Analysis
-
max time kernel
99s -
max time network
145s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
13/03/2025, 18:30
Behavioral task
behavioral1
Sample
SilverClient.exe
Resource
win11-20250313-en
Behavioral task
behavioral2
Sample
SilverClient.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
SilverClient.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral4
Sample
SilverClient.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral5
Sample
SilverClient.exe
Resource
win11-20250217-en
General
-
Target
SilverClient.exe
-
Size
43KB
-
MD5
231b78ea676e1fac2dfa84a2faccb6f7
-
SHA1
eb4782d8598f33632d2444fb9df4d5a9bff8574f
-
SHA256
31f5206de0b4956ae322443d90e5413d3b99a5a0e289985d89589e687abfcc01
-
SHA512
f22bc8992796a414717b1ec187b1ee18b5cf15720f07f231c12d04d5485da96c25998a7adb249ef085abfaace7b48089916839101f056dc02968eb15a7d4239f
-
SSDEEP
768:Dbrc0SeW8cf/Ol6IoZmTPHhm7LavCJ8eEPWRULQD9PBVGiz1QB6SJ/lE:Dbrc0SeA4txJm9ZKWGsD9yu1Qou/lE
Malware Config
Extracted
silverrat
1.0.0.0
if-eventually.gl.at.ply.gg:17094
4536v43xbhf
-
certificate
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
-
decrypted_key
-|S.S.S|-
-
key
yy6zDjAUmbB09pKvo5Hhug==
-
key_x509
b0FGeVZNcFRMWVloVHR6Z0VESU5RdlpZUmxZbUFE
-
reconnect_delay
4
-
server_signature
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
Signatures
-
Silverrat family
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 668 attrib.exe 2488 attrib.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\International\Geo\Nation SilverClient.exe Key value queried \REGISTRY\USER\S-1-5-21-1639757381-2759246526-4253643256-1000\Control Panel\International\Geo\Nation $77System Runtime.exe -
Executes dropped EXE 1 IoCs
pid Process 5096 $77System Runtime.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\SysWOW64\\$77System Runtime.exe\"" SilverClient.exe -
pid Process 1088 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 884 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1436 schtasks.exe 2540 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 3168 SilverClient.exe 3168 SilverClient.exe 3168 SilverClient.exe 3168 SilverClient.exe 3168 SilverClient.exe 3168 SilverClient.exe 3168 SilverClient.exe 3168 SilverClient.exe 3168 SilverClient.exe 3168 SilverClient.exe 3168 SilverClient.exe 3168 SilverClient.exe 3168 SilverClient.exe 3168 SilverClient.exe 3168 SilverClient.exe 3168 SilverClient.exe 3168 SilverClient.exe 3168 SilverClient.exe 3168 SilverClient.exe 3168 SilverClient.exe 3168 SilverClient.exe 3168 SilverClient.exe 3168 SilverClient.exe 5096 $77System Runtime.exe 1088 powershell.exe 1088 powershell.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeBackupPrivilege 2032 vssvc.exe Token: SeRestorePrivilege 2032 vssvc.exe Token: SeAuditPrivilege 2032 vssvc.exe Token: SeDebugPrivilege 3168 SilverClient.exe Token: SeDebugPrivilege 5096 $77System Runtime.exe Token: SeDebugPrivilege 1088 powershell.exe Token: SeIncreaseQuotaPrivilege 1088 powershell.exe Token: SeSecurityPrivilege 1088 powershell.exe Token: SeTakeOwnershipPrivilege 1088 powershell.exe Token: SeLoadDriverPrivilege 1088 powershell.exe Token: SeSystemProfilePrivilege 1088 powershell.exe Token: SeSystemtimePrivilege 1088 powershell.exe Token: SeProfSingleProcessPrivilege 1088 powershell.exe Token: SeIncBasePriorityPrivilege 1088 powershell.exe Token: SeCreatePagefilePrivilege 1088 powershell.exe Token: SeBackupPrivilege 1088 powershell.exe Token: SeRestorePrivilege 1088 powershell.exe Token: SeShutdownPrivilege 1088 powershell.exe Token: SeDebugPrivilege 1088 powershell.exe Token: SeSystemEnvironmentPrivilege 1088 powershell.exe Token: SeRemoteShutdownPrivilege 1088 powershell.exe Token: SeUndockPrivilege 1088 powershell.exe Token: SeManageVolumePrivilege 1088 powershell.exe Token: 33 1088 powershell.exe Token: 34 1088 powershell.exe Token: 35 1088 powershell.exe Token: 36 1088 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5096 $77System Runtime.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3168 wrote to memory of 668 3168 SilverClient.exe 88 PID 3168 wrote to memory of 668 3168 SilverClient.exe 88 PID 3168 wrote to memory of 2488 3168 SilverClient.exe 90 PID 3168 wrote to memory of 2488 3168 SilverClient.exe 90 PID 3168 wrote to memory of 1496 3168 SilverClient.exe 98 PID 3168 wrote to memory of 1496 3168 SilverClient.exe 98 PID 1496 wrote to memory of 884 1496 cmd.exe 100 PID 1496 wrote to memory of 884 1496 cmd.exe 100 PID 1496 wrote to memory of 5096 1496 cmd.exe 101 PID 1496 wrote to memory of 5096 1496 cmd.exe 101 PID 5096 wrote to memory of 3840 5096 $77System Runtime.exe 103 PID 5096 wrote to memory of 3840 5096 $77System Runtime.exe 103 PID 5096 wrote to memory of 2540 5096 $77System Runtime.exe 105 PID 5096 wrote to memory of 2540 5096 $77System Runtime.exe 105 PID 5096 wrote to memory of 1672 5096 $77System Runtime.exe 107 PID 5096 wrote to memory of 1672 5096 $77System Runtime.exe 107 PID 5096 wrote to memory of 1088 5096 $77System Runtime.exe 109 PID 5096 wrote to memory of 1088 5096 $77System Runtime.exe 109 PID 5096 wrote to memory of 1436 5096 $77System Runtime.exe 110 PID 5096 wrote to memory of 1436 5096 $77System Runtime.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 668 attrib.exe 2488 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SilverClient.exe"C:\Users\Admin\AppData\Local\Temp\SilverClient.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysWOW64"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:668
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysWOW64\$77System Runtime.exe"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2488
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpE2FD.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:884
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysWOW64\$77System Runtime.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysWOW64\$77System Runtime.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /query /TN $77System Runtime.exe4⤵PID:3840
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /Create /SC ONCE /TN "$77System Runtime.exe" /TR "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysWOW64\$77System Runtime.exe \"\$77System Runtime.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2540
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /query /TN $77System Runtime.exe4⤵PID:1672
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc hourly /mo 1 /tn "System Runtime_Task-HOURLY-01" /tr "%MyFile%" /st 00:004⤵
- Scheduled Task/Job: Scheduled Task
PID:1436
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2032
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
198B
MD598e6be4269cdce264dfe689d11f6bb3e
SHA13765e7d14e3b69fbd8026fe6d52ff9577ae2da33
SHA25699e96e393ae5f9573cf21a3ac1cb674400943a95102f3cc452fc52045de8fde2
SHA51238c518c380e398285b30ab32ec14f489644de2fc5e879d645bbde194abd7af5a48201180ef3eead57f34cbf3035543f10c84b1f31683d3888a17d22330441d68
-
Filesize
43KB
MD5231b78ea676e1fac2dfa84a2faccb6f7
SHA1eb4782d8598f33632d2444fb9df4d5a9bff8574f
SHA25631f5206de0b4956ae322443d90e5413d3b99a5a0e289985d89589e687abfcc01
SHA512f22bc8992796a414717b1ec187b1ee18b5cf15720f07f231c12d04d5485da96c25998a7adb249ef085abfaace7b48089916839101f056dc02968eb15a7d4239f