Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
30s -
max time network
28s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2024, 16:16
Behavioral task
behavioral1
Sample
Silver.exe
Resource
win10v2004-20241007-en
General
-
Target
Silver.exe
-
Size
40KB
-
MD5
c99c7d1673abd0499e508de4c2445523
-
SHA1
e7333eb204147ac867cc06b597fb858fd29db2cc
-
SHA256
6ccf17da9d1511886987f459d7524af6c195e853dff405ec211d9ae89163469c
-
SHA512
62db95fe4f8ecb2da45afea01241886e6f97b3e9ad3b56ac5b1d8c0eea335a4dbf1c32d584ef844fb38e259625b330cde1a6cb63cf6b98c26098f9dcae97a3d1
-
SSDEEP
768:00sNbahnB/yoF3Yvz/DZM4snnnn71A+RUbB489ZYzb8hdB6Sc4xO:07RPL+Gt9ZYXooB4xO
Malware Config
Extracted
silverrat
1.0.0.0
haffasdqa.duckdns.org:6070
SilverMutex_ZAISHXAYQR
-
certificate
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
-
decrypted_key
-|S.S.S|-
-
key
yy6zDjAUmbB09pKvo5Hhug==
-
key_x509
WmZhaWZHSlJEU1NHQ2lSQUdFck95dGxpQVVOd0lE
-
reconnect_delay
4
-
server_signature
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
Signatures
-
Silverrat family
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 5008 attrib.exe 3620 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Silver.exe -
Executes dropped EXE 1 IoCs
pid Process 1540 $77silver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\.cache\\$77silver.exe\"" Silver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1908 timeout.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 3528 Silver.exe 3528 Silver.exe 3528 Silver.exe 3528 Silver.exe 3528 Silver.exe 3528 Silver.exe 3528 Silver.exe 3528 Silver.exe 3528 Silver.exe 3528 Silver.exe 3528 Silver.exe 3528 Silver.exe 3528 Silver.exe 3528 Silver.exe 3528 Silver.exe 3528 Silver.exe 3528 Silver.exe 3528 Silver.exe 3528 Silver.exe 3528 Silver.exe 3528 Silver.exe 3528 Silver.exe 3528 Silver.exe 1540 $77silver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3528 Silver.exe Token: SeDebugPrivilege 1540 $77silver.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1540 $77silver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3528 wrote to memory of 5008 3528 Silver.exe 83 PID 3528 wrote to memory of 5008 3528 Silver.exe 83 PID 3528 wrote to memory of 3620 3528 Silver.exe 85 PID 3528 wrote to memory of 3620 3528 Silver.exe 85 PID 3528 wrote to memory of 4072 3528 Silver.exe 99 PID 3528 wrote to memory of 4072 3528 Silver.exe 99 PID 4072 wrote to memory of 1908 4072 cmd.exe 101 PID 4072 wrote to memory of 1908 4072 cmd.exe 101 PID 4072 wrote to memory of 1540 4072 cmd.exe 102 PID 4072 wrote to memory of 1540 4072 cmd.exe 102 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 5008 attrib.exe 3620 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Silver.exe"C:\Users\Admin\AppData\Local\Temp\Silver.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\.cache"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:5008
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\.cache\$77silver.exe"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3620
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpC89F.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1908
-
-
C:\Users\Admin\AppData\Roaming\.cache\$77silver.exe"C:\Users\Admin\AppData\Roaming\.cache\$77silver.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD54a673ac50f04b11d312b16eceb6daa36
SHA12437621ad795e175f8a1e197a581dca0032c8261
SHA25631dd7610ddfe57f59096c7f6d2bdbec17e955274a1d187ea66ed8a0ac444e4d0
SHA51256b248516e8007a400ddd9c4d8dd4d7f444b2024599a9e28ee981c47fbc0d02a1b21ed95b2834ce5b666e802ca95533106395616171c1725190a52652814d014
-
Filesize
40KB
MD5c99c7d1673abd0499e508de4c2445523
SHA1e7333eb204147ac867cc06b597fb858fd29db2cc
SHA2566ccf17da9d1511886987f459d7524af6c195e853dff405ec211d9ae89163469c
SHA51262db95fe4f8ecb2da45afea01241886e6f97b3e9ad3b56ac5b1d8c0eea335a4dbf1c32d584ef844fb38e259625b330cde1a6cb63cf6b98c26098f9dcae97a3d1