Analysis

  • max time kernel
    92s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/09/2024, 02:42

General

  • Target

    Lossless Scaling/LosslessScaling.exe

  • Size

    964KB

  • MD5

    9cfb9984a53f41ebdf00f8f0633fde26

  • SHA1

    a13985c15c6402d25c9e9c64f4e9947fd685635f

  • SHA256

    4b07ba9c32b61773cfb0e2d7b13689c26a13a6dc463b9294aeb1d5e8e4159e8d

  • SHA512

    2a768a77151353e693fb15abc4f72842c002043dece1920e8bddef04c2d620c7345650d369ccab463a72a55939ad7b3bf8fc8e9c3a6f55d8e7ab76ad331b5eea

  • SSDEEP

    12288:pDooEuEDS4MCLSyf6mOuGyW38yHJc+CKtOaO5Z7WhaGwnzE4ZbuRCwmhI2J+0sD+:1oP3tMCLPf1Oi32OvzTo4ZiRlT/MLz

Score
1/10

Malware Config

Signatures

  • Modifies Control Panel 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Lossless Scaling\LosslessScaling.exe
    "C:\Users\Admin\AppData\Local\Temp\Lossless Scaling\LosslessScaling.exe"
    1⤵
    • Modifies Control Panel
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2436

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Lossless Scaling\Settings.xml

          Filesize

          2KB

          MD5

          ace795bd58a45d23bac1c6e60ec23df3

          SHA1

          88a78c643a5b10fc175886cc9cb12f45ef501492

          SHA256

          c34328175332f4cab70206ba70faf4dbc483d6b0d38f7f6af7d6dba3da9242b0

          SHA512

          11cde86b8ada81857036ebbd22cf6025a90f12d6048033fa43ffbb8fb30d0f6892a853c6521ee3719f031ba9b3906e374b86cd40568c536d1c2bf60027ef4985

        • memory/2436-9-0x00000246B59E0000-0x00000246B5A92000-memory.dmp

          Filesize

          712KB

        • memory/2436-10-0x00007FF8BD7B0000-0x00007FF8BE271000-memory.dmp

          Filesize

          10.8MB

        • memory/2436-3-0x00000246B1CA0000-0x00000246B1CC6000-memory.dmp

          Filesize

          152KB

        • memory/2436-5-0x00000246B1AF0000-0x00000246B1AFA000-memory.dmp

          Filesize

          40KB

        • memory/2436-6-0x00007FF8BD7B0000-0x00007FF8BE271000-memory.dmp

          Filesize

          10.8MB

        • memory/2436-4-0x00000246992F0000-0x00000246992F8000-memory.dmp

          Filesize

          32KB

        • memory/2436-7-0x00007FF8BD7B0000-0x00007FF8BE271000-memory.dmp

          Filesize

          10.8MB

        • memory/2436-0-0x00007FF8BD7B3000-0x00007FF8BD7B5000-memory.dmp

          Filesize

          8KB

        • memory/2436-2-0x00000246B1BC0000-0x00000246B1CA6000-memory.dmp

          Filesize

          920KB

        • memory/2436-12-0x00000246B5A90000-0x00000246B5AC8000-memory.dmp

          Filesize

          224KB

        • memory/2436-11-0x00000246B5B50000-0x00000246B5C0A000-memory.dmp

          Filesize

          744KB

        • memory/2436-13-0x00000246B5B30000-0x00000246B5B38000-memory.dmp

          Filesize

          32KB

        • memory/2436-14-0x00007FF8BD7B0000-0x00007FF8BE271000-memory.dmp

          Filesize

          10.8MB

        • memory/2436-16-0x00000246B5E10000-0x00000246B5E1E000-memory.dmp

          Filesize

          56KB

        • memory/2436-1-0x0000024697500000-0x00000246975F6000-memory.dmp

          Filesize

          984KB

        • memory/2436-32-0x00007FF8BD7B3000-0x00007FF8BD7B5000-memory.dmp

          Filesize

          8KB

        • memory/2436-33-0x00007FF8BD7B0000-0x00007FF8BE271000-memory.dmp

          Filesize

          10.8MB