Resubmissions

12-10-2024 06:10

241012-gxb6qaxekf 7

12-10-2024 06:05

241012-gtlkzs1hpk 7

12-10-2024 06:01

241012-gqwlsa1gnr 7

Analysis

  • max time kernel
    81s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 06:01

General

  • Target

    Lossless Scaling/LosslessScaling.exe

  • Size

    964KB

  • MD5

    9cfb9984a53f41ebdf00f8f0633fde26

  • SHA1

    a13985c15c6402d25c9e9c64f4e9947fd685635f

  • SHA256

    4b07ba9c32b61773cfb0e2d7b13689c26a13a6dc463b9294aeb1d5e8e4159e8d

  • SHA512

    2a768a77151353e693fb15abc4f72842c002043dece1920e8bddef04c2d620c7345650d369ccab463a72a55939ad7b3bf8fc8e9c3a6f55d8e7ab76ad331b5eea

  • SSDEEP

    12288:pDooEuEDS4MCLSyf6mOuGyW38yHJc+CKtOaO5Z7WhaGwnzE4ZbuRCwmhI2J+0sD+:1oP3tMCLPf1Oi32OvzTo4ZiRlT/MLz

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Lossless Scaling\LosslessScaling.exe
    "C:\Users\Admin\AppData\Local\Temp\Lossless Scaling\LosslessScaling.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1176
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=LosslessScaling.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f70af57c43e775bf72ca4f6aa7d3800

    SHA1

    20214135ef0b632a565622e1ff2923e1b45d0469

    SHA256

    40252f81d5a3677c06ec9918e4e4196508f955d40d100c69145f5a68c1e99276

    SHA512

    919101d6af2b215baf6aa0e72b6fcc3e74b69fc1346772f18f1ee17fab31fec92d76a5c33e22f8e3075adcc85e11185f4e3203ac063258a793c6406c183bd0af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    373197c05822ae286766d8d043a9eb1f

    SHA1

    3b255e57d8462b0a14c97b0b19302b22583f549c

    SHA256

    21b964351ea7b02267a474ef35f1ce7c9bc53021a20ae0a3ef64b981fe5337a3

    SHA512

    8e9b71c1e8324dbf0355f14ef6ef6688f8e743538cef1aea224b3c7358edb370aad2e85c3709c2e53ac8e67a4f4263303331e2feb193cc876696dc19476e1217

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d861e7c71f43d42caa03952bb06da5a1

    SHA1

    5b6be81ddd0609126ca3040e391186ff0fa076d8

    SHA256

    30ac798a2282335898c5ac3cde2cc215b2934226713ae3e5cce7319396ab4aa1

    SHA512

    8f10f36f9abb783e01d746471d2c267dbc2ed89978baabd78a95b35ff6e9538fe49b0bdb72f751f19802936b493400578653c85b7a00ec18ee0b5e6895e71df2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56ef31e4c94b474037359e7538dd2d49

    SHA1

    2384e655bd3609305541377a75ec0384c00321bb

    SHA256

    66cabae2dc55e620db3d8f30a603caf519acfbe8302bad432062cecb78b4e8e2

    SHA512

    2d32a9df4cca0b98a591c013d48f38d3b30f29364d647e8806d77b1e319bb4134000978b37450f83ca53747a5f60e2b8b17cf9c670917a3b9db3ffb0fcb5d2dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    273f7eae9f0e9aaefb56a330bd23cb91

    SHA1

    afc01e6815b756b35ddb938c36e71c762b54dca7

    SHA256

    2817970f0f8d298e9b86727181a92a8ac23ddfce51e072128fab3c1b7642b339

    SHA512

    39b5baf543f43ad82f3e6348336dc051a9f0ca82e63ccf168ea7c62b2cc85c8627a66cb9acdb43f79ec930ed5bc1ade3157c024b71228d8c9eefb04140eb9519

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c92e9e27394f345465457193942a994

    SHA1

    82cca27cd21976c9eb99f7a14b2fa4b00022d871

    SHA256

    bb36de81678ffca4e7557cd6b726a9054ef0079017081af7d58f51ea852bcec6

    SHA512

    607cf15a3b63b37695895de086a0137ff46d62747764cdcbc091917cecfc647a0efa83e93676a79e8068a292b72027095d2a5bff72f7d6f65cb873c0d9c52bbf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2875fed211808c7af562e19762f20149

    SHA1

    eeaebd2781a6dbb6693fd5abf94dbb6b754bcda5

    SHA256

    b1ec3284406501bdfe23b3deaeea121a6e2c781d6b902f5ed38f5bd595bd0fac

    SHA512

    43037951b59ca07c747bc434adc9451c5b5613ada41272e427a4a778c2565c31076fd1779b79a8bf18e084dd46e4fef85ff5b95e7951c244a1d4440a7c723a01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b63a4b1aa4df5a8851fd053f1b9118d4

    SHA1

    d3f3a9e4a5234fdab915899ea90ccfb3e5b3f85f

    SHA256

    b747ac6f449a30f9129eab3d1bdd4439005bae41e884028e973fb8060e603d24

    SHA512

    01b495b508105f906a1b3356749e58076753ebeca5affd7db0f367d41e1a4dbec35bc570a41138b8de9c107425f6841426640d82275c4bac39a687bf7258ab9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9f531f51de6176d84d51df918b4e59c

    SHA1

    f353beec0c09ed8592ce4f804c3a7479b5561e6c

    SHA256

    2b5d92dcbe18438e0a6804d83d99b9f1ab8d86f9608c289457a1fbc3ce0b150f

    SHA512

    14c5d1b47d84cd43d1fb2ddaa21715cd37c42fae99a234243f6f5bedb7ab170e6e89800c3a2d593e3c878b683713ae615c2e63bab50541164f3475c190b6c0ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    86be1902113a77ca03f838542b81de8f

    SHA1

    d0888701a4aa29ccc3d1c12675f095f08cbcbbbe

    SHA256

    37ef339de8c42d94084af593e2ec19c9e08f41fe35ef571932b2ef1606e6bf8c

    SHA512

    8de6dcb983b36b7357a4b771d0fe81a161074e1d4d0b15ba8f14b9bdec55eb751034cda0c7b0e05018c6d9974359537529ba5cf0ddc76d20426c7b55838151d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c36e89b0861103d1002924ad83c932a7

    SHA1

    c2ca3ded0f1a52c1dc8930e28d189428a0498ae7

    SHA256

    ebe016e2ad1047b866fb10ce88f939d445e887a50be2b9e76f6eda68d8075df0

    SHA512

    b4cfe11ab3b2fcc993f894523facccc6b31c35d82272ad98bd9f8477858cbadc5769a759fe37ab9918d92f46aa45d6dadb46f5d385f6ee02d007d4c98b7aa66d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a0e8014c48d60e54df6ab5cde293f3d0

    SHA1

    2e27a352da9ca9404952fc5d6bcdeb21c857d054

    SHA256

    08e2379e801306948bd80e0f5cf00cd820b499c1a498309bf89c87d7dcd41b45

    SHA512

    238ff165eade8821c70a1e4861a191385c87bbed4cd610d7b7128db6b02d7d27f334eb18527a11cbe79e243328c1295c357e95dd941b0b6f17b5fc9ab6cce49d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a2096caade21bf82807fe291ee6ec48

    SHA1

    9a330761a528f18f226475f6e4252347d449e2ac

    SHA256

    1cfddb7908d072d285dd5a77b937a82c54aac5f691afaf2dd63fd2bebeddc6f5

    SHA512

    8d08d2d803270bf3258d36e964da57b8804f95377d3969fb8e94cebfd2b2ea6b392eff9c045f10e643b11ef20d9f355f3f103b5a705b19e2b053267af8841d35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d0c762a22ed27fb00419385724be41a2

    SHA1

    4710975a32354abbdf1b4018f14c02afdb042971

    SHA256

    fdf84744488b96e07480122d274829dc670ebc5fc80c11d314b3b25975e7c37f

    SHA512

    744bff73ab5448ddbecfbabddf0bd04906fd2e20e40b3edf6b83f7ce070c127ae34ae621f32f12f6c41134d0d1027c8f884004c66a9da0009a82b0b3d1e95843

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0aea689a72787338ff9076ab3db6c51f

    SHA1

    9b1568a0b629344d2543571fc1805198d13e540c

    SHA256

    a91382b415c9ad3fa07d9cd6e465af7c386fb3fcf445c66ea41ec9a9ea7545fe

    SHA512

    24564af3dd0d2a001e2932e0bc02fa5731ab20aca44c66681c3c6dfd4131cd7451f47a604a4d6478b714524629725c92d9f9b54e84739e299125852a0929c626

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e8e650a6acb7515e95719334b7f7d71

    SHA1

    08edeab2684fe3d1a439ebfda70d79c959d3400f

    SHA256

    aee374203f187594fd0c8d7446a464e830a902f843b665b21a013dd3e3770dd4

    SHA512

    22a434329ce3f3f4051f3b2a541c8c1748bee3a99cf3233564b9a93580f49b80b28c7e3bb2fa52fb625878e1d886bf7bc9a124971b995a4c4d81190681e8d9f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    16187787a5c7a763041ff2dfe86405c6

    SHA1

    b54408996b5cdccb472bbf660495955fcc555d2d

    SHA256

    b0ee61e06b437f30428dd6af81b7dc2a3f13b0867e6e6cae6d4d0bb52476945c

    SHA512

    28a94fd1010cfd380270eb59e4319735c75022a069bf3e653909db7f0df5e3a004b62c2f133fc54976105b28d0fa6502c1c1a5b54f9ee6a57ddea7894e6150fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1df4f81f76b030a366b93d3c7b076fa9

    SHA1

    ac7b4e5496682cd9788fa0520cec3cce266b9aa1

    SHA256

    a3703a3c51588ae5c0bf42525a8a33b2cac36b87ff492c6a9bf5349cd87d5981

    SHA512

    8e7df40189a931b83d19fdcd83582686076e781273221c2d23df23367dcf54a421cc450f0611f389127bad275e10329d487d13bb2f91a849d33a3b13bcddc47c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7730bc5b4ed73c4a2d3a69f8f1ee3f5e

    SHA1

    00b9d19ed81206f785103d455a3d438ab042c065

    SHA256

    79ae3b846a707f0e5b2063351991ca6b41ef3117d3cae1d0b84c5c98939f00b5

    SHA512

    dfee8299b2804b1dfc740364f7317acf970caf75aa5e82dbce7152cdfaf7a7b185a9d33fa3101259923e3612625c8f3408dbdf5dae710fd97aab313e3b7daa6c

  • C:\Users\Admin\AppData\Local\Temp\Cab5C36.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5CC5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b