Analysis

  • max time kernel
    153s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-09-2023 17:37

General

  • Target

    Lossless.Scaling.v2.2.5/Lossless.Scaling.v2.2.5/it/LosslessScaling.resources.dll

  • Size

    16KB

  • MD5

    4b11bdde0d473186525ca78b28367ed4

  • SHA1

    f145b65aa94a436d02ca30b43409bea9c487839f

  • SHA256

    b49916b21b2a5db99ec3308ffa35acfb34f90a2a593aa6f1693b4d0d52ca5a07

  • SHA512

    115831256144ac1afc4db5e14ff2e3b6bcccd7731369168cc766533b9945325c8ddf78f27071913890a918a1c26fce6260507e4824af74655fff3331ae72007e

  • SSDEEP

    192:S7mFlHllkkHTF0u+bCMfPWfIb3Sl334VmsnHtiFAEHctRyymqwdekYr36:I8vV8WAzoRIk6cXnXUK

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Lossless.Scaling.v2.2.5\Lossless.Scaling.v2.2.5\it\LosslessScaling.resources.dll,#1
    1⤵
      PID:4712
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:4932
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3708

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3708-0-0x0000013CE2A40000-0x0000013CE2A50000-memory.dmp

        Filesize

        64KB

      • memory/3708-16-0x0000013CE2B40000-0x0000013CE2B50000-memory.dmp

        Filesize

        64KB

      • memory/3708-32-0x0000013CEC130000-0x0000013CEC131000-memory.dmp

        Filesize

        4KB

      • memory/3708-33-0x0000013CEC160000-0x0000013CEC161000-memory.dmp

        Filesize

        4KB

      • memory/3708-34-0x0000013CEC160000-0x0000013CEC161000-memory.dmp

        Filesize

        4KB

      • memory/3708-35-0x0000013CEC160000-0x0000013CEC161000-memory.dmp

        Filesize

        4KB

      • memory/3708-36-0x0000013CEC160000-0x0000013CEC161000-memory.dmp

        Filesize

        4KB

      • memory/3708-37-0x0000013CEC160000-0x0000013CEC161000-memory.dmp

        Filesize

        4KB

      • memory/3708-38-0x0000013CEC160000-0x0000013CEC161000-memory.dmp

        Filesize

        4KB

      • memory/3708-39-0x0000013CEC160000-0x0000013CEC161000-memory.dmp

        Filesize

        4KB

      • memory/3708-40-0x0000013CEC160000-0x0000013CEC161000-memory.dmp

        Filesize

        4KB

      • memory/3708-41-0x0000013CEC160000-0x0000013CEC161000-memory.dmp

        Filesize

        4KB

      • memory/3708-42-0x0000013CEC160000-0x0000013CEC161000-memory.dmp

        Filesize

        4KB

      • memory/3708-43-0x0000013CEAD80000-0x0000013CEAD81000-memory.dmp

        Filesize

        4KB

      • memory/3708-44-0x0000013CEAD70000-0x0000013CEAD71000-memory.dmp

        Filesize

        4KB

      • memory/3708-46-0x0000013CEAD80000-0x0000013CEAD81000-memory.dmp

        Filesize

        4KB

      • memory/3708-49-0x0000013CEAD70000-0x0000013CEAD71000-memory.dmp

        Filesize

        4KB

      • memory/3708-52-0x0000013CEACB0000-0x0000013CEACB1000-memory.dmp

        Filesize

        4KB

      • memory/3708-64-0x0000013CEAEB0000-0x0000013CEAEB1000-memory.dmp

        Filesize

        4KB

      • memory/3708-66-0x0000013CEAEC0000-0x0000013CEAEC1000-memory.dmp

        Filesize

        4KB

      • memory/3708-67-0x0000013CEAEC0000-0x0000013CEAEC1000-memory.dmp

        Filesize

        4KB

      • memory/3708-68-0x0000013CEAFD0000-0x0000013CEAFD1000-memory.dmp

        Filesize

        4KB