB538D2D5F908877BB834AC98917E938921B4A01274230189EF6
6728Solara.exeC:\Users\admin\AppData\Local\Temp\Principlesbinary
MD5:C011C0CD74B074134E8AD50805D7871E
SHA256:25C693475D6D5A97F4892C79EFDC6428ED0DC5C869CCA55F5F90CB077F4CA2D3
6728Solara.exeC:\Users\admin\AppData\Local\Temp\Penbinary
MD5:3F370B903FB5CF7DEDC2FDD274BB443A
SHA256:24EE59DC4AFCDEF1546A8C1149FFAC9470C0257C9EC4B37E397FCF1742CE30A0
6728Solara.exeC:\Users\admin\AppData\Local\Temp\Suggestsbinary
MD5:6B278302965EE1CB27DEF0D3AC03DBAE
SHA256:B48A989EC58F876C7253B5C529DD279588100FAD25E9A684C819945FD75066FE
6728Solara.exeC:\Users\admin\AppData\Local\Temp\Pentiumbinary
MD5:904434C8A49D5EA8433ED106444500B7
SHA256:67FED69D699C7413E676D2C723A97F3F1F5CCD4909958B0FF99EDF66F100A93B
6728Solara.exeC:\Users\admin\AppData\Local\Temp\Bringingbinary
MD5:39968FE59450761E3AEAB7601B84656C
SHA256:40FDDC8FD3CAB3814075D1CAAC1E7DC1113F4589266E805CA67F56F017C6C44D
6728Solara.exeC:\Users\admin\AppData\Local\Temp\Louisbinary
MD5:7E92D90EF19287CE0FA9B4CD24D80E1A
SHA256:9FE63F8D2EFF5839798772AA042D6F8F4491FB5F1E7132DAC9673A921F6026F9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
15
DNS requests
5
Threats
9

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
239.255.255.250:1900
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
7156
RegAsm.exe
185.196.9.26:6302
Simple Carrier LLC
US
malicious

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.16.206
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
yGAlQxOpGcFgBz.yGAlQxOpGcFgBz
unknown

Threats

PID
Process
Class
Message
7156
RegAsm.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 32
7156
RegAsm.exe
A Network Trojan was detected
ET MALWARE [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization)
7156
RegAsm.exe
Potentially Bad Traffic
ET INFO Microsoft net.tcp Connection Initialization Activity
7156
RegAsm.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
7156
RegAsm.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC - Id1Response
7156
RegAsm.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
7156
RegAsm.exe
A Network Trojan was detected
ET MALWARE Redline Stealer/MetaStealer Family Activity (Response)
7156
RegAsm.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
7156
RegAsm.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
No debug info