Analysis

  • max time kernel
    93s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 09:54

General

  • Target

    lossless scaling/lossless scaling/language/uk-UA/LosslessScaling.exe

  • Size

    953KB

  • MD5

    2c98d33096e97094cbbbd19f27f40883

  • SHA1

    7e28af9d119d2658f962e3b28140c6081be1612b

  • SHA256

    010ac1120a88a772e87d9e9018aa5db034a9bac9399803d4a7c4db3c47a71df6

  • SHA512

    f9070ad6b2e3295fdde13aa8d7486147a7f9a675a924ad3bf117479baf5b573cf92650199e58378dd8345a28ab890bbd5021d374030c24836bfa65bb037dddc7

  • SSDEEP

    12288:ApDJEDS4MCLSyf6mOuGyW38yHJc+CKtOaO5Z7WhawnzE4ZbuRCwmhI2J+0sDgwl1:btMCLPf1Oi32OvzGo4ZiRlT/sN0

Score
1/10

Malware Config

Signatures

  • Modifies Control Panel 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lossless scaling\lossless scaling\language\uk-UA\LosslessScaling.exe
    "C:\Users\Admin\AppData\Local\Temp\lossless scaling\lossless scaling\language\uk-UA\LosslessScaling.exe"
    1⤵
    • Modifies Control Panel
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4656

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Lossless Scaling\Settings.xml

    Filesize

    2KB

    MD5

    45fed0a3bcbc889ca99d0c5943210e7e

    SHA1

    602584366a413cb9ae459b6c3231190cd787241e

    SHA256

    9812fe8104a86e693d6baa02a4cdb56ea9a4aedb500b050346eb5ec6bda8dd09

    SHA512

    d0728fcce9484daedb2c9552ee2a818f7cccbeb1e9bca24a1c4fc1ca6e8c181c46cdc89670bfee3d6ad219ea6f69750bd03f776af4f9e4667872c66c11dbd255

  • memory/4656-9-0x000001D8DDB00000-0x000001D8DDBB2000-memory.dmp

    Filesize

    712KB

  • memory/4656-4-0x000001D8C1490000-0x000001D8C14B6000-memory.dmp

    Filesize

    152KB

  • memory/4656-10-0x000001D8DDC70000-0x000001D8DDD2A000-memory.dmp

    Filesize

    744KB

  • memory/4656-5-0x000001D8BFB50000-0x000001D8BFB58000-memory.dmp

    Filesize

    32KB

  • memory/4656-11-0x00007FFE0C910000-0x00007FFE0D3D1000-memory.dmp

    Filesize

    10.8MB

  • memory/4656-6-0x000001D8BFB90000-0x000001D8BFB9A000-memory.dmp

    Filesize

    40KB

  • memory/4656-7-0x00007FFE0C910000-0x00007FFE0D3D1000-memory.dmp

    Filesize

    10.8MB

  • memory/4656-12-0x000001D8DDBB0000-0x000001D8DDBE8000-memory.dmp

    Filesize

    224KB

  • memory/4656-3-0x00007FFE0C910000-0x00007FFE0D3D1000-memory.dmp

    Filesize

    10.8MB

  • memory/4656-2-0x000001D8DB490000-0x000001D8DB576000-memory.dmp

    Filesize

    920KB

  • memory/4656-0-0x00007FFE0C913000-0x00007FFE0C915000-memory.dmp

    Filesize

    8KB

  • memory/4656-13-0x00007FFE0C910000-0x00007FFE0D3D1000-memory.dmp

    Filesize

    10.8MB

  • memory/4656-14-0x000001D8DDC50000-0x000001D8DDC58000-memory.dmp

    Filesize

    32KB

  • memory/4656-16-0x000001D8DE330000-0x000001D8DE33E000-memory.dmp

    Filesize

    56KB

  • memory/4656-1-0x000001D8BF620000-0x000001D8BF714000-memory.dmp

    Filesize

    976KB

  • memory/4656-32-0x00007FFE0C913000-0x00007FFE0C915000-memory.dmp

    Filesize

    8KB

  • memory/4656-33-0x00007FFE0C910000-0x00007FFE0D3D1000-memory.dmp

    Filesize

    10.8MB