Analysis
-
max time kernel
92s -
max time network
92s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-06-2024 05:30
Behavioral task
behavioral1
Sample
Silver Rat [Re Lab]/SilverRat.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Silver Rat [Re Lab]/SilverRat.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Silver Rat [Re Lab]/SilverRat.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
Silver Rat [Re Lab]/SilverRat.exe
Resource
win11-20240611-en
General
-
Target
Silver Rat [Re Lab]/SilverRat.exe
-
Size
25.2MB
-
MD5
d6527f7d5f5152c3f5fff6786e5c1606
-
SHA1
e8da82b4a3d2b6bee04236162e5e46e636310ec6
-
SHA256
79a4605d24d32f992d8e144202e980bb6b52bf8c9925b1498a1da59e50ac51f9
-
SHA512
2b4eb9e66028d263c52b3da42fa3df256cf49cd7a7ebdf7c75da6a2dedfd2c22cb5f2071345b7016cd742539c74a801cad70c612330be79802fa19f860ea2d5f
-
SSDEEP
786432:SZYRGnGvovVvAuuglekvAR4vzHcv6lHGH9KdDmvQuLGgJMKV+n9n1vgvVv2jlv1S:Ik79a
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral4/memory/1832-6-0x0000000007330000-0x000000000737E000-memory.dmp agile_net behavioral4/memory/1832-12-0x0000000008E30000-0x0000000008F7E000-memory.dmp agile_net -
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4564 1832 WerFault.exe SilverRat.exe 1596 1832 WerFault.exe SilverRat.exe 1376 1196 WerFault.exe SilverRat.exe 1236 1196 WerFault.exe SilverRat.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
SilverRat.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SilverRat.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SilverRat.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
SilverRat.exepid process 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe 1832 SilverRat.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
SilverRat.exeSilverRat.exeSilverRat.exedescription pid process Token: SeDebugPrivilege 1832 SilverRat.exe Token: SeDebugPrivilege 1196 SilverRat.exe Token: SeDebugPrivilege 3464 SilverRat.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Silver Rat [Re Lab]\SilverRat.exe"C:\Users\Admin\AppData\Local\Temp\Silver Rat [Re Lab]\SilverRat.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 12962⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 13162⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1832 -ip 18321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1832 -ip 18321⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\Silver Rat [Re Lab]\SilverRat.exe"C:\Users\Admin\AppData\Local\Temp\Silver Rat [Re Lab]\SilverRat.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 12882⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 12882⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1196 -ip 11961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1196 -ip 11961⤵
-
C:\Users\Admin\AppData\Local\Temp\Silver Rat [Re Lab]\SilverRat.exe"C:\Users\Admin\AppData\Local\Temp\Silver Rat [Re Lab]\SilverRat.exe"1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Tmp35A1.tmpFilesize
4KB
MD5e1a48ec781542ab4f0d3a3368b2a1d05
SHA1a35670f07e5320a1591a55d903b35dcdd1d224a1
SHA256f41d8818774f3ec0bf936e564f50008b46f5e4060edaab3bd72ffa389fb9ef21
SHA512d3e756d8b321d38962a7b36af617d152e9bfd499b31f1630a24ada435715ad81a29ab73e4ab4aa21bbc9029b4177a943303e7df922bf375c2583607cb6f6566a
-
memory/1196-14-0x0000000074670000-0x0000000074E21000-memory.dmpFilesize
7.7MB
-
memory/1196-16-0x0000000074670000-0x0000000074E21000-memory.dmpFilesize
7.7MB
-
memory/1196-15-0x0000000074670000-0x0000000074E21000-memory.dmpFilesize
7.7MB
-
memory/1832-8-0x0000000074670000-0x0000000074E21000-memory.dmpFilesize
7.7MB
-
memory/1832-11-0x0000000008920000-0x00000000089BC000-memory.dmpFilesize
624KB
-
memory/1832-6-0x0000000007330000-0x000000000737E000-memory.dmpFilesize
312KB
-
memory/1832-7-0x00000000078E0000-0x0000000007B32000-memory.dmpFilesize
2.3MB
-
memory/1832-0-0x000000007467E000-0x000000007467F000-memory.dmpFilesize
4KB
-
memory/1832-9-0x0000000007740000-0x000000000774A000-memory.dmpFilesize
40KB
-
memory/1832-10-0x0000000007890000-0x00000000078C2000-memory.dmpFilesize
200KB
-
memory/1832-5-0x0000000007480000-0x00000000075D0000-memory.dmpFilesize
1.3MB
-
memory/1832-12-0x0000000008E30000-0x0000000008F7E000-memory.dmpFilesize
1.3MB
-
memory/1832-13-0x0000000074670000-0x0000000074E21000-memory.dmpFilesize
7.7MB
-
memory/1832-4-0x0000000006990000-0x0000000006B06000-memory.dmpFilesize
1.5MB
-
memory/1832-3-0x0000000006670000-0x0000000006702000-memory.dmpFilesize
584KB
-
memory/1832-2-0x0000000006B80000-0x0000000007126000-memory.dmpFilesize
5.6MB
-
memory/1832-1-0x00000000001D0000-0x0000000001AFE000-memory.dmpFilesize
25.2MB