Analysis
-
max time kernel
0s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 11:34
Static task
static1
Behavioral task
behavioral1
Sample
SilverBulletPro.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SilverBulletPro.exe
Resource
win10v2004-20240802-en
General
-
Target
SilverBulletPro.exe
-
Size
582KB
-
MD5
7792204600db976484caa3992b121b30
-
SHA1
9b343f3c67b13d9632ed862ee010a2aff0c6810c
-
SHA256
a1a301d6a034b7a656b955d18191cd817f255a918d92994678728a5b1b0367e8
-
SHA512
bd711debe936b21130dfdd273a117cb0c5d31bfc972dbe89827546c4210d6b19aaf6ce287ff502112c9796be07300147079f29ef334fdd1691dfded0e9f98920
-
SSDEEP
12288:Qtzww69TdCahIRMJuAfki/U7vsBqpq/S1Q:owNTd16M0/i/U7vqqpU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2756 2884 SilverBulletPro.exe 30 PID 2884 wrote to memory of 2756 2884 SilverBulletPro.exe 30 PID 2884 wrote to memory of 2756 2884 SilverBulletPro.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\SilverBulletPro.exe"C:\Users\Admin\AppData\Local\Temp\SilverBulletPro.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\64CB.tmp\64CC.tmp\64CD.bat C:\Users\Admin\AppData\Local\Temp\SilverBulletPro.exe"2⤵PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127B
MD573d208fe0c41846b488752abfb2a34a0
SHA16018e19d0bd85b37c250a2bd6b50acfd2a69a016
SHA2565a7048e751708bc8fc539a72826395b1ed802ded7aa599f4718c915cfea46a2f
SHA512d404cf3ac8fd02dc2dd8c488981bf8f7750aeaf298978ede98db0e479f867ab037b408ca505972f4844c9f96364468be1be62fca38af7c1816e524edc0ce980f