Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2025, 11:45
Behavioral task
behavioral1
Sample
Unrip Soft.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Unrip Soft.exe
Resource
win10v2004-20250217-en
General
-
Target
Unrip Soft.exe
-
Size
43KB
-
MD5
6a988e8a2a732be5cc1035faa34c9c35
-
SHA1
eb17e390a33a14f0f1baa9c9cf0207c36ae1c879
-
SHA256
c6d5b9c5182ddaf0bd94891685737f05c98aa24450ca6f04510d895ab79d793b
-
SHA512
749dbbd429658bc5ff91d93fd0de2dfad0162cd2b7b287c845b71dec4369d8238b68a17aaf353e81ce2e1f5c3522a9386f2cd827c8b43ce7a276badb2eed05fb
-
SSDEEP
768:kWyceSek8A//Ol6IoZmMPHhm7ravCJ8eEPURULQD9PuGrz1QB6SR/lE:kWyceSeKYtqJmdZKUGsD9f/1Qoe/lE
Malware Config
Extracted
silverrat
1.0.0.0
american-designed.gl.at.ply.gg:50767
lAxDBRhAFu
-
certificate
MIIE4DCCAsigAwIBAgIQAKQYOfZd86J2BfNjhG4CWTANBgkqhkiG9w0BAQ0FADARMQ8wDQYDVQQDDAZTaWx2ZXIwIBcNMjIwODI2MTkwMTA4WhgPOTk5OTEyMzEyMzU5NTlaMBExDzANBgNVBAMMBlNpbHZlcjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAPbpOWfhZTuOfEaqqImTTe5dNHAAry7/mf00DCoI4lPZfypsc1tYraxSPFeayGu09a3qdhkWKSVIgwnu2n4GLQNOCY9fh/1oyrX4Iir3BIkYeU7pKTWgjhUlAmFAUAaNr0ca23Ku2kN79jrDzRznOgE2DEW4p7OiM4Mb097ma9lzu7MyssHbY4VCteAhj9HZiplqBxaC1vXDmzxqG+gUZ1aLcyG7ssdkOjtWVBgT3gD/gOl7KchRzCFB1egDC/vD9WZCG35U3Ngi+IkTznoXR1R06cq4v0UnGjE37R2vcB21qb0ZYNiZJXZHv5i9+R7xoPeNoLda5PqnfGGbhPvNEdD56mdcOKlzGIuyemLkUo8texdpiBWKbtc3JZf5VsKxjJtHDK3xW6gDGI+PAirzGkFPmwcf8WgsblvzLg8OZpVxVs8rmKWoi6qIrf4CXnyl73J4lgzW+ir7PjANAQXwLNGdNnvdMeLeo/muGQPdeNpr6OczGGnkWA4qniHeL51/Gx0a8A+jP9zKiyu+qHcsP2IotgWDH/KlzJVr7IAum+DV92uV8poTDcUNcHaKvhHA65KmEtsvLbK6lFZcAMC0eWC0VgpW44T1/16rOaaky5mP6rTMc3nSyOl/lU/XgAgGGQPe22bRLWYzd3WVeEpI1WnHYXS+tL9IOe4kJP+pYsWDAgMBAAGjMjAwMB0GA1UdDgQWBBR32TJj2LeUx9L+RcSOvmFV6VJq6TAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4ICAQA+qucSOi7ov7Q1FmAjMf925KuvKuCNwJiu3Sqo3FDGVAD1fAwAi2FdyuXEO2VIUPZCkalFcBna5rqyrc6tcS4T0IL2TsYLrsuGir7PWP7CAcft1urYS1HpNpHxeH/nixwnQaQs/MuRmdm2TeCj6G21P5BTW55U5y9sMPSYwhbD2N7XLgnSQd5Y+80TR7FUiye/k3D37fI9PRhSQGbfYFRQQTmxj84dPTnY5CVgaY9d8fNiFZkyjaZdf+mibK0xQTf+xLVVj+toDNCkc1F462TdmFhCrHd4PoMo0yLDNv4SC6NLRq4haWDRtORw6gd5GYIoCQ3m3oQvNlNxXhhIjsOyxkxOrkCD0c+57PIc7EmKXieJa/XxnkcIVxO8dvTY/vijuz/VaZYl/lPu9ckuqgJ1wRvvsHl70Trv4Mn4X5uCIqRFFlK/mSOZbLIguGkDN3QIZABvej89vlZMhrVfZOG2oawe23FskHjv7thF/WzOXtWw6RUVC1V+hCwbuxFNUjZmmOTUwdXHnus7I2AuiG6Jz1+y9aYiXBcVTdSljxjHRRmiRaAnY94h58vN8NJ4hKL2GVCo6LxkpuplmcntJN0cKraKTPxSXcCRrqWxX9qoIbfvBcUU4vH1jPJCCLNCuDyD3lgQkpPVvq0EMU1a2HFGgMEQMjpYpb38rcadDhT5ag==
-
decrypted_key
-|S.S.S|-
-
key
yy6zDjAUmbB09pKvo5Hhug==
-
key_x509
b0FGeVZNcFRMWVloVHR6Z0VESU5RdlpZUmxZbUFE
-
reconnect_delay
1
-
server_signature
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
Signatures
-
Silverrat family
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3252 attrib.exe 1088 attrib.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation Unrip Soft.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation $77svshost.exe.exe -
Executes dropped EXE 1 IoCs
pid Process 444 $77svshost.exe.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Users\\Admin\\sysreqses\\$77svshost.exe.exe\"" Unrip Soft.exe -
pid Process 1932 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 2 IoCs
pid Process 924 timeout.exe 2488 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5092 schtasks.exe 4300 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 2556 Unrip Soft.exe 444 $77svshost.exe.exe 444 $77svshost.exe.exe 1932 powershell.exe 1932 powershell.exe 1932 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 2356 vssvc.exe Token: SeRestorePrivilege 2356 vssvc.exe Token: SeAuditPrivilege 2356 vssvc.exe Token: SeDebugPrivilege 2556 Unrip Soft.exe Token: SeDebugPrivilege 444 $77svshost.exe.exe Token: SeDebugPrivilege 1932 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 444 $77svshost.exe.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2556 wrote to memory of 1088 2556 Unrip Soft.exe 91 PID 2556 wrote to memory of 1088 2556 Unrip Soft.exe 91 PID 2556 wrote to memory of 3252 2556 Unrip Soft.exe 93 PID 2556 wrote to memory of 3252 2556 Unrip Soft.exe 93 PID 2556 wrote to memory of 2220 2556 Unrip Soft.exe 106 PID 2556 wrote to memory of 2220 2556 Unrip Soft.exe 106 PID 2220 wrote to memory of 2488 2220 cmd.exe 108 PID 2220 wrote to memory of 2488 2220 cmd.exe 108 PID 2220 wrote to memory of 444 2220 cmd.exe 109 PID 2220 wrote to memory of 444 2220 cmd.exe 109 PID 444 wrote to memory of 4296 444 $77svshost.exe.exe 111 PID 444 wrote to memory of 4296 444 $77svshost.exe.exe 111 PID 444 wrote to memory of 5092 444 $77svshost.exe.exe 113 PID 444 wrote to memory of 5092 444 $77svshost.exe.exe 113 PID 444 wrote to memory of 276 444 $77svshost.exe.exe 115 PID 444 wrote to memory of 276 444 $77svshost.exe.exe 115 PID 444 wrote to memory of 1932 444 $77svshost.exe.exe 117 PID 444 wrote to memory of 1932 444 $77svshost.exe.exe 117 PID 444 wrote to memory of 4300 444 $77svshost.exe.exe 119 PID 444 wrote to memory of 4300 444 $77svshost.exe.exe 119 PID 444 wrote to memory of 852 444 $77svshost.exe.exe 133 PID 444 wrote to memory of 852 444 $77svshost.exe.exe 133 PID 444 wrote to memory of 3616 444 $77svshost.exe.exe 135 PID 444 wrote to memory of 3616 444 $77svshost.exe.exe 135 PID 3616 wrote to memory of 924 3616 cmd.exe 137 PID 3616 wrote to memory of 924 3616 cmd.exe 137 PID 852 wrote to memory of 4520 852 cmd.exe 138 PID 852 wrote to memory of 4520 852 cmd.exe 138 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1088 attrib.exe 3252 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Unrip Soft.exe"C:\Users\Admin\AppData\Local\Temp\Unrip Soft.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\sysreqses"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1088
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\sysreqses\$77svshost.exe.exe"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3252
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpE34B.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2488
-
-
C:\Users\Admin\sysreqses\$77svshost.exe.exe"C:\Users\Admin\sysreqses\$77svshost.exe.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /query /TN $77svshost.exe.exe4⤵PID:4296
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /Create /SC ONCE /TN "$77svshost.exe.exe" /TR "C:\Users\Admin\sysreqses\$77svshost.exe.exe \"\$77svshost.exe.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:5092
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /query /TN $77svshost.exe.exe4⤵PID:276
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc hourly /mo 1 /tn "svshost.exe_Task-HOURLY-01" /tr "%MyFile%" /st 00:004⤵
- Scheduled Task/Job: Scheduled Task
PID:4300
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "$77svshost.exe_Task"4⤵
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "$77svshost.exe_Task"5⤵PID:4520
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpD2EB.tmp.bat""4⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\system32\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:924
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2356
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
230B
MD5b3fb5557f01ccf4b3026ad873a10aefd
SHA12a410439eff0eedf51c3f69e2a5686d0d19f264f
SHA256f4d0c88755a2459fdae26db62d0b0b4fa157811242db938cc1398711cab1abaa
SHA512f5e5963d1cb5a54e62d2fb54ee9c3fa4ba12b70848e801090339943e2d3a13b0384561beda53712397d08dfe2e1605ddac26e2669cc39e3cd7080d4e98ac9af2
-
Filesize
152B
MD58462e6edfc3bc54281010fb1bca1f13f
SHA135623be8a1b62a53bc0a920325cb8fd5aadafa62
SHA2569da7805fca95b464381d88e192a3aeb5e308b46d87ba0c6c17857f2c5e047467
SHA5123d2138068bca5aff7b3a937f51f5b2b9c8582e26d65c74ecc0688527aff5dc223859c9250dc36fce05b4fbbfe92582308d7e6d289f9bcc21cd94f4ab527e55bd
-
Filesize
43KB
MD56a988e8a2a732be5cc1035faa34c9c35
SHA1eb17e390a33a14f0f1baa9c9cf0207c36ae1c879
SHA256c6d5b9c5182ddaf0bd94891685737f05c98aa24450ca6f04510d895ab79d793b
SHA512749dbbd429658bc5ff91d93fd0de2dfad0162cd2b7b287c845b71dec4369d8238b68a17aaf353e81ce2e1f5c3522a9386f2cd827c8b43ce7a276badb2eed05fb