Resubmissions

14/03/2024, 22:37

240314-2js8asbc83 7

14/03/2024, 22:36

240314-2jbcgsbc68 3

14/03/2024, 22:34

240314-2g4agshc6v 7

14/03/2024, 22:29

240314-2ejs3abb53 3

14/03/2024, 22:22

240314-2aenjsba29 7

Analysis

  • max time kernel
    94s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240221-de
  • resource tags

    arch:x64arch:x86image:win7-20240221-delocale:de-deos:windows7-x64systemwindows
  • submitted
    14/03/2024, 22:29

General

  • Target

    sscserviceutilitiy_4.30.exe

  • Size

    967KB

  • MD5

    51fe74106def0860fa5c15f5711fe298

  • SHA1

    4df1243bf6ad0c3e0043eadfca7458c20721e1a8

  • SHA256

    5707312fd6972376c62ce4703e87c349ea40d527a64d58a5d2cbe060c19b558e

  • SHA512

    40527d0671162a690fdec49004c7127519ebb00a38f3baa778a1faf2a8d19c8b4a96ff539541f9da8db14d1d24e6fd3ef4fcec5aef36a93b4fde843ac2ae9538

  • SSDEEP

    12288:EVcSgU/RWy1jHJaKVvip+u7hK0f55R2MES/X5qX2uUFEVBxmh7KK/cUr8P5oQ:EVHZr1jJasaKKTwX2KfI/nQP5x

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sscserviceutilitiy_4.30.exe
    "C:\Users\Admin\AppData\Local\Temp\sscserviceutilitiy_4.30.exe"
    1⤵
      PID:1868
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef74e9758,0x7fef74e9768,0x7fef74e9778
        2⤵
          PID:2728
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1244,i,15607740792290758816,10114433850671305382,131072 /prefetch:2
          2⤵
            PID:2172
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1244,i,15607740792290758816,10114433850671305382,131072 /prefetch:8
            2⤵
              PID:2540
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1632 --field-trial-handle=1244,i,15607740792290758816,10114433850671305382,131072 /prefetch:8
              2⤵
                PID:2552
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2336 --field-trial-handle=1244,i,15607740792290758816,10114433850671305382,131072 /prefetch:1
                2⤵
                  PID:2452
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2344 --field-trial-handle=1244,i,15607740792290758816,10114433850671305382,131072 /prefetch:1
                  2⤵
                    PID:2196
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1476 --field-trial-handle=1244,i,15607740792290758816,10114433850671305382,131072 /prefetch:2
                    2⤵
                      PID:2084
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1264 --field-trial-handle=1244,i,15607740792290758816,10114433850671305382,131072 /prefetch:1
                      2⤵
                        PID:2248
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3852 --field-trial-handle=1244,i,15607740792290758816,10114433850671305382,131072 /prefetch:8
                        2⤵
                          PID:2760
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                        1⤵
                          PID:2568

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          4KB

                          MD5

                          1cf608b097e7fcc67108a3ec35636195

                          SHA1

                          0cae45f9dbf33394135e682ca269aef23a71729a

                          SHA256

                          fdf7870556ea8f70b46a3f083914ff6b89910f01fca3606da3dece9b3d822a3f

                          SHA512

                          da38965579c25ef31742d71a5bb1e7e75971c4cdf77bbd82c7b85c6abad0e9e321201bb580222b1be04c23dfeb5b4041c8d7b80f8e5a8f0b5959e539057c8f1a

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          4KB

                          MD5

                          db65ab26294b7f27c80ebe8b638d8704

                          SHA1

                          76d83db9d9405069752da9835f05bf25883cd455

                          SHA256

                          04268e10b03a90d0a241a52767e27bab4f1f32d8b1fd30eea3e210b0dd126237

                          SHA512

                          cf7773dc2046be9a9904a14177ee1e057e24d8657c7245f9588a05f5b75a98d2aebcea0a376c7f9c488d04dcbb3a10b78cee57882d6920af502a929ee196dbc1

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                          Filesize

                          16B

                          MD5

                          18e723571b00fb1694a3bad6c78e4054

                          SHA1

                          afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                          SHA256

                          8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                          SHA512

                          43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                        • memory/1868-0-0x0000000000400000-0x0000000000417000-memory.dmp

                          Filesize

                          92KB