Resubmissions
14/03/2024, 22:37
240314-2js8asbc83 714/03/2024, 22:36
240314-2jbcgsbc68 314/03/2024, 22:34
240314-2g4agshc6v 714/03/2024, 22:29
240314-2ejs3abb53 314/03/2024, 22:22
240314-2aenjsba29 7Analysis
-
max time kernel
58s -
max time network
24s -
platform
windows7_x64 -
resource
win7-20240221-de -
resource tags
arch:x64arch:x86image:win7-20240221-delocale:de-deos:windows7-x64systemwindows -
submitted
14/03/2024, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
sscserviceutilitiy_4.30.zip
Resource
win7-20231129-de
Behavioral task
behavioral2
Sample
sscserviceutilitiy_4.30.zip
Resource
win10v2004-20240226-de
Behavioral task
behavioral3
Sample
sscserviceutilitiy_4.30.exe
Resource
win7-20240221-de
Behavioral task
behavioral4
Sample
sscserviceutilitiy_4.30.exe
Resource
win10v2004-20240226-de
General
-
Target
sscserviceutilitiy_4.30.exe
-
Size
967KB
-
MD5
51fe74106def0860fa5c15f5711fe298
-
SHA1
4df1243bf6ad0c3e0043eadfca7458c20721e1a8
-
SHA256
5707312fd6972376c62ce4703e87c349ea40d527a64d58a5d2cbe060c19b558e
-
SHA512
40527d0671162a690fdec49004c7127519ebb00a38f3baa778a1faf2a8d19c8b4a96ff539541f9da8db14d1d24e6fd3ef4fcec5aef36a93b4fde843ac2ae9538
-
SSDEEP
12288:EVcSgU/RWy1jHJaKVvip+u7hK0f55R2MES/X5qX2uUFEVBxmh7KK/cUr8P5oQ:EVHZr1jJasaKKTwX2KfI/nQP5x
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2700 INSF6CD.tmp 1332 ssc_serv.exe -
Loads dropped DLL 10 IoCs
pid Process 1732 sscserviceutilitiy_4.30.exe 2700 INSF6CD.tmp 2700 INSF6CD.tmp 2700 INSF6CD.tmp 2700 INSF6CD.tmp 2700 INSF6CD.tmp 2700 INSF6CD.tmp 1332 ssc_serv.exe 1332 ssc_serv.exe 1332 ssc_serv.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\SSC Service Utility\is-47SO3.tmp INSF6CD.tmp File created C:\Program Files (x86)\SSC Service Utility\is-0CRLM.tmp INSF6CD.tmp File opened for modification C:\Program Files (x86)\SSC Service Utility\unins000.dat INSF6CD.tmp File created C:\Program Files (x86)\SSC Service Utility\unins000.dat INSF6CD.tmp File created C:\Program Files (x86)\SSC Service Utility\is-DB8HS.tmp INSF6CD.tmp File created C:\Program Files (x86)\SSC Service Utility\is-1QBR1.tmp INSF6CD.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2700 1732 sscserviceutilitiy_4.30.exe 30 PID 1732 wrote to memory of 2700 1732 sscserviceutilitiy_4.30.exe 30 PID 1732 wrote to memory of 2700 1732 sscserviceutilitiy_4.30.exe 30 PID 1732 wrote to memory of 2700 1732 sscserviceutilitiy_4.30.exe 30 PID 1732 wrote to memory of 2700 1732 sscserviceutilitiy_4.30.exe 30 PID 1732 wrote to memory of 2700 1732 sscserviceutilitiy_4.30.exe 30 PID 1732 wrote to memory of 2700 1732 sscserviceutilitiy_4.30.exe 30 PID 2700 wrote to memory of 1332 2700 INSF6CD.tmp 32 PID 2700 wrote to memory of 1332 2700 INSF6CD.tmp 32 PID 2700 wrote to memory of 1332 2700 INSF6CD.tmp 32 PID 2700 wrote to memory of 1332 2700 INSF6CD.tmp 32 PID 2700 wrote to memory of 1332 2700 INSF6CD.tmp 32 PID 2700 wrote to memory of 1332 2700 INSF6CD.tmp 32 PID 2700 wrote to memory of 1332 2700 INSF6CD.tmp 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\sscserviceutilitiy_4.30.exe"C:\Users\Admin\AppData\Local\Temp\sscserviceutilitiy_4.30.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\INSF6CD.tmpC:\Users\Admin\AppData\Local\Temp\INSF6CD.tmp /SL3 $80130 C:\Users\Admin\AppData\Local\Temp\sscserviceutilitiy_4.30.exe 982896 986310 619522⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\SSC Service Utility\ssc_serv.exe"C:\Program Files (x86)\SSC Service Utility\ssc_serv.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1332
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD543fb6acee2a100446838ce1a20d23784
SHA155e04c321ccde68cc2481c90f156a3f80bfb0891
SHA256e2ff3513ea458bc163b5be6253310277a525673cb3566e9dc0a338e177a4059e
SHA5124ea748adeda2421e786c3a2f2fdba7c77fafb7947a0adf57fba687981ba4e6e7b1228821eed19b339afdef90f0cb5aa5707e439690738b4eaccbbf5c03636f1d
-
Filesize
146KB
MD58749ea8a0a1211e693fb8fd7cbf9799e
SHA166ef205dbd436ae367949686171973c883222936
SHA256a984c618099e242701f67c864a75caa91b13a77ca9ad5a3b29a3b23da69b4e91
SHA512fd2e98e1c63303847a095afd8cbd0ca068c02e0e45e016a97b4827f5d2257b6e91e4348b4b91c5cc22a2361c0268ff1710bc6e150e7aa03f0607f92daa68aec5
-
Filesize
650KB
MD55ac9d06768d112a1377f2e6161ad17b0
SHA14a302a62ba4c54d607ee84ccbef6634188eda528
SHA256a3661e20714e1446ec618d3d091507510eccf046f8205f89a943b1b76a8af7c4
SHA512a5b5766afbe7e014a65a6f55f1a0989a4a962ab080aed03cf2d0e4395ea38860d77b9392b5241906775e7b94723b4352d04d5ea3a71856f599680d9246037b65
-
Filesize
128KB
MD5b1c14bf259d1f8867a97cb3340076399
SHA1350f7c638e6cf81edfe3aee1ecf6a52f2ffd8d61
SHA256a5b40f2c99587ca92a3368d06b8e06f2c3ef3e1ddf1cecc614f04c3bc4ddc311
SHA51230fc4efd5292eb8d2291672b34c0a62ad0fbc44b96301d0af9409ea029cf7766fb562bb4b5cbddff471fa5df31f6210ba1d7fde964b03fa014ef566873a74cf7
-
Filesize
68KB
MD524e23acab47a7e33c1b95a60325b6fa0
SHA1ff3d109ca52241619679ebfb717d9c0ee1ac48bb
SHA2567d9a35460f7b9e1f33f6a5b799a3ae8f290991cd04548174dd5a49fcfa9e5f0e
SHA512c687c5269e17948bc391ec08abbba3f9a6f2924a7b4d8fe75cedef513d61e9f8ead1f169cbe98e4ef7f9001c1318130ba6d7a9431025ce4122ba50c6c32ee0e3
-
Filesize
377KB
MD5ec2a3559ef793d976d3f72252ade0b68
SHA11673ad41b3683d9fde4e331ef97711af05c4c014
SHA256995ca25e8ac883429e67e2985887c2dc122e4d3cca48d6ab5b545e6a896ae2e1
SHA512a9f77b1735eb88e3ed790a0bb00637a616c33414cbb6f0b582322759a3bea3bf2fd7a334f92c17dd9f1669acdacc7551611ecedb80c11e999ddd120f104355b1
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3