Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-12-2024 02:45
Behavioral task
behavioral1
Sample
SilverClient.exe
Resource
win11-20241007-en
General
-
Target
SilverClient.exe
-
Size
42KB
-
MD5
953679a46f8bada4aea3c89e2026176a
-
SHA1
b78419d85a443d21fdd3bd6673c6c0b407f615da
-
SHA256
4008b0c3754f16bdf1365b0f894e48c82ccf5f8a656592fab4db899e11b73051
-
SHA512
4aabe38b1c404c4d61b08b4126bf509dc81cf50131db2c1061452cd795cc6c1f05055b03f8cadf99aa2b76f0f5c36fc3babe0cbb0a9d978a38fb71ca5f7ecd96
-
SSDEEP
768:GiImvwcOx/MUpJRBc/u+cJn6550BcmSHrlruPXr7yaaxLEt0URoPRULL9SI1PCBn:GiImIcOBBdn655XTkt0U2Gf9XKo39ZU
Malware Config
Extracted
silverrat
1.0.0.0
hope-asia.gl.at.ply.gg:35710
SilverMutex_RxkTUhToXD
-
certificate
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
-
decrypted_key
-|S.S.S|-
-
key
yy6zDjAUmbB09pKvo5Hhug==
-
key_x509
TVRpQXhBRVBpd1liZHFlUlNEQ0FEbVd4Z3JKU1JN
-
reconnect_delay
4
-
server_signature
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
Signatures
-
Silverrat family
-
Executes dropped EXE 1 IoCs
pid Process 4908 $77SystemUser.exe.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Users\\Admin\\SystemUser.exe\\$77SystemUser.exe.exe\"" SilverClient.exe -
pid Process 1900 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 392 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3340 schtasks.exe 1688 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2984 SilverClient.exe 2984 SilverClient.exe 2984 SilverClient.exe 2984 SilverClient.exe 2984 SilverClient.exe 2984 SilverClient.exe 2984 SilverClient.exe 2984 SilverClient.exe 2984 SilverClient.exe 2984 SilverClient.exe 2984 SilverClient.exe 2984 SilverClient.exe 2984 SilverClient.exe 2984 SilverClient.exe 2984 SilverClient.exe 2984 SilverClient.exe 2984 SilverClient.exe 2984 SilverClient.exe 2984 SilverClient.exe 4908 $77SystemUser.exe.exe 1900 powershell.exe 1900 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 2288 vssvc.exe Token: SeRestorePrivilege 2288 vssvc.exe Token: SeAuditPrivilege 2288 vssvc.exe Token: SeDebugPrivilege 2984 SilverClient.exe Token: SeDebugPrivilege 4908 $77SystemUser.exe.exe Token: SeDebugPrivilege 1900 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4908 $77SystemUser.exe.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2984 wrote to memory of 4596 2984 SilverClient.exe 82 PID 2984 wrote to memory of 4596 2984 SilverClient.exe 82 PID 4596 wrote to memory of 392 4596 cmd.exe 84 PID 4596 wrote to memory of 392 4596 cmd.exe 84 PID 4596 wrote to memory of 4908 4596 cmd.exe 85 PID 4596 wrote to memory of 4908 4596 cmd.exe 85 PID 4908 wrote to memory of 72 4908 $77SystemUser.exe.exe 87 PID 4908 wrote to memory of 72 4908 $77SystemUser.exe.exe 87 PID 4908 wrote to memory of 3340 4908 $77SystemUser.exe.exe 89 PID 4908 wrote to memory of 3340 4908 $77SystemUser.exe.exe 89 PID 4908 wrote to memory of 4572 4908 $77SystemUser.exe.exe 91 PID 4908 wrote to memory of 4572 4908 $77SystemUser.exe.exe 91 PID 4908 wrote to memory of 1900 4908 $77SystemUser.exe.exe 93 PID 4908 wrote to memory of 1900 4908 $77SystemUser.exe.exe 93 PID 4908 wrote to memory of 1688 4908 $77SystemUser.exe.exe 95 PID 4908 wrote to memory of 1688 4908 $77SystemUser.exe.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SilverClient.exe"C:\Users\Admin\AppData\Local\Temp\SilverClient.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp336F.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:392
-
-
C:\Users\Admin\SystemUser.exe\$77SystemUser.exe.exe"C:\Users\Admin\SystemUser.exe\$77SystemUser.exe.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /query /TN $77SystemUser.exe.exe4⤵PID:72
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /Create /SC ONCE /TN "$77SystemUser.exe.exe" /TR "C:\Users\Admin\SystemUser.exe\$77SystemUser.exe.exe \"\$77SystemUser.exe.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:3340
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /query /TN $77SystemUser.exe.exe4⤵PID:4572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc hourly /mo 1 /tn "SystemUser.exe_Task-HOURLY-01" /tr "%MyFile%" /st 00:004⤵
- Scheduled Task/Job: Scheduled Task
PID:1688
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2288
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
160B
MD5ecacfab8559dd00a2bf716c467817ec6
SHA18da9d75dba41e43afe07a0ce9c8fb409931d5cc6
SHA256418bf4e2bcdc26e568107e9e1ad26331f0167ef85204f8ee24b6401e7fb9e2b2
SHA5123a170196173ca640abc10d0a003b7f8be522f00e9e543de4bc6bcccfd631f1f17b900abba59a853f03ad7eeac33dcdd54c1753db7e153d9a31992dc1fd84b22e
-
Filesize
42KB
MD5953679a46f8bada4aea3c89e2026176a
SHA1b78419d85a443d21fdd3bd6673c6c0b407f615da
SHA2564008b0c3754f16bdf1365b0f894e48c82ccf5f8a656592fab4db899e11b73051
SHA5124aabe38b1c404c4d61b08b4126bf509dc81cf50131db2c1061452cd795cc6c1f05055b03f8cadf99aa2b76f0f5c36fc3babe0cbb0a9d978a38fb71ca5f7ecd96