Analysis

  • max time kernel
    141s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-08-2024 13:31

General

  • Target

    game/LosslessScaling.exe

  • Size

    964KB

  • MD5

    9cfb9984a53f41ebdf00f8f0633fde26

  • SHA1

    a13985c15c6402d25c9e9c64f4e9947fd685635f

  • SHA256

    4b07ba9c32b61773cfb0e2d7b13689c26a13a6dc463b9294aeb1d5e8e4159e8d

  • SHA512

    2a768a77151353e693fb15abc4f72842c002043dece1920e8bddef04c2d620c7345650d369ccab463a72a55939ad7b3bf8fc8e9c3a6f55d8e7ab76ad331b5eea

  • SSDEEP

    12288:pDooEuEDS4MCLSyf6mOuGyW38yHJc+CKtOaO5Z7WhaGwnzE4ZbuRCwmhI2J+0sD+:1oP3tMCLPf1Oi32OvzTo4ZiRlT/MLz

Score
1/10

Malware Config

Signatures

  • Modifies Control Panel 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\game\LosslessScaling.exe
    "C:\Users\Admin\AppData\Local\Temp\game\LosslessScaling.exe"
    1⤵
    • Modifies Control Panel
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:544

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Lossless Scaling\Settings.xml

    Filesize

    2KB

    MD5

    ace795bd58a45d23bac1c6e60ec23df3

    SHA1

    88a78c643a5b10fc175886cc9cb12f45ef501492

    SHA256

    c34328175332f4cab70206ba70faf4dbc483d6b0d38f7f6af7d6dba3da9242b0

    SHA512

    11cde86b8ada81857036ebbd22cf6025a90f12d6048033fa43ffbb8fb30d0f6892a853c6521ee3719f031ba9b3906e374b86cd40568c536d1c2bf60027ef4985

  • memory/544-8-0x00007FFD52F70000-0x00007FFD53A31000-memory.dmp

    Filesize

    10.8MB

  • memory/544-6-0x000001C23EB30000-0x000001C23EB3A000-memory.dmp

    Filesize

    40KB

  • memory/544-10-0x000001C2428A0000-0x000001C242952000-memory.dmp

    Filesize

    712KB

  • memory/544-3-0x00007FFD52F70000-0x00007FFD53A31000-memory.dmp

    Filesize

    10.8MB

  • memory/544-11-0x000001C242A10000-0x000001C242ACA000-memory.dmp

    Filesize

    744KB

  • memory/544-5-0x000001C23EB00000-0x000001C23EB08000-memory.dmp

    Filesize

    32KB

  • memory/544-7-0x00007FFD52F70000-0x00007FFD53A31000-memory.dmp

    Filesize

    10.8MB

  • memory/544-12-0x000001C242950000-0x000001C242988000-memory.dmp

    Filesize

    224KB

  • memory/544-4-0x000001C240280000-0x000001C2402A6000-memory.dmp

    Filesize

    152KB

  • memory/544-2-0x000001C226110000-0x000001C2261F6000-memory.dmp

    Filesize

    920KB

  • memory/544-0-0x00007FFD52F73000-0x00007FFD52F75000-memory.dmp

    Filesize

    8KB

  • memory/544-13-0x000001C2431C0000-0x000001C2431C8000-memory.dmp

    Filesize

    32KB

  • memory/544-14-0x00007FFD52F70000-0x00007FFD53A31000-memory.dmp

    Filesize

    10.8MB

  • memory/544-16-0x000001C2430E0000-0x000001C2430EE000-memory.dmp

    Filesize

    56KB

  • memory/544-1-0x000001C2243E0000-0x000001C2244D6000-memory.dmp

    Filesize

    984KB

  • memory/544-32-0x00007FFD52F73000-0x00007FFD52F75000-memory.dmp

    Filesize

    8KB

  • memory/544-33-0x00007FFD52F70000-0x00007FFD53A31000-memory.dmp

    Filesize

    10.8MB