Resubmissions

12-10-2024 06:10

241012-gxb6qaxekf 7

12-10-2024 06:05

241012-gtlkzs1hpk 7

12-10-2024 06:01

241012-gqwlsa1gnr 7

Analysis

  • max time kernel
    92s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2024 06:01

General

  • Target

    Lossless Scaling/LosslessScaling.exe

  • Size

    964KB

  • MD5

    9cfb9984a53f41ebdf00f8f0633fde26

  • SHA1

    a13985c15c6402d25c9e9c64f4e9947fd685635f

  • SHA256

    4b07ba9c32b61773cfb0e2d7b13689c26a13a6dc463b9294aeb1d5e8e4159e8d

  • SHA512

    2a768a77151353e693fb15abc4f72842c002043dece1920e8bddef04c2d620c7345650d369ccab463a72a55939ad7b3bf8fc8e9c3a6f55d8e7ab76ad331b5eea

  • SSDEEP

    12288:pDooEuEDS4MCLSyf6mOuGyW38yHJc+CKtOaO5Z7WhaGwnzE4ZbuRCwmhI2J+0sD+:1oP3tMCLPf1Oi32OvzTo4ZiRlT/MLz

Score
1/10

Malware Config

Signatures

  • Modifies Control Panel 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Lossless Scaling\LosslessScaling.exe
    "C:\Users\Admin\AppData\Local\Temp\Lossless Scaling\LosslessScaling.exe"
    1⤵
    • Modifies Control Panel
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3952

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Lossless Scaling\Settings.xml

    Filesize

    2KB

    MD5

    ace795bd58a45d23bac1c6e60ec23df3

    SHA1

    88a78c643a5b10fc175886cc9cb12f45ef501492

    SHA256

    c34328175332f4cab70206ba70faf4dbc483d6b0d38f7f6af7d6dba3da9242b0

    SHA512

    11cde86b8ada81857036ebbd22cf6025a90f12d6048033fa43ffbb8fb30d0f6892a853c6521ee3719f031ba9b3906e374b86cd40568c536d1c2bf60027ef4985

  • memory/3952-8-0x00007FFEFAD80000-0x00007FFEFB841000-memory.dmp

    Filesize

    10.8MB

  • memory/3952-5-0x000002779F650000-0x000002779F65A000-memory.dmp

    Filesize

    40KB

  • memory/3952-10-0x00000277BD5F0000-0x00000277BD6A2000-memory.dmp

    Filesize

    712KB

  • memory/3952-3-0x00000277BAFC0000-0x00000277BAFE6000-memory.dmp

    Filesize

    152KB

  • memory/3952-11-0x00000277BD760000-0x00000277BD81A000-memory.dmp

    Filesize

    744KB

  • memory/3952-6-0x00007FFEFAD80000-0x00007FFEFB841000-memory.dmp

    Filesize

    10.8MB

  • memory/3952-7-0x00007FFEFAD80000-0x00007FFEFB841000-memory.dmp

    Filesize

    10.8MB

  • memory/3952-12-0x00000277BD6A0000-0x00000277BD6D8000-memory.dmp

    Filesize

    224KB

  • memory/3952-4-0x000002779F640000-0x000002779F648000-memory.dmp

    Filesize

    32KB

  • memory/3952-2-0x00000277BAEC0000-0x00000277BAFA6000-memory.dmp

    Filesize

    920KB

  • memory/3952-0-0x00007FFEFAD83000-0x00007FFEFAD85000-memory.dmp

    Filesize

    8KB

  • memory/3952-13-0x00000277BDF10000-0x00000277BDF18000-memory.dmp

    Filesize

    32KB

  • memory/3952-14-0x00007FFEFAD80000-0x00007FFEFB841000-memory.dmp

    Filesize

    10.8MB

  • memory/3952-16-0x00000277BDE30000-0x00000277BDE3E000-memory.dmp

    Filesize

    56KB

  • memory/3952-1-0x000002779F130000-0x000002779F226000-memory.dmp

    Filesize

    984KB

  • memory/3952-32-0x00007FFEFAD83000-0x00007FFEFAD85000-memory.dmp

    Filesize

    8KB

  • memory/3952-33-0x00007FFEFAD80000-0x00007FFEFB841000-memory.dmp

    Filesize

    10.8MB