Analysis
-
max time kernel
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
submitted
31/01/2024, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
Silver.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Silver.exe
Resource
win10v2004-20231215-en
General
-
Target
Silver.exe
-
Size
40KB
-
MD5
c99c7d1673abd0499e508de4c2445523
-
SHA1
e7333eb204147ac867cc06b597fb858fd29db2cc
-
SHA256
6ccf17da9d1511886987f459d7524af6c195e853dff405ec211d9ae89163469c
-
SHA512
62db95fe4f8ecb2da45afea01241886e6f97b3e9ad3b56ac5b1d8c0eea335a4dbf1c32d584ef844fb38e259625b330cde1a6cb63cf6b98c26098f9dcae97a3d1
-
SSDEEP
768:00sNbahnB/yoF3Yvz/DZM4snnnn71A+RUbB489ZYzb8hdB6Sc4xO:07RPL+Gt9ZYXooB4xO
Malware Config
Extracted
silverrat
1.0.0.0
haffasdqa.duckdns.org:6070
SilverMutex_ZAISHXAYQR
-
certificate
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
-
decrypted_key
-|S.S.S|-
-
key
yy6zDjAUmbB09pKvo5Hhug==
-
key_x509
WmZhaWZHSlJEU1NHQ2lSQUdFck95dGxpQVVOd0lE
-
reconnect_delay
4
-
server_signature
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
Signatures
-
Silverrat family
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3700 attrib.exe 1236 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation Silver.exe -
Executes dropped EXE 1 IoCs
pid Process 3224 $77silver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\.cache\\$77silver.exe\"" Silver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3752 timeout.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2124 Silver.exe 2124 Silver.exe 2124 Silver.exe 2124 Silver.exe 2124 Silver.exe 2124 Silver.exe 2124 Silver.exe 2124 Silver.exe 2124 Silver.exe 2124 Silver.exe 2124 Silver.exe 2124 Silver.exe 2124 Silver.exe 2124 Silver.exe 2124 Silver.exe 2124 Silver.exe 2124 Silver.exe 2124 Silver.exe 2124 Silver.exe 2124 Silver.exe 2124 Silver.exe 2124 Silver.exe 2124 Silver.exe 3224 $77silver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2124 Silver.exe Token: SeDebugPrivilege 3224 $77silver.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3224 $77silver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2124 wrote to memory of 1236 2124 Silver.exe 84 PID 2124 wrote to memory of 1236 2124 Silver.exe 84 PID 2124 wrote to memory of 3700 2124 Silver.exe 86 PID 2124 wrote to memory of 3700 2124 Silver.exe 86 PID 2124 wrote to memory of 1632 2124 Silver.exe 95 PID 2124 wrote to memory of 1632 2124 Silver.exe 95 PID 1632 wrote to memory of 3752 1632 cmd.exe 97 PID 1632 wrote to memory of 3752 1632 cmd.exe 97 PID 1632 wrote to memory of 3224 1632 cmd.exe 98 PID 1632 wrote to memory of 3224 1632 cmd.exe 98 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1236 attrib.exe 3700 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Silver.exe"C:\Users\Admin\AppData\Local\Temp\Silver.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\.cache"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1236
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\.cache\$77silver.exe"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpCE1D.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3752
-
-
C:\Users\Admin\AppData\Roaming\.cache\$77silver.exe"C:\Users\Admin\AppData\Roaming\.cache\$77silver.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3224
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD5d61071bc67c7f9af8b5c794af6325849
SHA1e8ec04ad3ae76b3c701ea97e82d48d90d8601223
SHA256f6e6f66b72024b76258ea4c37d6d9665dc4c17a728787178e75f5ff90f3a0ab7
SHA5126a90bfabff391a3be38ec498647d11884a3092eac3150544967cc7c9139de3f7582ceb4505bb6840f2ca32096b94229a3d2dd2ee7de12f308da557c87f7576fb
-
Filesize
40KB
MD5c99c7d1673abd0499e508de4c2445523
SHA1e7333eb204147ac867cc06b597fb858fd29db2cc
SHA2566ccf17da9d1511886987f459d7524af6c195e853dff405ec211d9ae89163469c
SHA51262db95fe4f8ecb2da45afea01241886e6f97b3e9ad3b56ac5b1d8c0eea335a4dbf1c32d584ef844fb38e259625b330cde1a6cb63cf6b98c26098f9dcae97a3d1