Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    480s
  • max time network
    488s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • submitted
    08/09/2024, 16:56

General

  • Target

    SilverClient.exe

  • Size

    39KB

  • MD5

    ce605150f3e3659a4aef120756715d57

  • SHA1

    dd041031aed90df236f704812327455d90acc61b

  • SHA256

    fa0365f999d7e9fb5f06db07c17b64071fcb175780c2f3b596bded52de435def

  • SHA512

    d8d671644891d7d9e6725a2cd451b4d3c3557f7451096e1f034943afbcb8b85f14ef1c8c1179034bb3a9b2db4732a726fa63ef1cd5c61f1c014b24a927f25ebf

  • SSDEEP

    768:q2P7BLBW9U/hnvREaKv34+VnWuPlqJ01cGRU7VTXz1QB6S8h1QrSOoQSKTt0bE:JTBYQEaKvpPlH1cGGR1Qonh1ROo5K5GE

Malware Config

Extracted

Family

silverrat

Version

1.0.0.0

C2

dvd-fell.gl.at.ply.gg:62021

Mutex

lAxDBRhAFu

Attributes
  • certificate

    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

  • decrypted_key

    -|S.S.S|-

  • discord

    https://discord.com/api/webhooks/1279198270023012415/rnQa1jibxs5fz_rzD55bAf0myK6RBF87J-_PInBmtHIFdgwAv33qWV9txbMJLNEEKcZ5

  • key

    yy6zDjAUmbB09pKvo5Hhug==

  • key_x509

    b0FGeVZNcFRMWVloVHR6Z0VESU5RdlpZUmxZbUFE

  • payload_url

    https://g.top4top.io/p_2522c7w8u1.png

  • reconnect_delay

    4

  • server_signature

    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

Signatures

  • SilverRat

    SilverRat is trojan written in C#.

  • Silverrat family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\SilverClient.exe
    "C:\Users\Admin\AppData\Local\Temp\SilverClient.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:3684
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2024
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault86f07529h3551h4406h9d4bh05fa8112d0a8
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4600
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffdf57e46f8,0x7ffdf57e4708,0x7ffdf57e4718
      2⤵
        PID:700
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,6176271164177682641,7078900350225980661,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:2
        2⤵
          PID:1912
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,6176271164177682641,7078900350225980661,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:180
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,6176271164177682641,7078900350225980661,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:8
          2⤵
            PID:1480
        • C:\Windows\System32\CompPkgSrv.exe
          C:\Windows\System32\CompPkgSrv.exe -Embedding
          1⤵
            PID:668
          • C:\Windows\System32\CompPkgSrv.exe
            C:\Windows\System32\CompPkgSrv.exe -Embedding
            1⤵
              PID:2640

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

              Filesize

              152B

              MD5

              27304926d60324abe74d7a4b571c35ea

              SHA1

              78b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1

              SHA256

              7039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de

              SHA512

              f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd

            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

              Filesize

              5KB

              MD5

              fc4df9ca94e9486a13b1c85567e6f6d7

              SHA1

              5e8f8878be92ec7b790951c4e1c3aa0853c78d62

              SHA256

              c3a14bea30eed239b8948203433f6922cf8a1b4990ddaa90ccb8ae22fd9f23dc

              SHA512

              2ddd06a87360442e07edc1c1aa2a1e6c9fd22b6cfdc84bcde7d6fd938c1eed52050e0e2b202e8b6a0c2c781bfbb4f5484b2c221ac9d9067982d4de55690f6ff7

            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

              Filesize

              8KB

              MD5

              517b70600d04829c78035ac58ecdfa34

              SHA1

              30b466431c858851df3ff8c03d156d3938ae9a25

              SHA256

              f88d26395c35470aa0be7e7c1e2abab074ef7f6e64ef8bb35b44bf4e104e9a90

              SHA512

              3027a8e73b79854385c3ad10035daa8d7773faafd4035e08095e877938b33efea5f4f1cb9f5ed0d3ef196b1b5202c5f9983a0a7d609a1529c242fc8db9494822

            • memory/3684-16-0x0000000001790000-0x00000000017E6000-memory.dmp

              Filesize

              344KB

            • memory/3684-24-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-9-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-10-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-11-0x00000000018F0000-0x0000000001900000-memory.dmp

              Filesize

              64KB

            • memory/3684-12-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-14-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-15-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-0-0x00007FFDF7A33000-0x00007FFDF7A35000-memory.dmp

              Filesize

              8KB

            • memory/3684-17-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-18-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-19-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-21-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-94-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-23-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-1-0x0000000000AF0000-0x0000000000AFE000-memory.dmp

              Filesize

              56KB

            • memory/3684-25-0x0000000001D30000-0x0000000001D5A000-memory.dmp

              Filesize

              168KB

            • memory/3684-26-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-28-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-29-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-6-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-5-0x00007FFDF7A33000-0x00007FFDF7A35000-memory.dmp

              Filesize

              8KB

            • memory/3684-7-0x00007FFDF7A30000-0x00007FFDF84F1000-memory.dmp

              Filesize

              10.8MB

            • memory/3684-2-0x00007FFDF7A30000-0x00007FFDF84F1000-memory.dmp

              Filesize

              10.8MB

            • memory/3684-22-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-95-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-96-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-97-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-98-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-99-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-100-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-101-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-103-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-104-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-107-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-108-0x0000000001400000-0x0000000001420000-memory.dmp

              Filesize

              128KB

            • memory/3684-109-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-110-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-136-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-137-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-140-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-144-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-145-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-146-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB

            • memory/3684-147-0x0000000001900000-0x000000000194B000-memory.dmp

              Filesize

              300KB