Analysis

  • max time kernel
    92s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2024 04:20

General

  • Target

    lossless scaling/language/uk-UA/LosslessScaling.exe

  • Size

    953KB

  • MD5

    2c98d33096e97094cbbbd19f27f40883

  • SHA1

    7e28af9d119d2658f962e3b28140c6081be1612b

  • SHA256

    010ac1120a88a772e87d9e9018aa5db034a9bac9399803d4a7c4db3c47a71df6

  • SHA512

    f9070ad6b2e3295fdde13aa8d7486147a7f9a675a924ad3bf117479baf5b573cf92650199e58378dd8345a28ab890bbd5021d374030c24836bfa65bb037dddc7

  • SSDEEP

    12288:ApDJEDS4MCLSyf6mOuGyW38yHJc+CKtOaO5Z7WhawnzE4ZbuRCwmhI2J+0sDgwl1:btMCLPf1Oi32OvzGo4ZiRlT/sN0

Score
1/10

Malware Config

Signatures

  • Modifies Control Panel 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lossless scaling\language\uk-UA\LosslessScaling.exe
    "C:\Users\Admin\AppData\Local\Temp\lossless scaling\language\uk-UA\LosslessScaling.exe"
    1⤵
    • Modifies Control Panel
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2388

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Lossless Scaling\Settings.xml

    Filesize

    2KB

    MD5

    45fed0a3bcbc889ca99d0c5943210e7e

    SHA1

    602584366a413cb9ae459b6c3231190cd787241e

    SHA256

    9812fe8104a86e693d6baa02a4cdb56ea9a4aedb500b050346eb5ec6bda8dd09

    SHA512

    d0728fcce9484daedb2c9552ee2a818f7cccbeb1e9bca24a1c4fc1ca6e8c181c46cdc89670bfee3d6ad219ea6f69750bd03f776af4f9e4667872c66c11dbd255

  • memory/2388-9-0x000001DA49C30000-0x000001DA49CE2000-memory.dmp

    Filesize

    712KB

  • memory/2388-5-0x000001DA45DB0000-0x000001DA45DB8000-memory.dmp

    Filesize

    32KB

  • memory/2388-10-0x000001DA49DA0000-0x000001DA49E5A000-memory.dmp

    Filesize

    744KB

  • memory/2388-4-0x000001DA47620000-0x000001DA47646000-memory.dmp

    Filesize

    152KB

  • memory/2388-11-0x00007FFC2E370000-0x00007FFC2EE31000-memory.dmp

    Filesize

    10.8MB

  • memory/2388-6-0x000001DA45DC0000-0x000001DA45DCA000-memory.dmp

    Filesize

    40KB

  • memory/2388-7-0x00007FFC2E370000-0x00007FFC2EE31000-memory.dmp

    Filesize

    10.8MB

  • memory/2388-12-0x000001DA49CE0000-0x000001DA49D18000-memory.dmp

    Filesize

    224KB

  • memory/2388-3-0x00007FFC2E370000-0x00007FFC2EE31000-memory.dmp

    Filesize

    10.8MB

  • memory/2388-2-0x000001DA474F0000-0x000001DA475D6000-memory.dmp

    Filesize

    920KB

  • memory/2388-0-0x00007FFC2E373000-0x00007FFC2E375000-memory.dmp

    Filesize

    8KB

  • memory/2388-13-0x00007FFC2E370000-0x00007FFC2EE31000-memory.dmp

    Filesize

    10.8MB

  • memory/2388-14-0x000001DA4A060000-0x000001DA4A068000-memory.dmp

    Filesize

    32KB

  • memory/2388-16-0x000001DA4A080000-0x000001DA4A08E000-memory.dmp

    Filesize

    56KB

  • memory/2388-1-0x000001DA2B760000-0x000001DA2B854000-memory.dmp

    Filesize

    976KB

  • memory/2388-32-0x00007FFC2E373000-0x00007FFC2E375000-memory.dmp

    Filesize

    8KB

  • memory/2388-33-0x00007FFC2E370000-0x00007FFC2EE31000-memory.dmp

    Filesize

    10.8MB