Edit tour

Windows Analysis Report
solara-executor.exe

Overview

General Information

Sample name:solara-executor.exe
Analysis ID:1577819
MD5:6107673fe6de87ac938d8d45ceee771b
SHA1:0ebf97d44da9ce419102f2407e4b92ccc75677dd
SHA256:1d820e33b6818f08161dbd3766b37e971b7531ee018dee1eb21822edb1eaa545
Tags:exeuser-aachum
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contain functionality to detect virtual machines
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
PE file contains section with special chars
Tries to harvest and steal browser information (history, passwords, etc)
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Detected potential crypto function
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • solara-executor.exe (PID: 7316 cmdline: "C:\Users\user\Desktop\solara-executor.exe" MD5: 6107673FE6DE87AC938D8D45CEEE771B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    Process Memory Space: solara-executor.exe PID: 7316JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      0.2.solara-executor.exe.1984c1381d0.0.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-18T19:37:15.832886+010028032742Potentially Bad Traffic192.168.2.649714172.67.75.163443TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: solara-executor.exeAvira: detected
        Source: solara-executor.exeReversingLabs: Detection: 18%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: solara-executor.exeJoe Sandbox ML: detected
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_000001984C0B7740 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,CryptUnprotectData,
        Source: unknownHTTPS traffic detected: 172.67.75.163:443 -> 192.168.2.6:49714 version: TLS 1.2
        Source: solara-executor.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\Users\55yar\Desktop\imgui-master\examples\imgui_loader\Release\example_win32_directx9.pdb source: solara-executor.exe, solara-executor.exe, 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp
        Source: Binary string: C:\Users\55yar\Desktop\imgui-master\examples\imgui_loader\Release\example_win32_directx9.pdb/''GCTL source: solara-executor.exe, 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_000001984C01F46A Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileA,type_info::_name_internal_method,type_info::_name_internal_method,type_info::_name_internal_method,
        Source: Joe Sandbox ViewIP Address: 172.67.75.163 172.67.75.163
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49714 -> 172.67.75.163:443
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.74 Safari/537.36 Edg/79.0.309.43Host: api.myip.com
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.74 Safari/537.36 Edg/79.0.309.43Host: api.myip.com
        Source: global trafficDNS traffic detected: DNS query: api.myip.com
        Source: solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://https://https/:://websocketpp.processorGeneric
        Source: solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
        Source: solara-executor.exe, 00000000.00000003.2211474780.000001984C44F000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2246199496.000001984BF94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com/
        Source: solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com/Russia
        Source: solara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
        Source: solara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
        Source: solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
        Source: solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
        Source: solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
        Source: solara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
        Source: solara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2212662127.000001984C79C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
        Source: solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
        Source: solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
        Source: solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
        Source: solara-executor.exe, solara-executor.exe, 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage
        Source: solara-executor.exe, 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage(Hold
        Source: solara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2212662127.000001984C79C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
        Source: solara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
        Source: solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
        Source: solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
        Source: solara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
        Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
        Source: unknownHTTPS traffic detected: 172.67.75.163:443 -> 192.168.2.6:49714 version: TLS 1.2
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341D1D70 OpenClipboard,MultiByteToWideChar,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,CloseClipboard,
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341D1D70 OpenClipboard,MultiByteToWideChar,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,CloseClipboard,
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341D1C20 OpenClipboard,GetClipboardData,CloseClipboard,GlobalLock,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,CloseClipboard,
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF634200330 GetClientRect,QueryPerformanceCounter,GetForegroundWindow,ClientToScreen,SetCursorPos,GetCursorPos,ScreenToClient,GetKeyState,GetKeyState,GetKeyState,GetKeyState,
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF634200D02 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,

        System Summary

        barindex
        Source: solara-executor.exeStatic PE information: section name: "/hR
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF634203F90 PostQuitMessage,GetWindowRect,SetWindowPos,NtdllDefWindowProc_A,
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF63420E278 NtdllDefWindowProc_A,
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF634204720
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341FEA60
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341FF2F0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF634200330
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341FFCE0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341DAD40
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341FE5B0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341B5D90
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341F0DE0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341E25F0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341ECDD0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341C4620
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341CD620
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341B9E10
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341D96B0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341C46F0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341D7EF0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341C6EC0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341B9730
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341BDFB0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341E97F0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341DBFC0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341F6090
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341EF9E0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341E59E0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341DB1E0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341CE1C0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341C5A30
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341F2A00
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341CFA00
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341DC270
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341CC250
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341CF250
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341FBA80
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341FC310
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341FA370
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341FCB40
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341DDB50
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341BFBB0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341B7390
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341E6BC0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341B6CB0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341D6C90
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341E7CE0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341D54F0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341ED530
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF634200D02
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341DBD10
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_000001984C0E0FF0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_000001984C043841
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_000001984C00BA30
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: String function: 00007FF6341D1F40 appears 40 times
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: String function: 00007FF6341C85B0 appears 36 times
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: String function: 00007FF63420E460 appears 867 times
        Source: solara-executor.exeStatic PE information: Section: bbbb ZLIB complexity 0.9988679984861591
        Source: classification engineClassification label: mal88.spyw.evad.winEXE@1/1@1/1
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_000001984BFF6FE0 std::_Fac_node::_Fac_node,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,
        Source: C:\Users\user\Desktop\solara-executor.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\HJWXIAQ3.htmJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: solara-executor.exe, 00000000.00000002.4005978558.000001984C5BA000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C5DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
        Source: solara-executor.exeReversingLabs: Detection: 18%
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: apphelp.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: d3d9.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: msvcp140.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: vcruntime140.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: vcruntime140_1.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: kernel.appcore.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: dwmapi.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: windows.storage.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: vcruntime140.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: vcruntime140_1.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: wldp.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: uxtheme.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: textinputframework.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: coreuicomponents.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: coremessaging.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: ntmarta.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: wintypes.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: wintypes.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: wintypes.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: d3d10warp.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: resourcepolicyclient.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: dxcore.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: winmm.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: xinput1_4.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: devobj.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: inputhost.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: propsys.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: wininet.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: sspicli.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: textshaping.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: iertutil.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: profapi.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: ondemandconnroutehelper.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: winhttp.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: mswsock.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: iphlpapi.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: winnsi.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: urlmon.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: srvcli.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: netutils.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: dnsapi.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: rasadhlp.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: fwpuclnt.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: schannel.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: mskeyprotect.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: ntasn1.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: msasn1.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: dpapi.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: cryptsp.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: rsaenh.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: cryptbase.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: gpapi.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: ncrypt.dll
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: ncryptsslp.dll
        Source: C:\Users\user\Desktop\solara-executor.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
        Source: solara-executor.exeStatic PE information: Image base 0x140000000 > 0x60000000
        Source: solara-executor.exeStatic file information: File size 1248295 > 1048576
        Source: solara-executor.exeStatic PE information: Raw size of bbbb is bigger than: 0x100000 < 0x121000
        Source: solara-executor.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\Users\55yar\Desktop\imgui-master\examples\imgui_loader\Release\example_win32_directx9.pdb source: solara-executor.exe, solara-executor.exe, 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp
        Source: Binary string: C:\Users\55yar\Desktop\imgui-master\examples\imgui_loader\Release\example_win32_directx9.pdb/''GCTL source: solara-executor.exe, 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp

        Data Obfuscation

        barindex
        Source: C:\Users\user\Desktop\solara-executor.exeUnpacked PE file: 0.2.solara-executor.exe.7ff6341b0000.1.unpack "/hR:EW;bbbb:EW;Unknown_Section2:W; vs "/hR:ER;bbbb:ER;Unknown_Section2:W;
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341FF7A0 QueryPerformanceFrequency,QueryPerformanceCounter,GetKeyboardLayout,GetLocaleInfoA,LoadLibraryA,GetProcAddress,GetProcAddress,
        Source: initial sampleStatic PE information: section where entry point is pointing to: bbbb
        Source: solara-executor.exeStatic PE information: section name: "/hR
        Source: solara-executor.exeStatic PE information: section name: bbbb
        Source: solara-executor.exeStatic PE information: section name: bNbF
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF63420E578 push rax; retf
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_000001984C16D632 pushfd ; retf BD37h
        Source: solara-executor.exeStatic PE information: section name: bbbb entropy: 7.999761627141752

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: SOFTWARE\VMware, Inc.\VMware Tools SOFTWARE\VMware, Inc.\VMware Tools SOFTWARE\VMware, Inc.\VMware Tools
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: \\.\VBoxMiniRdrDN \\.\VBoxMiniRdrDN \\.\VBoxMiniRdrDN
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened / queried: VBoxMiniRdrDN
        Source: C:\Users\user\Desktop\solara-executor.exeWindow / User API: threadDelayed 5529
        Source: C:\Users\user\Desktop\solara-executor.exeWindow / User API: foregroundWindowGot 1664
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_000001984C01F46A Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileA,type_info::_name_internal_method,type_info::_name_internal_method,type_info::_name_internal_method,
        Source: solara-executor.exe, 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware ToolsNOPQRSTUVWXYZABCDEFGHIJKLMnopqrstuvwxyzabcdefghijklm0123456789+/LoadLibraryA
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
        Source: solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vmtoolsdvboxserviceu
        Source: solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vboxservice
        Source: solara-executor.exe, 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Kernel32.dllKernel32.dll\\.\VBoxMiniRdrDN
        Source: solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vboxtrayx64dbgh
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696487552f
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696487552x
        Source: solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vmwareuser
        Source: solara-executor.exe, solara-executor.exe, 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: \\.\VBoxMiniRdrDN
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696487552
        Source: solara-executor.exe, 00000000.00000003.2211474780.000001984C45E000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2208261026.000001984C45E000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005708630.000001984C45E000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4004385732.000001984BF2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696487552
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696487552o
        Source: solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vmwaretray
        Source: solara-executor.exe, 00000000.00000002.4004385732.000001984BF2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696487552
        Source: solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: qemu-gaVGAuthServicevmwaretrayv
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696487552
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696487552j
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
        Source: solara-executor.exe, solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vboxtray
        Source: solara-executor.exe, solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: qemu-ga
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
        Source: solara-executor.exe, 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696487552t
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
        Source: solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: wiresharkvmwareuseri
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
        Source: solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vmtoolsd
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696487552s
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696487552t
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
        Source: C:\Users\user\Desktop\solara-executor.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\Desktop\solara-executor.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF63420C628 IsProcessorFeaturePresent,00007FFDA46F19C0,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,00007FFDA46F19C0,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341FF7A0 QueryPerformanceFrequency,QueryPerformanceCounter,GetKeyboardLayout,GetLocaleInfoA,LoadLibraryA,GetProcAddress,GetProcAddress,
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF63420C628 IsProcessorFeaturePresent,00007FFDA46F19C0,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,00007FFDA46F19C0,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF63420C80C SetUnhandledExceptionFilter,
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF63420E0B0 SetUnhandledExceptionFilter,
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF63420E0D0 SetUnhandledExceptionFilter,
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF63420E0C0 SetUnhandledExceptionFilter,
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: QueryPerformanceFrequency,QueryPerformanceCounter,GetKeyboardLayout,GetLocaleInfoA,LoadLibraryA,GetProcAddress,GetProcAddress,
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: GetKeyboardLayout,GetLocaleInfoA,
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF63420C8B8 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

        Stealing of Sensitive Information

        barindex
        Source: solara-executor.exeString found in binary or memory: Electrum-LTC
        Source: solara-executor.exeString found in binary or memory: \ElectronCash\wallets
        Source: solara-executor.exeString found in binary or memory: \com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb
        Source: solara-executor.exeString found in binary or memory: \Exodus\exodus.wallet
        Source: solara-executor.exeString found in binary or memory: \Ethereum\keystore
        Source: solara-executor.exeString found in binary or memory: Exodus Web
        Source: solara-executor.exeString found in binary or memory: Ethereum
        Source: solara-executor.exeString found in binary or memory: \Coinomi\Coinomi\wallets
        Source: solara-executor.exeString found in binary or memory: \Ethereum\keystore
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.js
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\0absryc3.default\cookies.sqlite
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\0absryc3.default\prefs.js
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.db
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
        Source: Yara matchFile source: 0.2.solara-executor.exe.1984c1381d0.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: solara-executor.exe PID: 7316, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Native API
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        1
        Masquerading
        1
        OS Credential Dumping
        1
        System Time Discovery
        Remote Services1
        Input Capture
        21
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
        Virtualization/Sandbox Evasion
        1
        Input Capture
        121
        Security Software Discovery
        Remote Desktop Protocol1
        Archive Collected Data
        1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        Deobfuscate/Decode Files or Information
        Security Account Manager11
        Virtualization/Sandbox Evasion
        SMB/Windows Admin Shares2
        Data from Local System
        2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
        Obfuscated Files or Information
        NTDS2
        Process Discovery
        Distributed Component Object Model3
        Clipboard Data
        13
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
        Software Packing
        LSA Secrets1
        Application Window Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        DLL Side-Loading
        Cached Domain Credentials1
        File and Directory Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync12
        System Information Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1577819 Sample: solara-executor.exe Startdate: 18/12/2024 Architecture: WINDOWS Score: 88 10 api.myip.com 2->10 14 Antivirus / Scanner detection for submitted sample 2->14 16 Multi AV Scanner detection for submitted file 2->16 18 Machine Learning detection for sample 2->18 20 3 other signatures 2->20 6 solara-executor.exe 13 2->6         started        signatures3 process4 dnsIp5 12 api.myip.com 172.67.75.163, 443, 49714 CLOUDFLARENETUS United States 6->12 22 Detected unpacking (changes PE section rights) 6->22 24 Contain functionality to detect virtual machines 6->24 26 Tries to harvest and steal browser information (history, passwords, etc) 6->26 signatures6

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        No bigger version
        No bigger version

        windows-stand
        SourceDetectionScannerLabelLink
        solara-executor.exe18%ReversingLabs
        solara-executor.exe100%AviraHEUR/AGEN.1314582
        solara-executor.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://https://https/:://websocketpp.processorGeneric0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        api.myip.com
        172.67.75.163
        truefalse
          high
          fp2e7a.wpc.phicdn.net
          192.229.221.95
          truefalse
            high
            NameMaliciousAntivirus DetectionReputation
            https://api.myip.com/false
              high
              NameSourceMaliciousAntivirus DetectionReputation
              http://https://https/:://websocketpp.processorGenericsolara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://ac.ecosia.org/autocomplete?q=solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://duckduckgo.com/chrome_newtabsolara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://duckduckgo.com/ac/?q=solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://www.google.com/images/branding/product/ico/googleg_lodp.icosolara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgsolara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2212662127.000001984C79C000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.solara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usagesolara-executor.exe, solara-executor.exe, 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmpfalse
                            high
                            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchsolara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYisolara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2212662127.000001984C79C000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3solara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://api.myip.com/Russiasolara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpfalse
                                        high
                                        https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage(Holdsolara-executor.exe, 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmpfalse
                                          high
                                          https://www.ecosia.org/newtab/solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpgsolara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_solara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&ctasolara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    172.67.75.163
                                                    api.myip.comUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    Joe Sandbox version:41.0.0 Charoite
                                                    Analysis ID:1577819
                                                    Start date and time:2024-12-18 19:36:18 +01:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:0h 6m 47s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:light
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Run name:Run with higher sleep bypass
                                                    Number of analysed new started processes analysed:17
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample name:solara-executor.exe
                                                    Detection:MAL
                                                    Classification:mal88.spyw.evad.winEXE@1/1@1/1
                                                    EGA Information:
                                                    • Successful, ratio: 100%
                                                    HCA Information:
                                                    • Successful, ratio: 88%
                                                    • Number of executed functions: 0
                                                    • Number of non-executed functions: 0
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .exe
                                                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                    • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                    • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                                                    • Excluded IPs from analysis (whitelisted): 40.126.53.6, 20.223.36.55, 13.107.246.63, 20.109.210.53, 20.223.35.26, 2.18.40.157, 150.171.28.10, 2.18.40.144, 23.218.208.109
                                                    • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, tse1.mm.bing.net, g.bing.com, arc.msn.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, ocsp.edge.digicert.com
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    • VT rate limit hit for: solara-executor.exe
                                                    No simulations
                                                    No context
                                                    No context
                                                    No context
                                                    No context
                                                    No context
                                                    Process:C:\Users\user\Desktop\solara-executor.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):57
                                                    Entropy (8bit):4.406851198109578
                                                    Encrypted:false
                                                    SSDEEP:3:YMb1gXME2OMfQxaNmGGL4:YMeX32uxaNmRL4
                                                    MD5:720F698997A1D19594ED650E32E02974
                                                    SHA1:A4F89E711434820EAA2250F0421904468ED9D13F
                                                    SHA-256:0949A3EF0FE90F28780ADDE31202E2DC9C5FA57123355DF9C9FAA89A6EECCC04
                                                    SHA-512:32D94C8297E64041F851F62D168A7AB8418ABEFB97B1AD0B33D2D801DDF204AF2228D29470AEF18F3A9309FF3E9A8C78CC657D7D5DFC40F70F27EE34100812FA
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:{"ip":"8.46.123.189","country":"United States","cc":"US"}
                                                    File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                    Entropy (8bit):7.941670398228598
                                                    TrID:
                                                    • Win64 Executable GUI (202006/5) 93.51%
                                                    • Win64 Executable (generic) (12005/4) 5.56%
                                                    • DOS Executable Generic (2002/1) 0.93%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:solara-executor.exe
                                                    File size:1'248'295 bytes
                                                    MD5:6107673fe6de87ac938d8d45ceee771b
                                                    SHA1:0ebf97d44da9ce419102f2407e4b92ccc75677dd
                                                    SHA256:1d820e33b6818f08161dbd3766b37e971b7531ee018dee1eb21822edb1eaa545
                                                    SHA512:798affa3cabc3537d226ebdffa458309b0fa81a21939990eebdf121971e870d70d96f8b75ff6746b5d397e28015beb81f8af35df51f10adbf91c378d4dce74d2
                                                    SSDEEP:24576:PDnqyaenIySWhuUSC/i/dH9ONOznpY4sEkm30TEhibtyuk5mj5dRvgRnFpt:PGy5LSwUdbznqfEZ3RGN2Fpt
                                                    TLSH:DE45122BB7E46771D934D473CB9BC71AB330A262D0768B5B05C28B1F665A00A774BF18
                                                    File Content Preview:MZ......................@.2.92.UPX!._0x001818c..........................!..L.!This program cannot be run in DOS mode....$.......4=..p\..p\..p\..y$P.`\..`...v\..`...r\..`...y\..`...n\..;$..`\..W...s\..p\...\..;...x\..;.<.q\..;...q\..Richp\.................
                                                    Icon Hash:00928e8e8686b000
                                                    Entrypoint:0x140631280
                                                    Entrypoint Section:bbbb
                                                    Digitally signed:false
                                                    Imagebase:0x140000000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x6761A24F [Tue Dec 17 16:09:51 2024 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:6
                                                    OS Version Minor:0
                                                    File Version Major:6
                                                    File Version Minor:0
                                                    Subsystem Version Major:6
                                                    Subsystem Version Minor:0
                                                    Import Hash:b20f1daac672151d282f9ffd530ca36b
                                                    Instruction
                                                    push ebx
                                                    push esi
                                                    push edi
                                                    push ebp
                                                    dec eax
                                                    lea esi, dword ptr [FFEDFD75h]
                                                    dec eax
                                                    lea edi, dword ptr [esi-00510000h]
                                                    push edi
                                                    mov eax, 0062FDCFh
                                                    push eax
                                                    dec eax
                                                    mov ecx, esp
                                                    dec eax
                                                    mov edx, edi
                                                    dec eax
                                                    mov edi, esi
                                                    mov esi, 00120274h
                                                    push ebp
                                                    dec eax
                                                    mov ebp, esp
                                                    inc esp
                                                    mov ecx, dword ptr [ecx]
                                                    dec ecx
                                                    mov eax, edx
                                                    dec eax
                                                    mov edx, esi
                                                    dec eax
                                                    lea esi, dword ptr [edi+02h]
                                                    push esi
                                                    mov al, byte ptr [edi]
                                                    dec edx
                                                    mov cl, al
                                                    and al, 07h
                                                    shr cl, 00000003h
                                                    dec eax
                                                    mov ebx, FFFFFD00h
                                                    dec eax
                                                    shl ebx, cl
                                                    mov cl, al
                                                    dec eax
                                                    lea ebx, dword ptr [esp+ebx*2-00000E78h]
                                                    dec eax
                                                    and ebx, FFFFFFC0h
                                                    push 00000000h
                                                    dec eax
                                                    cmp esp, ebx
                                                    jne 00007FE4B148D8CBh
                                                    push ebx
                                                    dec eax
                                                    lea edi, dword ptr [ebx+08h]
                                                    mov cl, byte ptr [esi-01h]
                                                    dec edx
                                                    mov byte ptr [edi+02h], al
                                                    mov al, cl
                                                    shr cl, 00000004h
                                                    mov byte ptr [edi+01h], cl
                                                    and al, 0Fh
                                                    mov byte ptr [edi], al
                                                    dec eax
                                                    lea ecx, dword ptr [edi-04h]
                                                    push eax
                                                    inc ecx
                                                    push edi
                                                    dec eax
                                                    lea eax, dword ptr [edi+04h]
                                                    inc ebp
                                                    xor edi, edi
                                                    inc ecx
                                                    push esi
                                                    inc ecx
                                                    mov esi, 00000001h
                                                    inc ecx
                                                    push ebp
                                                    inc ebp
                                                    xor ebp, ebp
                                                    inc ecx
                                                    push esp
                                                    push ebp
                                                    push ebx
                                                    dec eax
                                                    sub esp, 48h
                                                    dec eax
                                                    mov dword ptr [esp+38h], ecx
                                                    dec eax
                                                    mov dword ptr [esp+20h], eax
                                                    mov eax, 00000001h
                                                    dec eax
                                                    mov dword ptr [esp+40h], esi
                                                    dec esp
                                                    mov dword ptr [esp+30h], eax
                                                    mov ebx, eax
                                                    inc esp
                                                    mov dword ptr [esp+2Ch], ecx
                                                    movzx ecx, byte ptr [edi+02h]
                                                    shl ebx, cl
                                                    mov ecx, ebx
                                                    Programming Language:
                                                    • [IMP] VS2008 SP1 build 30729
                                                    • [IMP] VS2005 build 50727
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x6411b00x504bNbF
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x6320000xf1b0bNbF
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x3220000x4410"/hR
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x6416b40x20bNbF
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x631e600x28bbbb
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x631e900x140bbbb
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    "/hR0x10000x5100000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    bbbb0x5110000x1210000x121000fb76c604981fcb6c4067a2c5117730c7False0.9988679984861591data7.999761627141752IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    bNbF0x6320000x100000xf8000c5ce6f0a1e32589f6d634730baa9e50False0.2612462197580645data3.9453169926813554IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    None0x640ff40x2edata1.108695652173913
                                                    RT_RCDATA0x3360200x3201empty0
                                                    RT_RCDATA0x3392240x3201empty0
                                                    RT_RCDATA0x33c4280x3201empty0
                                                    RT_RCDATA0x33f62c0x3201empty0
                                                    RT_RCDATA0x3428300x3201empty0
                                                    RT_RCDATA0x345a340x3201empty0
                                                    RT_RCDATA0x348c380x3201empty0
                                                    RT_RCDATA0x34be3c0x3201empty0
                                                    RT_RCDATA0x34f0400x3201empty0
                                                    RT_RCDATA0x3522440x3201empty0
                                                    RT_RCDATA0x3554480x3201empty0
                                                    RT_RCDATA0x35864c0x3201empty0
                                                    RT_RCDATA0x35b8500x3201empty0
                                                    RT_RCDATA0x35ea540x3201empty0
                                                    RT_RCDATA0x361c580x3201empty0
                                                    RT_RCDATA0x364e5c0x3201empty0
                                                    RT_RCDATA0x3680600x3201empty0
                                                    RT_RCDATA0x36b2640x3201empty0
                                                    RT_RCDATA0x36e4680x3201empty0
                                                    RT_RCDATA0x37166c0x3201empty0
                                                    RT_RCDATA0x3748700x3201empty0
                                                    RT_RCDATA0x377a740x3201empty0
                                                    RT_RCDATA0x37ac780x3201empty0
                                                    RT_RCDATA0x37de7c0x3201empty0
                                                    RT_RCDATA0x3810800x3201empty0
                                                    RT_RCDATA0x3842840x3201empty0
                                                    RT_RCDATA0x3874880x3201empty0
                                                    RT_RCDATA0x38a68c0x3201empty0
                                                    RT_RCDATA0x38d8900x76empty0
                                                    RT_RCDATA0x38d9080x22empty0
                                                    RT_RCDATA0x38d92c0x3201empty0
                                                    RT_RCDATA0x390b300x3201empty0
                                                    RT_RCDATA0x393d340x3201empty0
                                                    RT_RCDATA0x396f380x3201empty0
                                                    RT_RCDATA0x39a13c0x3201empty0
                                                    RT_RCDATA0x39d3400x796empty0
                                                    RT_RCDATA0x39dad80xfempty0
                                                    RT_RCDATA0x39dae80x3201empty0
                                                    RT_RCDATA0x3a0cec0x3201empty0
                                                    RT_RCDATA0x3a3ef00xedcf4empty0
                                                    RT_RCDATA0x491be40x3201empty0
                                                    RT_RCDATA0x494de80x9418empty0
                                                    RT_RCDATA0x49e2000x3201empty0
                                                    RT_RCDATA0x4a14040x3201empty0
                                                    RT_RCDATA0x4a46080x55empty0
                                                    RT_RCDATA0x4a46600x3201empty0
                                                    RT_RCDATA0x4a78640x3201empty0
                                                    RT_RCDATA0x4aaa680x3201empty0
                                                    RT_RCDATA0x4adc6c0x3201empty0
                                                    RT_RCDATA0x4b0e700x3201empty0
                                                    RT_RCDATA0x4b40740x3201empty0
                                                    RT_RCDATA0x4b72780x9eempty0
                                                    RT_RCDATA0x4b73180x1f2empty0
                                                    RT_RCDATA0x4b750c0x3201empty0
                                                    RT_RCDATA0x4ba7100x3201empty0
                                                    RT_RCDATA0x4bd9140x3201empty0
                                                    RT_RCDATA0x4c0b180x3201empty0
                                                    RT_RCDATA0x4c3d1c0x7dempty0
                                                    RT_RCDATA0x4c3d9c0x7dempty0
                                                    RT_RCDATA0x4c3e1c0x7dempty0
                                                    RT_RCDATA0x4c3e9c0x7dempty0
                                                    RT_RCDATA0x4c3f1c0x7dempty0
                                                    RT_RCDATA0x4c3f9c0x7dempty0
                                                    RT_RCDATA0x4c401c0x7dempty0
                                                    RT_RCDATA0x4c409c0x7dempty0
                                                    RT_RCDATA0x4c411c0x7dempty0
                                                    RT_RCDATA0x4c419c0x7dempty0
                                                    RT_RCDATA0x4c421c0x7dempty0
                                                    RT_RCDATA0x4c429c0x7dempty0
                                                    RT_RCDATA0x4c431c0x7dempty0
                                                    RT_RCDATA0x4c439c0x7dempty0
                                                    RT_RCDATA0x4c441c0x7dempty0
                                                    RT_RCDATA0x4c449c0x7dempty0
                                                    RT_RCDATA0x4c451c0x7dempty0
                                                    RT_RCDATA0x4c459c0x7dempty0
                                                    RT_RCDATA0x4c461c0x3201empty0
                                                    RT_RCDATA0x4c78200x3201empty0
                                                    RT_RCDATA0x4caa240x3201empty0
                                                    RT_RCDATA0x4cdc280x3201empty0
                                                    RT_RCDATA0x4d0e2c0x3201empty0
                                                    RT_RCDATA0x4d40300x3201empty0
                                                    RT_RCDATA0x4d72340x3201empty0
                                                    RT_RCDATA0x4da4380x3201empty0
                                                    RT_RCDATA0x4dd63c0x3201empty0
                                                    RT_RCDATA0x4e08400x3201empty0
                                                    RT_RCDATA0x4e3a440x3201empty0
                                                    RT_RCDATA0x4e6c480x3201empty0
                                                    RT_RCDATA0x4e9e4c0x3201empty0
                                                    RT_RCDATA0x4ed0500x3201empty0
                                                    RT_RCDATA0x4f02540x3201empty0
                                                    RT_RCDATA0x4f34580x3201empty0
                                                    RT_RCDATA0x4f665c0x3201empty0
                                                    RT_RCDATA0x4f98600x3201empty0
                                                    RT_RCDATA0x4fca640x3201empty0
                                                    RT_RCDATA0x4ffc680x3201empty0
                                                    RT_RCDATA0x502e6c0x3201empty0
                                                    RT_RCDATA0x5060700x3201empty0
                                                    RT_RCDATA0x5092740x3201empty0
                                                    RT_RCDATA0x50c4780x3201empty0
                                                    RT_RCDATA0x50f67c0x3201empty0
                                                    RT_RCDATA0x5128800x3201data1.0008593078665728
                                                    RT_RCDATA0x515a840x3201data1.0008593078665728
                                                    RT_RCDATA0x518c880x3201data1.0008593078665728
                                                    RT_RCDATA0x51be8c0x3201data1.0008593078665728
                                                    RT_RCDATA0x51f0900x3201data1.0008593078665728
                                                    RT_RCDATA0x5222940x3201data1.0008593078665728
                                                    RT_RCDATA0x5254980x3201data1.0008593078665728
                                                    RT_RCDATA0x52869c0x3201data1.0008593078665728
                                                    RT_RCDATA0x52b8a00x3201data1.0008593078665728
                                                    RT_RCDATA0x52eaa40x3201data1.0008593078665728
                                                    RT_RCDATA0x531ca80x3201data1.0008593078665728
                                                    RT_RCDATA0x534eac0x3201data1.0008593078665728
                                                    RT_RCDATA0x5380b00x3201data1.0008593078665728
                                                    RT_RCDATA0x53b2b40x3201data1.0008593078665728
                                                    RT_RCDATA0x53e4b80x3201OpenPGP Public Key1.0008593078665728
                                                    RT_RCDATA0x5416bc0x3201data1.0008593078665728
                                                    RT_RCDATA0x5448c00x3201data1.0008593078665728
                                                    RT_RCDATA0x547ac40x3201data1.0008593078665728
                                                    RT_RCDATA0x54acc80x3201data1.0008593078665728
                                                    RT_RCDATA0x54decc0x3201data1.0008593078665728
                                                    RT_RCDATA0x5510d00x3201data1.0008593078665728
                                                    RT_RCDATA0x5542d40x3201data1.0008593078665728
                                                    RT_RCDATA0x5574d80x3201data1.0008593078665728
                                                    RT_RCDATA0x55a6dc0x3201data1.0008593078665728
                                                    RT_RCDATA0x55d8e00x3201data1.0008593078665728
                                                    RT_RCDATA0x560ae40x3201data1.0008593078665728
                                                    RT_RCDATA0x563ce80x3201data1.0008593078665728
                                                    RT_RCDATA0x566eec0x3201data1.0008593078665728
                                                    RT_RCDATA0x56a0f00x3201SysEx File -1.0008593078665728
                                                    RT_RCDATA0x56d2f40x3201data1.0008593078665728
                                                    RT_RCDATA0x5704f80x3201data1.0008593078665728
                                                    RT_RCDATA0x5736fc0x3201data1.0008593078665728
                                                    RT_RCDATA0x5769000x3201data1.0008593078665728
                                                    RT_RCDATA0x579b040x3201data1.0008593078665728
                                                    RT_RCDATA0x57cd080x3201data1.0008593078665728
                                                    RT_RCDATA0x57ff0c0x3201data1.0008593078665728
                                                    RT_RCDATA0x5831100x3201data1.0008593078665728
                                                    RT_RCDATA0x5863140x3201data1.0008593078665728
                                                    RT_RCDATA0x5895180x3201data1.0008593078665728
                                                    RT_RCDATA0x58c71c0x3201data1.0008593078665728
                                                    RT_RCDATA0x58f9200x3201data1.0008593078665728
                                                    RT_RCDATA0x592b240x3201data1.0008593078665728
                                                    RT_RCDATA0x595d280x3201data1.0008593078665728
                                                    RT_RCDATA0x598f2c0x3201data1.0008593078665728
                                                    RT_RCDATA0x59c1300x3201data1.0008593078665728
                                                    RT_RCDATA0x59f3340x3201data1.0008593078665728
                                                    RT_RCDATA0x5a25380x3201OpenPGP Public Key1.0008593078665728
                                                    RT_RCDATA0x5a573c0x3201data1.0008593078665728
                                                    RT_RCDATA0x5a89400x3201data1.0008593078665728
                                                    RT_RCDATA0x5abb440x3201data1.0008593078665728
                                                    RT_RCDATA0x5aed480x3201data1.0008593078665728
                                                    RT_RCDATA0x5b1f4c0x3201data1.0008593078665728
                                                    RT_RCDATA0x5b51500x3201OpenPGP Public Key1.0008593078665728
                                                    RT_RCDATA0x5b83540x3201data1.0008593078665728
                                                    RT_RCDATA0x5bb5580x3201data1.0008593078665728
                                                    RT_RCDATA0x5be75c0x3201data1.0008593078665728
                                                    RT_RCDATA0x5c19600x3201data1.0008593078665728
                                                    RT_RCDATA0x5c4b640x3201data1.0008593078665728
                                                    RT_RCDATA0x5c7d680x3201data1.0008593078665728
                                                    RT_RCDATA0x5caf6c0x3201data1.0008593078665728
                                                    RT_RCDATA0x5ce1700x3201data1.0008593078665728
                                                    RT_RCDATA0x5d13740x3201data1.0008593078665728
                                                    RT_RCDATA0x5d45780x3201data1.0008593078665728
                                                    RT_RCDATA0x5d777c0x3201data1.0008593078665728
                                                    RT_RCDATA0x5da9800x3201data1.0008593078665728
                                                    RT_RCDATA0x5ddb840x3201data1.0008593078665728
                                                    RT_RCDATA0x5e0d880x3201data1.0008593078665728
                                                    RT_RCDATA0x5e3f8c0x3201data1.0008593078665728
                                                    RT_RCDATA0x5e71900x3201data1.0008593078665728
                                                    RT_RCDATA0x5ea3940x3201data1.0008593078665728
                                                    RT_RCDATA0x5ed5980x3201data1.0008593078665728
                                                    RT_RCDATA0x5f079c0x3201data1.0008593078665728
                                                    RT_RCDATA0x5f39a00x3201data1.0008593078665728
                                                    RT_RCDATA0x5f6ba40x3201data1.0008593078665728
                                                    RT_RCDATA0x5f9da80x3201data1.0008593078665728
                                                    RT_RCDATA0x5fcfac0x3201data1.0008593078665728
                                                    RT_RCDATA0x6001b00x3201data1.0008593078665728
                                                    RT_RCDATA0x6033b40x3201data1.0008593078665728
                                                    RT_RCDATA0x6065b80x3201data1.0008593078665728
                                                    RT_RCDATA0x6097bc0x3201data1.0008593078665728
                                                    RT_RCDATA0x60c9c00x3201data1.0008593078665728
                                                    RT_RCDATA0x60fbc40x3201data1.0008593078665728
                                                    RT_RCDATA0x612dc80x3201data1.0008593078665728
                                                    RT_RCDATA0x615fcc0x3201data1.0008593078665728
                                                    RT_RCDATA0x6191d00x3201data1.0008593078665728
                                                    RT_RCDATA0x61c3d40x3201data1.0008593078665728
                                                    RT_RCDATA0x61f5d80x3201data1.0008593078665728
                                                    RT_RCDATA0x6227dc0x3201data1.0008593078665728
                                                    RT_RCDATA0x6259e00x3201data1.0008593078665728
                                                    RT_MANIFEST0x6410280x2data5.0
                                                    RT_MANIFEST0x6410300x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                                    None0x628d680x102data1.0426356589147288
                                                    None0x628e6c0xdadata1.0504587155963303
                                                    None0x628f480xbadata1.0591397849462365
                                                    None0x6290040x12adata1.0369127516778522
                                                    None0x6291300x16edata1.030054644808743
                                                    None0x6292a00x16cdata1.0302197802197801
                                                    None0x62940c0xfadata1.044
                                                    None0x6295080x11adata1.0390070921985815
                                                    None0x6296240x178data1.0292553191489362
                                                    None0x62979c0xe0data1.0491071428571428
                                                    None0x62987c0xbcdata1.0585106382978724
                                                    None0x6299380x124data1.0376712328767124
                                                    None0x629a5c0xb0data1.0625
                                                    None0x629b0c0xa6data1.0662650602409638
                                                    None0x629bb40x7edata1.0873015873015872
                                                    None0x629c340xd6data1.0514018691588785
                                                    None0x629d0c0xe6data1.0478260869565217
                                                    None0x629df40xeadata1.047008547008547
                                                    None0x629ee00xcadata1.0544554455445545
                                                    None0x629fac0xdedata1.0495495495495495
                                                    None0x62a08c0x98data1.0723684210526316
                                                    None0x62a1240xe4data1.0482456140350878
                                                    None0x62a2080xc2data1.056701030927835
                                                    None0x62a2cc0xbedata1.0578947368421052
                                                    None0x62a38c0x11adata1.0390070921985815
                                                    None0x62a4a80xa8data1.0654761904761905
                                                    None0x62a5500xdadata1.0504587155963303
                                                    None0x62a62c0xa2data1.0679012345679013
                                                    None0x62a6d00xeadata1.047008547008547
                                                    None0x62a7bc0x88data1.0808823529411764
                                                    None0x62a8440xd8data1.0509259259259258
                                                    None0x62a91c0x152data1.032544378698225
                                                    None0x62aa700x134data1.0357142857142858
                                                    None0x62aba40xecdata1.0466101694915255
                                                    None0x62ac900x120data1.0381944444444444
                                                    None0x62adb00x116data1.039568345323741
                                                    None0x62aec80x7edata1.0873015873015872
                                                    None0x62af480xf2data1.0454545454545454
                                                    None0x62b03c0x106data1.0419847328244274
                                                    None0x62b1440xdcdata1.05
                                                    None0x62b2200xdeOpenPGP Secret Key1.0495495495495495
                                                    None0x62b3000x152data1.032544378698225
                                                    None0x62b4540x154data1.0323529411764707
                                                    None0x62b5a80xe4data1.0482456140350878
                                                    None0x62b68c0xc0OpenPGP Secret Key1.0572916666666667
                                                    None0x62b74c0xacdata1.063953488372093
                                                    None0x62b7f80xf2data1.0454545454545454
                                                    None0x62b8ec0xdcdata1.05
                                                    None0x62b9c80x126data1.0374149659863945
                                                    None0x62baf00x9cdata1.0705128205128205
                                                    None0x62bb8c0x8adata1.0797101449275361
                                                    None0x62bc180x15adata1.0317919075144508
                                                    None0x62bd740xf8data1.0443548387096775
                                                    None0x62be6c0xe2data1.0486725663716814
                                                    None0x62bf500x5adata1.1222222222222222
                                                    None0x62bfac0x106data1.0419847328244274
                                                    None0x62c0b40xc8data1.055
                                                    None0x62c17c0xccdata1.053921568627451
                                                    None0x62c2480xd6data1.0514018691588785
                                                    None0x62c3200x144data1.0339506172839505
                                                    None0x62c4640x138data1.0352564102564104
                                                    None0x62c59c0xf8data1.0443548387096775
                                                    None0x62c6940xe2data1.0486725663716814
                                                    None0x62c7780xd6data1.0514018691588785
                                                    None0x62c8500x140data1.034375
                                                    None0x62c9900x88data1.0808823529411764
                                                    None0x62ca180x10cdata1.041044776119403
                                                    None0x62cb240x9adata1.0714285714285714
                                                    None0x62cbc00x88data1.0808823529411764
                                                    None0x62cc480xc4data1.0561224489795917
                                                    None0x62cd0c0xbcdata1.0585106382978724
                                                    None0x62cdc80xa2data1.0679012345679013
                                                    None0x62ce6c0x100OpenPGP Secret Key1.04296875
                                                    None0x62cf6c0x100data1.04296875
                                                    None0x62d06c0x126data1.0374149659863945
                                                    None0x62d1940x100data1.04296875
                                                    None0x62d2940x80data1.0859375
                                                    None0x62d3140xeedata1.046218487394958
                                                    None0x62d4040x9edata1.0696202531645569
                                                    None0x62d4a40x94data1.0743243243243243
                                                    None0x62d5380xf8OpenPGP Public Key1.0443548387096775
                                                    None0x62d6300xe0data1.0491071428571428
                                                    None0x62d7100x100data1.04296875
                                                    None0x62d8100x8adata1.0797101449275361
                                                    None0x62d89c0x5adata1.1222222222222222
                                                    None0x62d8f80x100data1.04296875
                                                    None0x62d9f80xacdata1.063953488372093
                                                    None0x62daa40x144data1.0339506172839505
                                                    None0x62dbe80x14edata1.032934131736527
                                                    None0x62dd380xa4data1.0670731707317074
                                                    None0x62dddc0xd0data1.0528846153846154
                                                    None0x62deac0xf8data1.0443548387096775
                                                    None0x62dfa40x15adata1.0317919075144508
                                                    None0x62e1000xb2data1.0617977528089888
                                                    None0x62e1b40xf2data1.0454545454545454
                                                    None0x62e2a80xbcdata1.0585106382978724
                                                    None0x62e3640xc2data1.056701030927835
                                                    None0x62e4280xe8data1.0474137931034482
                                                    None0x62e5100x164data1.0308988764044944
                                                    None0x62e6740x98data1.0723684210526316
                                                    None0x62e70c0xf4OpenPGP Public Key1.0450819672131149
                                                    None0x62e8000x158data1.0319767441860466
                                                    None0x62e9580xe0data1.0491071428571428
                                                    None0x62ea380x82data1.0846153846153845
                                                    None0x62eabc0x126data1.0374149659863945
                                                    DLLImport
                                                    ADVAPI32.dllRegOpenKeyExA
                                                    api-ms-win-crt-heap-l1-1-0.dllfree
                                                    api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                                                    api-ms-win-crt-math-l1-1-0.dllcosf
                                                    api-ms-win-crt-runtime-l1-1-0.dllexit
                                                    api-ms-win-crt-stdio-l1-1-0.dllfseek
                                                    api-ms-win-crt-string-l1-1-0.dllstrcmp
                                                    api-ms-win-crt-utility-l1-1-0.dllqsort
                                                    d3d9.dllDirect3DCreate9
                                                    IMM32.dllImmGetContext
                                                    kErneL32.DlLLoadLibraryA, DeleteAtom, GetProcAddress, VirtualProtect
                                                    MSVCP140.dll_Query_perf_counter
                                                    olE32.dllCoTaskMemFree
                                                    SHELL32.dllShellExecuteA
                                                    USER32.dllSetCursor
                                                    VCRUNTIME140.dllmemset
                                                    VCRUNTIME140_1.dll__CxxFrameHandler4
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishUnited States
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2024-12-18T19:37:15.832886+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649714172.67.75.163443TCP
                                                    • Total Packets: 12
                                                    • 443 (HTTPS)
                                                    • 53 (DNS)
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 18, 2024 19:37:13.628911018 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:13.628950119 CET44349714172.67.75.163192.168.2.6
                                                    Dec 18, 2024 19:37:13.629035950 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:13.642235041 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:13.642246962 CET44349714172.67.75.163192.168.2.6
                                                    Dec 18, 2024 19:37:14.875044107 CET44349714172.67.75.163192.168.2.6
                                                    Dec 18, 2024 19:37:14.877188921 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:15.349327087 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:15.349348068 CET44349714172.67.75.163192.168.2.6
                                                    Dec 18, 2024 19:37:15.349687099 CET44349714172.67.75.163192.168.2.6
                                                    Dec 18, 2024 19:37:15.349746943 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:15.364975929 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:15.411345005 CET44349714172.67.75.163192.168.2.6
                                                    Dec 18, 2024 19:37:15.832880020 CET44349714172.67.75.163192.168.2.6
                                                    Dec 18, 2024 19:37:15.832948923 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:15.832968950 CET44349714172.67.75.163192.168.2.6
                                                    Dec 18, 2024 19:37:15.832988977 CET44349714172.67.75.163192.168.2.6
                                                    Dec 18, 2024 19:37:15.833010912 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:15.833034039 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:15.834861040 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:15.834884882 CET44349714172.67.75.163192.168.2.6
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 18, 2024 19:37:13.482150078 CET5779753192.168.2.61.1.1.1
                                                    Dec 18, 2024 19:37:13.622361898 CET53577971.1.1.1192.168.2.6
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Dec 18, 2024 19:37:13.482150078 CET192.168.2.61.1.1.10x4496Standard query (0)api.myip.comA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Dec 18, 2024 19:37:09.661267042 CET1.1.1.1192.168.2.60x25aeNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                    Dec 18, 2024 19:37:09.661267042 CET1.1.1.1192.168.2.60x25aeNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                    Dec 18, 2024 19:37:13.622361898 CET1.1.1.1192.168.2.60x4496No error (0)api.myip.com172.67.75.163A (IP address)IN (0x0001)false
                                                    Dec 18, 2024 19:37:13.622361898 CET1.1.1.1192.168.2.60x4496No error (0)api.myip.com104.26.9.59A (IP address)IN (0x0001)false
                                                    Dec 18, 2024 19:37:13.622361898 CET1.1.1.1192.168.2.60x4496No error (0)api.myip.com104.26.8.59A (IP address)IN (0x0001)false
                                                    • api.myip.com
                                                    No statistics
                                                    Target ID:0
                                                    Start time:13:37:12
                                                    Start date:18/12/2024
                                                    Path:C:\Users\user\Desktop\solara-executor.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Users\user\Desktop\solara-executor.exe"
                                                    Imagebase:0x7ff6341b0000
                                                    File size:1'248'295 bytes
                                                    MD5 hash:6107673FE6DE87AC938D8D45CEEE771B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:low
                                                    Has exited:false

                                                    No disassembly