Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
3Plugins/Si...in.dll
windows7-x64
1Plugins/Si...in.dll
windows10-2004-x64
1SilverBullet.exe
windows7-x64
1SilverBullet.exe
windows10-2004-x64
6amd64/Micr...00.dll
windows7-x64
1amd64/Micr...00.dll
windows10-2004-x64
1amd64/Micr...00.dll
windows7-x64
1amd64/Micr...00.dll
windows10-2004-x64
1bin/AngleSharp.dll
windows7-x64
1bin/AngleSharp.dll
windows10-2004-x64
1bin/BCrypt.Net.dll
windows7-x64
1bin/BCrypt.Net.dll
windows10-2004-x64
1bin/Bouncy...to.dll
windows7-x64
1bin/Bouncy...to.dll
windows10-2004-x64
1bin/Captch...re.dll
windows7-x64
1bin/Captch...re.dll
windows10-2004-x64
1bin/CaptchaSharp.dll
windows7-x64
1bin/CaptchaSharp.dll
windows10-2004-x64
1bin/Cloudf...Re.dll
windows7-x64
1bin/Cloudf...Re.dll
windows10-2004-x64
1bin/Common...or.dll
windows7-x64
1bin/Common...or.dll
windows10-2004-x64
1bin/ControlzEx.dll
windows7-x64
1bin/ControlzEx.dll
windows10-2004-x64
1bin/CryptSharp.dll
windows7-x64
1bin/CryptSharp.dll
windows10-2004-x64
1bin/EO.Base.dll
windows7-x64
1bin/EO.Base.dll
windows10-2004-x64
1bin/EO.Web...pf.dll
windows7-x64
1bin/EO.Web...pf.dll
windows10-2004-x64
1bin/EO.WebBrowser.dll
windows7-x64
1bin/EO.WebBrowser.dll
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 15:24
Static task
static1
Behavioral task
behavioral1
Sample
Plugins/SilverBullet.Plugin.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Plugins/SilverBullet.Plugin.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
SilverBullet.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
SilverBullet.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
amd64/Microsoft.VC100.CRT/msvcp100.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
amd64/Microsoft.VC100.CRT/msvcp100.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
amd64/Microsoft.VC100.CRT/msvcr100.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
amd64/Microsoft.VC100.CRT/msvcr100.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
bin/AngleSharp.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
bin/AngleSharp.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
bin/BCrypt.Net.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
bin/BCrypt.Net.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
bin/BouncyCastle.Crypto.dll
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
bin/BouncyCastle.Crypto.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
bin/CaptchaSharp.Services.More.dll
Resource
win7-20240419-en
Behavioral task
behavioral16
Sample
bin/CaptchaSharp.Services.More.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
bin/CaptchaSharp.dll
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
bin/CaptchaSharp.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
bin/CloudflareSolverRe.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
bin/CloudflareSolverRe.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
bin/CommonServiceLocator.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
bin/CommonServiceLocator.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
bin/ControlzEx.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
bin/ControlzEx.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
bin/CryptSharp.dll
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
bin/CryptSharp.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
bin/EO.Base.dll
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
bin/EO.Base.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
bin/EO.WebBrowser.Wpf.dll
Resource
win7-20240419-en
Behavioral task
behavioral30
Sample
bin/EO.WebBrowser.Wpf.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
bin/EO.WebBrowser.dll
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
bin/EO.WebBrowser.dll
Resource
win10v2004-20240508-en
General
-
Target
SilverBullet.exe
-
Size
2.2MB
-
MD5
0267076b75cdcfa7ea98aba0bf033aee
-
SHA1
e168f887d26f0f752ef9e28ffc154b9afc1f1783
-
SHA256
9f160d80765337c3609242b9d0bd4d16856e1d57a7c2ff55ce8b00b45e5bea81
-
SHA512
18899a1b90a85ef2adbc71224d51ae51ea7e87662f71ff498734cf8a267aafd1c265bdb5a78b78437168f825ff28d894420ffdeb6af1653d150740b93d487122
-
SSDEEP
24576:ySvh1TfFIH9gYRRcY+32oQRLwDQF4eaE2cZPeAgF7H2oQRLwDCTCnVHtLOgTqEjK:y0h/7DQB/FOLDQB2zOQB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000a7adbf351f3acc1a99dc049cbfff12ef030a1bf24b58e8bbcc78d5bda44c7590000000000e8000000002000020000000f8aa10a7e511f6f213daadd42f28c2dbcec02d11f301061aed9f90b44d0de1752000000013b1e9495ee42fc926da72bc6b5f82ac87070501d3d6bf7bbbe6045c3a93953f400000004deb17dab71c865336715501427529469c62c583691171dfc02e6f013e179bf732a8d5d7883640ad1c18a49c1376de51e7f7ec75409e0e61c0ed268dc014cac3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{12C17871-2807-11EF-965F-FA9381F5F0AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103aa0f513bcda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424281521" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1760 iexplore.exe 2840 msdt.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1760 1736 SilverBullet.exe 28 PID 1736 wrote to memory of 1760 1736 SilverBullet.exe 28 PID 1736 wrote to memory of 1760 1736 SilverBullet.exe 28 PID 1736 wrote to memory of 1760 1736 SilverBullet.exe 28 PID 1760 wrote to memory of 2764 1760 iexplore.exe 30 PID 1760 wrote to memory of 2764 1760 iexplore.exe 30 PID 1760 wrote to memory of 2764 1760 iexplore.exe 30 PID 1760 wrote to memory of 2764 1760 iexplore.exe 30 PID 2764 wrote to memory of 2840 2764 IEXPLORE.EXE 34 PID 2764 wrote to memory of 2840 2764 IEXPLORE.EXE 34 PID 2764 wrote to memory of 2840 2764 IEXPLORE.EXE 34 PID 2764 wrote to memory of 2840 2764 IEXPLORE.EXE 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\SilverBullet.exe"C:\Users\Admin\AppData\Local\Temp\SilverBullet.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=SilverBullet.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.02⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\msdt.exe-modal 327708 -skip TRUE -path C:\Windows\diagnostics\system\networking -af C:\Users\Admin\AppData\Local\Temp\NDFCC83.tmp -ep NetworkDiagnosticsWeb4⤵
- Suspicious use of FindShellTrayWindow
PID:2840
-
-
-
-
C:\Windows\SysWOW64\sdiagnhost.exeC:\Windows\SysWOW64\sdiagnhost.exe -Embedding1⤵PID:1924
-
C:\Windows\SysWOW64\sdiagnhost.exeC:\Windows\SysWOW64\sdiagnhost.exe -Embedding1⤵PID:3008
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\ElevatedDiagnostics\460911090\2024061115.000\NetworkDiagnostics.0.debugreport.xml
Filesize67KB
MD519d820f6f1838fe9ea78a4068f1ffa60
SHA1ee457bc653b7700eb18871a9d4ca7f4180bae283
SHA256a15649ca72f38d74b3cc326ae7c5f619e34e97e7a21dd0a6f4428603a5b3480f
SHA51249d1bd0c2f9fc8b85fb91be67f49b6e73215c5c7e4688419a74f42010bdbdfd216a50eb898b08fe2db79868f413a06ab665a1a610103e91ca612d99461f710ec
-
C:\Users\Admin\AppData\Local\ElevatedDiagnostics\460911090\2024061115.000\NetworkDiagnostics.1.debugreport.xml
Filesize8KB
MD57bdffcd33b93582ffc3b8ac49d3afa6e
SHA103f0d51d27a3e6dfb7d46376d4bbae637f02e3ff
SHA25629892687770579bc8723408cebf6181f8d3312d423a8111202ec7178c4169f79
SHA5128195e2bbffbf94b79501ef75138adf55747a30da2f7e6c7c37289296792ef9bd57f396c7f25ccdfe0556519d37f9f3eedba8e0544e02c82b920a9474638a175b
-
Filesize
4KB
MD5fa2ee21d984c975c3eeff7920509b341
SHA1097772b6c55ce5cb15ca8b5cd018bcd24c4c34b4
SHA256258e351e560c6fa57b9b6a8efa15ac84bbed05c9feb0e4f0746e475307d5762d
SHA5125677be04e29356c8c96c97b82fa3dfd597ab843b6fd8384901bd7b97122fb76745fbcb01322da3d11455e7d38fd3e5768046a58a173104115ad2b5a976180fe2
-
Filesize
23KB
MD51d192ce36953dbb7dc7ee0d04c57ad8d
SHA17008e759cb47bf74a4ea4cd911de158ef00ace84
SHA256935a231924ae5d4a017b0c99d4a5f3904ef280cea4b3f727d365283e26e8a756
SHA512e864ac74e9425a6c7f1be2bbc87df9423408e16429cb61fa1de8875356226293aa07558b2fafdd5d0597254474204f5ba181f4e96c2bc754f1f414748f80a129
-
Filesize
567B
MD5a660422059d953c6d681b53a6977100e
SHA10c95dd05514d062354c0eecc9ae8d437123305bb
SHA256d19677234127c38a52aec23686775a8eb3f4e3a406f4a11804d97602d6c31813
SHA51226f8cf9ac95ff649ecc2ed349bc6c7c3a04b188594d5c3289af8f2768ab59672bc95ffefcc83ed3ffa44edd0afeb16a4c2490e633a89fce7965843674d94b523
-
Filesize
52KB
MD52f7c3db0c268cf1cf506fe6e8aecb8a0
SHA1fb35af6b329d60b0ec92e24230eafc8e12b0a9f9
SHA256886a625f71e0c35e5722423ed3aa0f5bff8d120356578ab81a64de2ab73d47f3
SHA512322f2b1404a59ee86c492b58d56b8a6ed6ebc9b844a8c38b7bb0b0675234a3d5cfc9f1d08c38c218070e60ce949aa5322de7a2f87f952e8e653d0ca34ff0de45
-
Filesize
2KB
MD50c75ae5e75c3e181d13768909c8240ba
SHA1288403fc4bedaacebccf4f74d3073f082ef70eb9
SHA256de5c231c645d3ae1e13694284997721509f5de64ee5c96c966cdfda9e294db3f
SHA5128fc944515f41a837c61a6c4e5181ca273607a89e48fbf86cf8eb8db837aed095aa04fc3043029c3b5cb3710d59abfd86f086ac198200f634bfb1a5dd0823406b
-
Filesize
5KB
MD5dc9be0fdf9a4e01693cfb7d8a0d49054
SHA174730fd9c9bd4537fd9a353fe4eafce9fcc105e6
SHA256944186cd57d6adc23a9c28fc271ed92dd56efd6f3bb7c9826f7208ea1a1db440
SHA51292ad96fa6b221882a481b36ff2b7114539eb65be46ee9e3139e45b72da80aac49174155483cba6254b10fff31f0119f07cbc529b1b69c45234c7bb61766aad66
-
Filesize
478KB
MD54dae3266ab0bdb38766836008bf2c408
SHA11748737e777752491b2a147b7e5360eda4276364
SHA256d2ff079b3f9a577f22856d1be0217376f140fcf156e3adf27ebe6149c9fd225a
SHA51291fb8abd1832d785cd5a20da42c5143cd87a8ef49196c06cfb57a7a8de607f39543e8a36be9207842a992769b1c3c55d557519e59063f1f263b499f01887b01b
-
Filesize
13KB
MD51ccc67c44ae56a3b45cc256374e75ee1
SHA1bbfc04c4b0220ae38fa3f3e2ea52b7370436ed1f
SHA256030191d10ffb98cecd3f09ebdc606c768aaf566872f718303592fff06ba51367
SHA512b67241f4ad582e50a32f0ecf53c11796aef9e5b125c4be02511e310b85bdfa3796579bbf3f0c8fe5f106a5591ec85e66d89e062b792ea38ca29cb3b03802f6c6
-
Filesize
152KB
MD5c9fb87fa3460fae6d5d599236cfd77e2
SHA1a5bf8241156e8a9d6f34d70d467a9b5055e087e7
SHA256cde728c08a4e50a02fcff35c90ee2b3b33ab24c8b858f180b6a67bfa94def35f
SHA512f4f0cb1b1c823dcd91f6cfe8d473c41343ebf7ed0e43690eecc290e37cee10c20a03612440f1169eef08cc8059aaa23580aa76dd86c1704c4569e8139f9781b3
-
Filesize
47KB
MD5310e1da2344ba6ca96666fb639840ea9
SHA1e8694edf9ee68782aa1de05470b884cc1a0e1ded
SHA25667401342192babc27e62d4c1e0940409cc3f2bd28f77399e71d245eae8d3f63c
SHA51262ab361ffea1f0b6ff1cc76c74b8e20c2499d72f3eb0c010d47dba7e6d723f9948dba3397ea26241a1a995cffce2a68cd0aaa1bb8d917dd8f4c8f3729fa6d244