Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
480s -
max time network
488s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
submitted
08/09/2024, 16:56
Static task
static1
Behavioral task
behavioral1
Sample
SilverClient.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SilverClient.exe
Resource
win10v2004-20240802-en
General
-
Target
SilverClient.exe
-
Size
39KB
-
MD5
ce605150f3e3659a4aef120756715d57
-
SHA1
dd041031aed90df236f704812327455d90acc61b
-
SHA256
fa0365f999d7e9fb5f06db07c17b64071fcb175780c2f3b596bded52de435def
-
SHA512
d8d671644891d7d9e6725a2cd451b4d3c3557f7451096e1f034943afbcb8b85f14ef1c8c1179034bb3a9b2db4732a726fa63ef1cd5c61f1c014b24a927f25ebf
-
SSDEEP
768:q2P7BLBW9U/hnvREaKv34+VnWuPlqJ01cGRU7VTXz1QB6S8h1QrSOoQSKTt0bE:JTBYQEaKvpPlH1cGGR1Qonh1ROo5K5GE
Malware Config
Extracted
silverrat
1.0.0.0
dvd-fell.gl.at.ply.gg:62021
lAxDBRhAFu
-
certificate
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
-
decrypted_key
-|S.S.S|-
-
discord
https://discord.com/api/webhooks/1279198270023012415/rnQa1jibxs5fz_rzD55bAf0myK6RBF87J-_PInBmtHIFdgwAv33qWV9txbMJLNEEKcZ5
-
key
yy6zDjAUmbB09pKvo5Hhug==
-
key_x509
b0FGeVZNcFRMWVloVHR6Z0VESU5RdlpZUmxZbUFE
-
payload_url
https://g.top4top.io/p_2522c7w8u1.png
-
reconnect_delay
4
-
server_signature
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
Signatures
-
Silverrat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/3684-25-0x0000000001D30000-0x0000000001D5A000-memory.dmp family_stormkitty -
Stormkitty family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 14 discord.com 15 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 180 msedge.exe 180 msedge.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3684 SilverClient.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 2024 vssvc.exe Token: SeRestorePrivilege 2024 vssvc.exe Token: SeAuditPrivilege 2024 vssvc.exe Token: SeDebugPrivilege 3684 SilverClient.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe 3684 SilverClient.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3684 SilverClient.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4600 wrote to memory of 700 4600 msedge.exe 112 PID 4600 wrote to memory of 700 4600 msedge.exe 112 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 1912 4600 msedge.exe 113 PID 4600 wrote to memory of 180 4600 msedge.exe 114 PID 4600 wrote to memory of 180 4600 msedge.exe 114 PID 4600 wrote to memory of 1480 4600 msedge.exe 115 PID 4600 wrote to memory of 1480 4600 msedge.exe 115 PID 4600 wrote to memory of 1480 4600 msedge.exe 115 PID 4600 wrote to memory of 1480 4600 msedge.exe 115 PID 4600 wrote to memory of 1480 4600 msedge.exe 115 PID 4600 wrote to memory of 1480 4600 msedge.exe 115 PID 4600 wrote to memory of 1480 4600 msedge.exe 115 PID 4600 wrote to memory of 1480 4600 msedge.exe 115 PID 4600 wrote to memory of 1480 4600 msedge.exe 115 PID 4600 wrote to memory of 1480 4600 msedge.exe 115 PID 4600 wrote to memory of 1480 4600 msedge.exe 115 PID 4600 wrote to memory of 1480 4600 msedge.exe 115 PID 4600 wrote to memory of 1480 4600 msedge.exe 115 PID 4600 wrote to memory of 1480 4600 msedge.exe 115 PID 4600 wrote to memory of 1480 4600 msedge.exe 115 PID 4600 wrote to memory of 1480 4600 msedge.exe 115 PID 4600 wrote to memory of 1480 4600 msedge.exe 115 PID 4600 wrote to memory of 1480 4600 msedge.exe 115 PID 4600 wrote to memory of 1480 4600 msedge.exe 115 PID 4600 wrote to memory of 1480 4600 msedge.exe 115 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SilverClient.exe"C:\Users\Admin\AppData\Local\Temp\SilverClient.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3684
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault86f07529h3551h4406h9d4bh05fa8112d0a81⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffdf57e46f8,0x7ffdf57e4708,0x7ffdf57e47182⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,6176271164177682641,7078900350225980661,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,6176271164177682641,7078900350225980661,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,6176271164177682641,7078900350225980661,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:1480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
5KB
MD5fc4df9ca94e9486a13b1c85567e6f6d7
SHA15e8f8878be92ec7b790951c4e1c3aa0853c78d62
SHA256c3a14bea30eed239b8948203433f6922cf8a1b4990ddaa90ccb8ae22fd9f23dc
SHA5122ddd06a87360442e07edc1c1aa2a1e6c9fd22b6cfdc84bcde7d6fd938c1eed52050e0e2b202e8b6a0c2c781bfbb4f5484b2c221ac9d9067982d4de55690f6ff7
-
Filesize
8KB
MD5517b70600d04829c78035ac58ecdfa34
SHA130b466431c858851df3ff8c03d156d3938ae9a25
SHA256f88d26395c35470aa0be7e7c1e2abab074ef7f6e64ef8bb35b44bf4e104e9a90
SHA5123027a8e73b79854385c3ad10035daa8d7773faafd4035e08095e877938b33efea5f4f1cb9f5ed0d3ef196b1b5202c5f9983a0a7d609a1529c242fc8db9494822