Analysis

  • max time kernel
    122s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 20:34

General

  • Target

    Lossless.Scaling.v2.11/game/LosslessScaling.exe.xml

  • Size

    174B

  • MD5

    2a2df45a07478a1c77d5834c21f3d7fd

  • SHA1

    f949e331f0d75ba38d33a072f74e2327c870d916

  • SHA256

    051099983b896673909e01a1f631b6652abb88da95c9f06f3efef4be033091fa

  • SHA512

    1a6dd48f92ea6b68ee23b86ba297cd1559f795946ecda17ade68aea3dda188869bba380e3ea3472e08993f4ae574c528b34c3e25503ee6119fd4f998835e09d7

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Lossless.Scaling.v2.11\game\LosslessScaling.exe.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1472
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1472 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1343f616aad3d23496c046ba16f22ab7

    SHA1

    3ba785849a42ca3e724a21d57de8ce0565d7f455

    SHA256

    859e8cc4976df14fd87c5acf99f0d33748add605bf670cce43f3d987533302fa

    SHA512

    0a0daab1c0ff94f4b0fa173305461c53eb71beaac13c8d3d599711646a06014cf88a42016b2cfef08568fb8a47bd2f4ffb440d549a1d172bf7cb1dfbb170cd80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd8cae5bf7d9450e9f3a1e95a89393d7

    SHA1

    6bafaf9de9998ffc031a35386d5e6b4d00a671e2

    SHA256

    4c606341aa5f50433fa3dc47f8d23f61e47bb4c45c77a014d62017db8d22b17a

    SHA512

    8aaf62ed13ed4cc86be4aff312c00940051ef8dbf9a5bf9c98a651bd0f2b079244925e2652565b2400f1bde41d844781f80ab7849be34538a959ca8b491bd0d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9974f15cea5b30f60bc886ee1e56f942

    SHA1

    f256b6461089bc7494749257fa56b413ebb2fa0d

    SHA256

    7a45440f5cccac3b5b2d6512800e2f9da92b291550a0217634a0be8af4d330ba

    SHA512

    2fb3566cf8ece547009d0fc9bf63548c268afb7f3996d646a9cb4716ecd4af2f7ba3e9fea518c96c4257c1b2e17233f8931d3debd18f03cda14c71c1eb2ae40b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3d58116066d11ffc23ee6224252c80e5

    SHA1

    4f8b4635c189cfcd25424f28f1cf51ac7f8315fb

    SHA256

    83c61fd784f1585a466ea8c9167ce913cee789e4de30deb852f2e0224d2b4ad7

    SHA512

    24de707828056415519712ab5372397988cf68a5c85ee9d112a95d44caea4db37d1eae7728270d4f4cb6a12c4928b97c67a6807a40f075cdeeca6584ba488aa7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0eb3066662cfc72a11e3e443c4f896be

    SHA1

    48b25de8b9d6fa0906526599341934f4fa189dc5

    SHA256

    12839c7e5e44585b040108d1084433433e78ede8c581060b9f942485da7ec639

    SHA512

    d9d871ae99e9d4f37e56767def7c78c54b0ef562492e5f52076b20aef1fe512010cfc82b318b338f3d3d7af7ef17c095aa3e367f4a7729bb620bb84c21e101f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c23c0ccc334902f9a40fe638c97663e9

    SHA1

    f867cadbb8eb5b47b34f1ad518a1f947f29ecf85

    SHA256

    27b5f32672d256879708f098ec58ed44f74f9f2aa83058a80ce651c98e1b9f2a

    SHA512

    337c9a6070c33a8598925a9f4077c9c1dd2f684c7cb5a9a78565af974b0685f510d9f9f5406d5607cd38e2e8205f38ef7497cba81cd994e192c413eab58a1e76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    124d0770edc3ef738b8c0fcaee4a1c19

    SHA1

    3bff9c3ef354bbec03736dcceecd2989cfd44188

    SHA256

    cc6f6463f04319b61c4446e953d1132af55404c7728838265a5c8af0465ce0f0

    SHA512

    044b75b78167845db37603fa313f271242e87da0e6eefdadf2d4b197ecaee1c0a41e5fee528b34b687cee3b15c43e4d0e0f860cb15ad8fa86b0116a001af8a11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb51ab8f305c53788a266696f93da1d1

    SHA1

    f631c1577f2f3711bb5673a49fb31f1ab2bd9444

    SHA256

    3a449e91f46f7a0d05716eb98e4a9294df2526939bebcb9004ece487b9d1bc1c

    SHA512

    7508aa11e0928481260c2876b55fda0dc51086727ed65bf5c989f04ac36cdbd60565e6a70113fa404f275794d5e4a7f0dbfbeb9b452e4943bacf759093e06684

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e8425830bd871b80b9822c9fd2cb1f4

    SHA1

    f0033431d8d599b3ac55f82d132fda4686ede30a

    SHA256

    24e13df48fa51ff7932aaee7733f3436b4b56fa31868dc0fa6415062a0096fe8

    SHA512

    28d3b16c4ab374adc1c34fa3f679ce01425ec6860d8b3fd8d525e06623a438ca166932d8c8fdc8d0f123df122daf2c3d952dc2a93bef4c422f1d1e949ff108ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2fdff6bf7fd888e581f4db1829d3a635

    SHA1

    133d48d812bf6578eecd29785bcdc9900b616e94

    SHA256

    35a5338227fc1aa1677544619d75c486b4fb579e5033f6b1ea8b485152c064c2

    SHA512

    f2a564785b99664d9adf6dca3062ac702ca3a89be2484c8f4aed8c70ff83905280950ebb95d4b3708f097eda6ce45410cb4b39f22ebe7949dc7c44bb37570ca4

  • C:\Users\Admin\AppData\Local\Temp\Cab99F2.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAA2A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b