Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
24-12-2024 13:28
General
-
Target
SilverClient.exe
-
Size
41KB
-
MD5
3952e9916c90e897f360c6a30467d862
-
SHA1
860e5ce37398db429528ad2b5f96a3005c65f800
-
SHA256
2da1d2b5a84b7124e6a121545e2a113c6fd3176ff6d97e555c422f6cdc9b96db
-
SHA512
43525046bb5601991e18d59922790da01e378102f74bf970c07013f312a7309c146994117dcc35e000c3874dfacd4eefc6c68937800a41555279dafaae02d021
-
SSDEEP
768:ZpDZ3iKNWP3In15M8w+HR9m1xRUHE9wVdzmgotSB6S/uQ8QrnxUFU:ZpMQQF+xeGk9Ng7oouQ8QxUFU
Malware Config
Extracted
silverrat
1.0.0.0
japanese-cross.gl.at.ply.gg:5544
SilverMutex_jafRtepbDn
-
certificate
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
-
decrypted_key
-|S.S.S|-
-
discord
https://discord.com/api/webhooks/1321105847064989729/ZxyszSatMIHTaGAl4BDIJjfWgDi3NYjS9MKji0deomNAJsyovtZj3obV9ncoMRVjdmqc
-
key
yy6zDjAUmbB09pKvo5Hhug==
-
key_x509
ZEdBaGFTUkx2U3pvY0RSQ0J5dHNpUlVOVGNQbUF3
-
payload_url
https://g.top4top.io/p_2522c7w8u1.png
-
reconnect_delay
4
-
server_signature
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
Signatures
-
Silverrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3829776853-2076861744-2973657197-1000\Control Panel\International\Geo\Nation SilverClient.exe -
pid Process 232 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 discord.com 5 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 728 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 232 powershell.exe 232 powershell.exe 4460 SilverClient.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 4460 SilverClient.exe Token: SeDebugPrivilege 232 powershell.exe Token: SeIncreaseQuotaPrivilege 232 powershell.exe Token: SeSecurityPrivilege 232 powershell.exe Token: SeTakeOwnershipPrivilege 232 powershell.exe Token: SeLoadDriverPrivilege 232 powershell.exe Token: SeSystemProfilePrivilege 232 powershell.exe Token: SeSystemtimePrivilege 232 powershell.exe Token: SeProfSingleProcessPrivilege 232 powershell.exe Token: SeIncBasePriorityPrivilege 232 powershell.exe Token: SeCreatePagefilePrivilege 232 powershell.exe Token: SeBackupPrivilege 232 powershell.exe Token: SeRestorePrivilege 232 powershell.exe Token: SeShutdownPrivilege 232 powershell.exe Token: SeDebugPrivilege 232 powershell.exe Token: SeSystemEnvironmentPrivilege 232 powershell.exe Token: SeRemoteShutdownPrivilege 232 powershell.exe Token: SeUndockPrivilege 232 powershell.exe Token: SeManageVolumePrivilege 232 powershell.exe Token: 33 232 powershell.exe Token: 34 232 powershell.exe Token: 35 232 powershell.exe Token: 36 232 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4460 SilverClient.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4460 wrote to memory of 384 4460 SilverClient.exe 83 PID 4460 wrote to memory of 384 4460 SilverClient.exe 83 PID 4460 wrote to memory of 728 4460 SilverClient.exe 85 PID 4460 wrote to memory of 728 4460 SilverClient.exe 85 PID 4460 wrote to memory of 4268 4460 SilverClient.exe 87 PID 4460 wrote to memory of 4268 4460 SilverClient.exe 87 PID 4460 wrote to memory of 232 4460 SilverClient.exe 89 PID 4460 wrote to memory of 232 4460 SilverClient.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SilverClient.exe"C:\Users\Admin\AppData\Local\Temp\SilverClient.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /query /TN SilverClient.exe2⤵PID:384
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /Create /SC ONCE /TN "SilverClient.exe" /TR "C:\Users\Admin\AppData\Local\Temp\SilverClient.exe \"\SilverClient.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST2⤵
- Scheduled Task/Job: Scheduled Task
PID:728
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /query /TN SilverClient.exe2⤵PID:4268
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82