Malware Analysis Report

2025-03-15 01:14

Sample ID 250213-2ptq1sxlhs
Target Rat.exe
SHA256 166fc117f762f70928200d37c24352583e1aca1aba54429975ac828452cf5ff0
Tags
silverrat defense_evasion discovery execution persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

166fc117f762f70928200d37c24352583e1aca1aba54429975ac828452cf5ff0

Threat Level: Known bad

The file Rat.exe was found to be: Known bad.

Malicious Activity Summary

silverrat defense_evasion discovery execution persistence trojan

SilverRat

Silverrat family

Downloads MZ/PE file

Sets file to hidden

Executes dropped EXE

Checks computer location settings

Legitimate hosting services abused for malware hosting/C2

Adds Run key to start application

Command and Scripting Interpreter: PowerShell

Unsigned PE

System Location Discovery: System Language Discovery

Enumerates physical storage devices

System Network Configuration Discovery: Internet Connection Discovery

Uses Volume Shadow Copy service COM API

Suspicious use of AdjustPrivilegeToken

Delays execution with timeout.exe

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

Uses Task Scheduler COM API

Suspicious behavior: GetForegroundWindowSpam

Views/modifies file attributes

Suspicious use of WriteProcessMemory

Scheduled Task/Job: Scheduled Task

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-02-13 22:45

Signatures

Silverrat family

silverrat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-02-13 22:45

Reported

2025-02-13 23:03

Platform

win10v2004-20250207-en

Max time kernel

482s

Max time network

1050s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Rat.exe"

Signatures

SilverRat

trojan silverrat

Silverrat family

silverrat

Downloads MZ/PE file

Description Indicator Process Target
N/A N/A N/A N/A

Sets file to hidden

defense_evasion
Description Indicator Process Target
N/A N/A C:\Windows\System32\attrib.exe N/A
N/A N/A C:\Windows\System32\attrib.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\zt-WD\\$77Windows Security Process.exe\"" C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe N/A

System Network Configuration Discovery: Internet Connection Discovery

discovery
Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe N/A

Delays execution with timeout.exe

defense_evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\timeout.exe N/A

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4704 wrote to memory of 3404 N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe C:\Windows\System32\attrib.exe
PID 4704 wrote to memory of 3404 N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe C:\Windows\System32\attrib.exe
PID 4704 wrote to memory of 2324 N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe C:\Windows\System32\attrib.exe
PID 4704 wrote to memory of 2324 N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe C:\Windows\System32\attrib.exe
PID 4704 wrote to memory of 3152 N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe C:\Windows\system32\cmd.exe
PID 4704 wrote to memory of 3152 N/A C:\Users\Admin\AppData\Local\Temp\Rat.exe C:\Windows\system32\cmd.exe
PID 3152 wrote to memory of 3448 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 3152 wrote to memory of 3448 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 3152 wrote to memory of 4848 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe
PID 3152 wrote to memory of 4848 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe
PID 4848 wrote to memory of 4260 N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe C:\Windows\SYSTEM32\schtasks.exe
PID 4848 wrote to memory of 4260 N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe C:\Windows\SYSTEM32\schtasks.exe
PID 4848 wrote to memory of 4520 N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe C:\Windows\SYSTEM32\schtasks.exe
PID 4848 wrote to memory of 4520 N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe C:\Windows\SYSTEM32\schtasks.exe
PID 4848 wrote to memory of 2252 N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe C:\Windows\SYSTEM32\schtasks.exe
PID 4848 wrote to memory of 2252 N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe C:\Windows\SYSTEM32\schtasks.exe
PID 4848 wrote to memory of 2140 N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4848 wrote to memory of 2140 N/A C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

Uses Task Scheduler COM API

persistence

Uses Volume Shadow Copy service COM API

ransomware

Views/modifies file attributes

defense_evasion
Description Indicator Process Target
N/A N/A C:\Windows\System32\attrib.exe N/A
N/A N/A C:\Windows\System32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Rat.exe

"C:\Users\Admin\AppData\Local\Temp\Rat.exe"

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\System32\attrib.exe

"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\zt-WD"

C:\Windows\System32\attrib.exe

"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe"

C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe

"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI2IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5MjEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE5ODA3NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MDQ5NDI4OTEwIi8-PC9hcHA-PC9yZXF1ZXN0Pg

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp2EFA.tmp.bat""

C:\Windows\system32\timeout.exe

timeout 3

C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe

"C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe"

C:\Windows\SYSTEM32\schtasks.exe

"schtasks.exe" /query /TN $77Windows Security Process.exe

C:\Windows\SYSTEM32\schtasks.exe

"schtasks.exe" /Create /SC ONCE /TN "$77Windows Security Process.exe" /TR "C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe \"\$77Windows Security Process.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST

C:\Windows\SYSTEM32\schtasks.exe

"schtasks.exe" /query /TN $77Windows Security Process.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 150.171.28.10:443 g.bing.com tcp
GB 2.18.66.106:443 www.bing.com tcp
US 8.8.8.8:53 msedge.api.cdp.microsoft.com udp
US 52.252.28.242:443 msedge.api.cdp.microsoft.com tcp
US 8.8.8.8:53 msedge.b.tlu.dl.delivery.mp.microsoft.com udp
US 199.232.210.172:80 msedge.b.tlu.dl.delivery.mp.microsoft.com tcp
US 8.8.8.8:53 discord.com udp
US 162.159.128.233:443 discord.com tcp
US 8.8.8.8:53 buying-magic.gl.at.ply.gg udp
US 147.185.221.25:17699 buying-magic.gl.at.ply.gg tcp

Files

memory/4704-0-0x00007FF8AC0D3000-0x00007FF8AC0D5000-memory.dmp

memory/4704-1-0x00000000003C0000-0x00000000003D0000-memory.dmp

memory/4704-2-0x00007FF8AC0D0000-0x00007FF8ACB91000-memory.dmp

memory/4704-3-0x00007FF8AC0D3000-0x00007FF8AC0D5000-memory.dmp

memory/4704-4-0x00007FF8AC0D0000-0x00007FF8ACB91000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp2EFA.tmp.bat

MD5 6cbd836cefc9ca0be275ae1498f34a1f
SHA1 27cf036392475853132785f04db09a3f41ef3571
SHA256 e0f8dcdf6b63a3159c96c9295d5b796524c841def769c3ebb7103df50cd5ac6f
SHA512 687b8831b75ed7cc1c97a8a9201be46f0579053d9c3038dea6cb8a9e275828d5c801b5898d0064c34a40d2a316db82d26baa2c43818e6fb31df73d37f08abe4d

memory/4704-11-0x00007FF8AC0D0000-0x00007FF8ACB91000-memory.dmp

C:\Users\Admin\AppData\Roaming\zt-WD\$77Windows Security Process.exe

MD5 c41469be0e653ddb4552a3f1a16caba6
SHA1 d2e0c8d5bd49337b5cef1f325632ba6c356d5661
SHA256 166fc117f762f70928200d37c24352583e1aca1aba54429975ac828452cf5ff0
SHA512 0599b00efc97b7805679040903e9b5f7fdfa7c4e00e7b12fc0a79b89286dea6665efd87f817b9b9f8e2e165714df07e8dbe21b3121b0af3f6f3c87b10837c749

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5voyrfyx.3mt.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2140-24-0x000001C97B270000-0x000001C97B292000-memory.dmp