Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
420s -
max time network
1144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 00:34
Static task
static1
Behavioral task
behavioral1
Sample
SilverClient.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SilverClient.exe
Resource
win10v2004-20240802-en
General
-
Target
SilverClient.exe
-
Size
42KB
-
MD5
e32cc14226ce47c9342ed347c7a47438
-
SHA1
a8ec8484eebdd76d38988007a21afe56cbeaf951
-
SHA256
59dd74a25d62b758529d2a9bfd5fefde30077b26249116ceffd01ce16b2688fa
-
SHA512
b164661ca40c386843b00cbeff8a86157a23f0e4c5e539fe596fad8786a1752ef50eaa65590a65ae1ca6512e720e3501fece61381b921f55e3ec4855f91bfc63
-
SSDEEP
768:MiIsJJcPlV1csUxJRBN/l+cJn6590BcmSHrlruPXr7yaaxLEt0URohRULL9S+1fr:MiIsDctUBbn659XTkt0UQGf9Zr1QoE9W
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/1864-29-0x000000001E420000-0x000000001E44A000-memory.dmp family_stormkitty -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation $77test.exe -
Executes dropped EXE 1 IoCs
pid Process 1864 $77test.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Users\\Admin\\test\\$77test.exe\"" SilverClient.exe -
pid Process 4648 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 2 IoCs
pid Process 3288 timeout.exe 3632 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3544 schtasks.exe 2164 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4512 SilverClient.exe 4512 SilverClient.exe 4512 SilverClient.exe 4512 SilverClient.exe 4512 SilverClient.exe 4512 SilverClient.exe 4512 SilverClient.exe 4512 SilverClient.exe 4512 SilverClient.exe 4512 SilverClient.exe 4512 SilverClient.exe 4512 SilverClient.exe 4512 SilverClient.exe 4512 SilverClient.exe 4512 SilverClient.exe 4512 SilverClient.exe 4512 SilverClient.exe 4512 SilverClient.exe 4512 SilverClient.exe 4512 SilverClient.exe 4512 SilverClient.exe 4512 SilverClient.exe 4512 SilverClient.exe 1864 $77test.exe 4648 powershell.exe 4648 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 648 vssvc.exe Token: SeRestorePrivilege 648 vssvc.exe Token: SeAuditPrivilege 648 vssvc.exe Token: SeDebugPrivilege 4512 SilverClient.exe Token: SeDebugPrivilege 1864 $77test.exe Token: SeDebugPrivilege 4648 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1864 $77test.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4512 wrote to memory of 3504 4512 SilverClient.exe 97 PID 4512 wrote to memory of 3504 4512 SilverClient.exe 97 PID 3504 wrote to memory of 3288 3504 cmd.exe 99 PID 3504 wrote to memory of 3288 3504 cmd.exe 99 PID 3504 wrote to memory of 1864 3504 cmd.exe 100 PID 3504 wrote to memory of 1864 3504 cmd.exe 100 PID 1864 wrote to memory of 2576 1864 $77test.exe 103 PID 1864 wrote to memory of 2576 1864 $77test.exe 103 PID 1864 wrote to memory of 3544 1864 $77test.exe 105 PID 1864 wrote to memory of 3544 1864 $77test.exe 105 PID 1864 wrote to memory of 2620 1864 $77test.exe 107 PID 1864 wrote to memory of 2620 1864 $77test.exe 107 PID 1864 wrote to memory of 4648 1864 $77test.exe 109 PID 1864 wrote to memory of 4648 1864 $77test.exe 109 PID 1864 wrote to memory of 2164 1864 $77test.exe 110 PID 1864 wrote to memory of 2164 1864 $77test.exe 110 PID 1864 wrote to memory of 3544 1864 $77test.exe 114 PID 1864 wrote to memory of 3544 1864 $77test.exe 114 PID 1864 wrote to memory of 3964 1864 $77test.exe 116 PID 1864 wrote to memory of 3964 1864 $77test.exe 116 PID 3964 wrote to memory of 3632 3964 cmd.exe 118 PID 3964 wrote to memory of 3632 3964 cmd.exe 118 PID 3544 wrote to memory of 4060 3544 cmd.exe 119 PID 3544 wrote to memory of 4060 3544 cmd.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SilverClient.exe"C:\Users\Admin\AppData\Local\Temp\SilverClient.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp68.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3288
-
-
C:\Users\Admin\test\$77test.exe"C:\Users\Admin\test\$77test.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /query /TN $77test.exe4⤵PID:2576
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /Create /SC ONCE /TN "$77test.exe" /TR "C:\Users\Admin\test\$77test.exe \"\$77test.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:3544
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /query /TN $77test.exe4⤵PID:2620
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc daily /tn "test_Task-DAILY-21PM" /TR "%MyFile%" /ST 21:004⤵
- Scheduled Task/Job: Scheduled Task
PID:2164
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "$77test_Task"4⤵
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "$77test_Task"5⤵PID:4060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8A30.tmp.bat""4⤵
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\system32\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:3632
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:648
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
138B
MD5a45c7a6339145b9bd67b90cf5e9766d8
SHA19971bd67634939b00a763ae37a02235dcdd0a4ee
SHA256a6f8aaca52dda1cca76ca629901e60a5f53c888c0215a1a64a066462157f39f1
SHA512e0b48419bdca47d59743a1bf71325f39a4e91bfda979fdf3b4fb0e4f9d4f11bd8f96f1d3313b97cc71bb3c4bb0c06e77f482b088fe042020787f2d0643c284c8
-
Filesize
213B
MD5f6aa6aaee1d753faa19b49a39a8e6d58
SHA10bf7ef2e32bd70abcd1ba21165a424bd137cd916
SHA2568c51731454e483e48ed6664973748539bc5c13c756c25c3480047d540d9fd76f
SHA512a47ec3a7c663e459e9ba9756aa9a1d5c7f14450838738a7a41ebe498c4f6b8a08f2f247a2240effac7fafb40f93e59d491f12ff76a800309b6c5699d10ab92f7
-
Filesize
42KB
MD5e32cc14226ce47c9342ed347c7a47438
SHA1a8ec8484eebdd76d38988007a21afe56cbeaf951
SHA25659dd74a25d62b758529d2a9bfd5fefde30077b26249116ceffd01ce16b2688fa
SHA512b164661ca40c386843b00cbeff8a86157a23f0e4c5e539fe596fad8786a1752ef50eaa65590a65ae1ca6512e720e3501fece61381b921f55e3ec4855f91bfc63