Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
21/03/2025, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
b27e2b819bc3acacc888e9e2c9481a14.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral2
Sample
b27e2b819bc3acacc888e9e2c9481a14.exe
Resource
win10ltsc2021-20250314-en
General
-
Target
b27e2b819bc3acacc888e9e2c9481a14.exe
-
Size
227KB
-
MD5
3ebfd2e63dbdb727badcaee9f86c52bb
-
SHA1
006c520203e7610d9fed7874c803286c3b81402f
-
SHA256
b0c60f1512bb002f4f782c9fda6c42dded1e5f04c467d1b526205a96d602fb9f
-
SHA512
483eb63069156a2c5eb004a9602c9a7aa4d99ba714e5f7a7787d8af401ee5bbc5a30deb90196953a61fd61cb50584f8f9b590a9c91364bba6688248c30ca013f
-
SSDEEP
3072:Emooj7nGTEA3uUq4uEHBAnpK37nX78c0BgHQ7Unpr74tyJhd6KtAn6m7TcSs2oWh:tHGvb8RUp1v+P7ts2oWP
Malware Config
Extracted
silverrat
1.0.0.0
hai1723.duckdns.org:7560
SilverMutex_NACcsErPbz
-
certificate
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
-
decrypted_key
-|S.S.S|-
-
key
yy6zDjAUmbB09pKvo5Hhug==
-
key_x509
T293bGdva2RNV1NSTkplemxKVmdNRERIZnBSdW55
-
payload_url
https://g.top4top.io/p_2522c7w8u1.png
-
reconnect_delay
1
-
server_signature
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
Signatures
-
Silverrat family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3852 powershell.exe 3440 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Control Panel\International\Geo\Nation b27e2b819bc3acacc888e9e2c9481a14.exe -
Executes dropped EXE 1 IoCs
pid Process 3672 T_T.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3852 powershell.exe 3852 powershell.exe 3440 powershell.exe 3440 powershell.exe 3672 T_T.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 1656 b27e2b819bc3acacc888e9e2c9481a14.exe Token: SeDebugPrivilege 3852 powershell.exe Token: SeIncreaseQuotaPrivilege 3852 powershell.exe Token: SeSecurityPrivilege 3852 powershell.exe Token: SeTakeOwnershipPrivilege 3852 powershell.exe Token: SeLoadDriverPrivilege 3852 powershell.exe Token: SeSystemProfilePrivilege 3852 powershell.exe Token: SeSystemtimePrivilege 3852 powershell.exe Token: SeProfSingleProcessPrivilege 3852 powershell.exe Token: SeIncBasePriorityPrivilege 3852 powershell.exe Token: SeCreatePagefilePrivilege 3852 powershell.exe Token: SeBackupPrivilege 3852 powershell.exe Token: SeRestorePrivilege 3852 powershell.exe Token: SeShutdownPrivilege 3852 powershell.exe Token: SeDebugPrivilege 3852 powershell.exe Token: SeSystemEnvironmentPrivilege 3852 powershell.exe Token: SeRemoteShutdownPrivilege 3852 powershell.exe Token: SeUndockPrivilege 3852 powershell.exe Token: SeManageVolumePrivilege 3852 powershell.exe Token: 33 3852 powershell.exe Token: 34 3852 powershell.exe Token: 35 3852 powershell.exe Token: 36 3852 powershell.exe Token: SeDebugPrivilege 3440 powershell.exe Token: SeIncreaseQuotaPrivilege 3440 powershell.exe Token: SeSecurityPrivilege 3440 powershell.exe Token: SeTakeOwnershipPrivilege 3440 powershell.exe Token: SeLoadDriverPrivilege 3440 powershell.exe Token: SeSystemProfilePrivilege 3440 powershell.exe Token: SeSystemtimePrivilege 3440 powershell.exe Token: SeProfSingleProcessPrivilege 3440 powershell.exe Token: SeIncBasePriorityPrivilege 3440 powershell.exe Token: SeCreatePagefilePrivilege 3440 powershell.exe Token: SeBackupPrivilege 3440 powershell.exe Token: SeRestorePrivilege 3440 powershell.exe Token: SeShutdownPrivilege 3440 powershell.exe Token: SeDebugPrivilege 3440 powershell.exe Token: SeSystemEnvironmentPrivilege 3440 powershell.exe Token: SeRemoteShutdownPrivilege 3440 powershell.exe Token: SeUndockPrivilege 3440 powershell.exe Token: SeManageVolumePrivilege 3440 powershell.exe Token: 33 3440 powershell.exe Token: 34 3440 powershell.exe Token: 35 3440 powershell.exe Token: 36 3440 powershell.exe Token: SeDebugPrivilege 3672 T_T.exe Token: SeDebugPrivilege 3672 T_T.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3672 T_T.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 3852 1656 b27e2b819bc3acacc888e9e2c9481a14.exe 80 PID 1656 wrote to memory of 3852 1656 b27e2b819bc3acacc888e9e2c9481a14.exe 80 PID 1656 wrote to memory of 3440 1656 b27e2b819bc3acacc888e9e2c9481a14.exe 83 PID 1656 wrote to memory of 3440 1656 b27e2b819bc3acacc888e9e2c9481a14.exe 83 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b27e2b819bc3acacc888e9e2c9481a14.exe"C:\Users\Admin\AppData\Local\Temp\b27e2b819bc3acacc888e9e2c9481a14.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\T_T.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'T_T.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3440
-
-
C:\ProgramData\T_T.exe"C:\ProgramData\T_T.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD53ebfd2e63dbdb727badcaee9f86c52bb
SHA1006c520203e7610d9fed7874c803286c3b81402f
SHA256b0c60f1512bb002f4f782c9fda6c42dded1e5f04c467d1b526205a96d602fb9f
SHA512483eb63069156a2c5eb004a9602c9a7aa4d99ba714e5f7a7787d8af401ee5bbc5a30deb90196953a61fd61cb50584f8f9b590a9c91364bba6688248c30ca013f
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD5ba227fb4a2fd8e36c379ba7bb8c1afce
SHA1a710819437c7db76a1d3c030d4810b98de402868
SHA256a68b2fe14e35a971543313d274fe675717d5de8e8daa4b13a33645f111d616d8
SHA512f842add808dc3bc08df752929536889cc1ce2227a9ff837d24f329fbfa8a1ae8679c4f9ffdb4dfa8c83bcfeb959f995a5e3dcccdf50d9ac3e6c1bf9dda22034d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82