Analysis
-
max time kernel
131s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 13:31
Behavioral task
behavioral1
Sample
SilverClient.exe
Resource
win7-20240708-en
General
-
Target
SilverClient.exe
-
Size
41KB
-
MD5
3952e9916c90e897f360c6a30467d862
-
SHA1
860e5ce37398db429528ad2b5f96a3005c65f800
-
SHA256
2da1d2b5a84b7124e6a121545e2a113c6fd3176ff6d97e555c422f6cdc9b96db
-
SHA512
43525046bb5601991e18d59922790da01e378102f74bf970c07013f312a7309c146994117dcc35e000c3874dfacd4eefc6c68937800a41555279dafaae02d021
-
SSDEEP
768:ZpDZ3iKNWP3In15M8w+HR9m1xRUHE9wVdzmgotSB6S/uQ8QrnxUFU:ZpMQQF+xeGk9Ng7oouQ8QxUFU
Malware Config
Extracted
silverrat
1.0.0.0
japanese-cross.gl.at.ply.gg:5544
SilverMutex_jafRtepbDn
-
certificate
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
-
decrypted_key
-|S.S.S|-
-
discord
https://discord.com/api/webhooks/1321105847064989729/ZxyszSatMIHTaGAl4BDIJjfWgDi3NYjS9MKji0deomNAJsyovtZj3obV9ncoMRVjdmqc
-
key
yy6zDjAUmbB09pKvo5Hhug==
-
key_x509
ZEdBaGFTUkx2U3pvY0RSQ0J5dHNpUlVOVGNQbUF3
-
payload_url
https://g.top4top.io/p_2522c7w8u1.png
-
reconnect_delay
4
-
server_signature
YFe9bEQ8wbHo4adINlvWOheLnVlB1/9fyx2fEkOAr/TmMCZ6+XX2riX/hrN8ObiwroghpMOKwOoOX/KFwTO522esiQXYMskfoXnNKiN7rXWDJ8jigLBX444gXCL/J1y/fhyq5aI2hYy3yb9kjK2PiM9cFt6uI/nYRVr48d0KKq1+qPtq/wU9bnzuKeoRVLYwXUjRhPM6wJrQt0TP0W4BzsAaAVUBkjWTXnPg7t8zWct8sMxD52CpcOtm5UqImdRLoXd+b9OhJnwjEdEqGJ2cnM08YsINWClmFaUNkTe4aRYQXgTOPwBEe8XQuyx6Zuwv2ufTarY6okG/JLFe3POFBdN3DEFV+ye1if+XktEsH/dCYZJB6q6NErb9hlwSe16HiG321WetlE9LZfAsRVxrU1VhyOqEwR+lQHz98HdpQeBC4qdoO7ps9dKTwgO8Cl8JimRo2NN06HPI3hrB0/zwazsuZF+Ahen9u0rHHRVFkaDKshZ0R1pbx1ypcYrReemrhFbwkeoapc58L93j5fV08+uC4KXYs6O8RAAqFIIRNQgscT1PjhC6gMTWyknt4gOfNhQG51O1C6oRKtf0sTBt/bidlffLlaYIAqrn/YLDWekGM+IGqhGpg/y8SEfjeD5nYc+AzqFWwkpwg8OUb8iAy4g4IGEpAHy0HDfbA2Vp4TQ=
Signatures
-
Silverrat family
-
pid Process 2948 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 discord.com 5 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2824 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2948 powershell.exe 2272 SilverClient.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2272 SilverClient.exe Token: SeDebugPrivilege 2948 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2272 SilverClient.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2792 2272 SilverClient.exe 31 PID 2272 wrote to memory of 2792 2272 SilverClient.exe 31 PID 2272 wrote to memory of 2792 2272 SilverClient.exe 31 PID 2272 wrote to memory of 2824 2272 SilverClient.exe 33 PID 2272 wrote to memory of 2824 2272 SilverClient.exe 33 PID 2272 wrote to memory of 2824 2272 SilverClient.exe 33 PID 2272 wrote to memory of 2772 2272 SilverClient.exe 35 PID 2272 wrote to memory of 2772 2272 SilverClient.exe 35 PID 2272 wrote to memory of 2772 2272 SilverClient.exe 35 PID 2272 wrote to memory of 2948 2272 SilverClient.exe 37 PID 2272 wrote to memory of 2948 2272 SilverClient.exe 37 PID 2272 wrote to memory of 2948 2272 SilverClient.exe 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SilverClient.exe"C:\Users\Admin\AppData\Local\Temp\SilverClient.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\system32\schtasks.exe"schtasks.exe" /query /TN SilverClient.exe2⤵PID:2792
-
-
C:\Windows\system32\schtasks.exe"schtasks.exe" /Create /SC ONCE /TN "SilverClient.exe" /TR "C:\Users\Admin\AppData\Local\Temp\SilverClient.exe \"\SilverClient.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST2⤵
- Scheduled Task/Job: Scheduled Task
PID:2824
-
-
C:\Windows\system32\schtasks.exe"schtasks.exe" /query /TN SilverClient.exe2⤵PID:2772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2948
-