Analysis
-
max time kernel
81s -
max time network
81s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2023, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
Rad me.txt
Resource
win10v2004-20231025-en
Behavioral task
behavioral2
Sample
Silver Rat V 1.0.exe
Resource
win10v2004-20231023-en
General
-
Target
Silver Rat V 1.0.exe
-
Size
3.3MB
-
MD5
210ba4e7edc2c9c85d25f08448e040b5
-
SHA1
d3fc80539f0407fbde7799892386ac806be8191d
-
SHA256
0c1544e0410e62f44cc3eb53fb4eb2fbdccf6dc4fd87c6e5b754956b08f2acb9
-
SHA512
d6e89d3c06a3e681cd9d9b4005dc55db9a48ec843191097daae97098601c4103c20049f710fdd1906776dd2b3db401117952ccc1c33851153b857f4fe9a1049f
-
SSDEEP
49152:J4uPGKYSBO99jGvkL+gG7AA1ScgoPByIA:J42KcC+gGUtdoPByB
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svhoststartup = "C:\\users\\Admin\\AppData\\Local\\Temp\\svhost.exe" Silver Rat V 1.0.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2364 taskmgr.exe Token: SeSystemProfilePrivilege 2364 taskmgr.exe Token: SeCreateGlobalPrivilege 2364 taskmgr.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe 2364 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Silver Rat V 1.0.exe"C:\Users\Admin\AppData\Local\Temp\Silver Rat V 1.0.exe"1⤵
- Adds Run key to start application
PID:2016
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD5210ba4e7edc2c9c85d25f08448e040b5
SHA1d3fc80539f0407fbde7799892386ac806be8191d
SHA2560c1544e0410e62f44cc3eb53fb4eb2fbdccf6dc4fd87c6e5b754956b08f2acb9
SHA512d6e89d3c06a3e681cd9d9b4005dc55db9a48ec843191097daae97098601c4103c20049f710fdd1906776dd2b3db401117952ccc1c33851153b857f4fe9a1049f