Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    03-01-2025 10:15

General

  • Target

    lossless scaling/language/uk-UA/LosslessScaling.exe.xml

  • Size

    174B

  • MD5

    2a2df45a07478a1c77d5834c21f3d7fd

  • SHA1

    f949e331f0d75ba38d33a072f74e2327c870d916

  • SHA256

    051099983b896673909e01a1f631b6652abb88da95c9f06f3efef4be033091fa

  • SHA512

    1a6dd48f92ea6b68ee23b86ba297cd1559f795946ecda17ade68aea3dda188869bba380e3ea3472e08993f4ae574c528b34c3e25503ee6119fd4f998835e09d7

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\lossless scaling\language\uk-UA\LosslessScaling.exe.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2744
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d039a88b58cce15aedaf600f94a67e4

    SHA1

    4467c49329a0cb54205678ad81dfbd58702507ce

    SHA256

    0a5985169c12fea8603e58ec8d5c53c60cf7d91f8fd502b54dd7df1bc6ebb1b9

    SHA512

    973fa27d019802ee6f39d38d8512fdcc5b1e3e11fafda488620fe150659fdb249ec4cbf8a8720586b0544aa09c6b47ebb50a511e9996a0fbe5080581a8e065a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a343f2b171cb1f13ce76937a40ca441a

    SHA1

    d908e10ea7dabfc8c1099d4998157c26664945ff

    SHA256

    63fddf0ede1014be6c58e6d7149c4092564518dad8b8bb4aea32a284e66a25eb

    SHA512

    137a55e32f3790e5b7b264cd300b09a4a83f255932b50b8cfb46e0384428bc4c66559d08f3c4785bf29a85a5513f2fcf3450438c401aab9d952a4973faf76e6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    180736e3f5dad5113ab08759bd38bc59

    SHA1

    f7c644dea852e00fb8c1cf5c356e8425d333809b

    SHA256

    ada0a948084167f2d7524aaf52812feb00d24c3310208a6fbc3fe98e3d79d0c2

    SHA512

    75fa2e9315da0b5b3edd6cced11d004e2d959dafcfee3f1f0f1c467cf0c7584be3ec3afebf5b4a85cb5133411a1557721b41856439b42c6b527c2ada34aaa69e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ac72e2eec6ce1727fd671483d2073016

    SHA1

    559f9fb95d0dfbdb2d114d1a7b9d49981d292643

    SHA256

    5de3e2e855db558c98ef1ba0c0de93fff0f0aa8c1e44ed4ffe59a83a9e648453

    SHA512

    36b432340e405800ba7da11c6cf7495cb2282a4176f0f270c578324affedb8c7e1e9ad01e1d126b0e92c01d0bca55bcd8e1dda8873737ef92bf2a21b6d242e83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5fcbc6bbdb13431fd34130f79c76a20

    SHA1

    d2e8c1928a3b38942a579ed1921dda062c079896

    SHA256

    db528d399d13d20086fd696ed55108c57023f67ad1a70af33aec46efc5c72877

    SHA512

    61be101b17f5ae7de4c0ed6725fa4910593d4e02537189c3e2895aca55ea4782ad85b692699c033e47102364324f18e5e00c41d99c3facbe43cf72ab7e904c80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc0bb48a1296e5c37c96287d4d5480dd

    SHA1

    cd93332beba155a40ff578ce59a1e0750e9bc940

    SHA256

    f69e3c6e573adddb88476ca942c37d76d871c8ba30721d240047268721b2a1da

    SHA512

    4259d127e301f7628bccdaed67e3136b104493682a485378268a5d51eeb244955573a0c006467f6319ef029659355701475cfc1961d4d88194ff4231d477b301

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ab38191ed8e55804f7af6fa9b4176e8

    SHA1

    f0fedbc127b9d242698d4e68701515527f2cb1ed

    SHA256

    6aee717691349cd1294f0dafce7946a571cf12cd59015979eb01c4feece08496

    SHA512

    0c0bf8f504474eee5d80ab802cbb54633ea8e76c5bd745517867d05f6319a928b58bbd2c3d1706047e6c5373505549f1da254f0ab9eeeae24555ece15a263e08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8adc7086a3ab5cb3dbccaa61e86a2d9

    SHA1

    9a6984558b6e7a98a359765e9946fd741c36f91b

    SHA256

    16da13e38ba8f0ff81ececc0e303d8a3740429e0fccb5f2131035ec632fdf99e

    SHA512

    38d97d31471b098fa3e19f93796fcaddd18cebc76b8bf91b6e671c8d1d4ea9957880b19abab1aecf9aeab966a9651c649e73a230d5476f7ebf56fe8fdf61170d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c76b033c3c186d5b7f31d8e924b4db62

    SHA1

    3a9b1cea43c93350cd769d154e5b6d556b9a8ca8

    SHA256

    af0f5128dfa0e8d419f51c923105667b0d83966e270ed3164afb5adfb5757950

    SHA512

    59d6981acb602803c7e02aa7d6c117f80a199573a29302c8a663e9356be59685ad4ef54f7a26fa8faef41328b6efd00b4fb6e15e505bb798ce26bacd5f078433

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b519c564f0b30493a63eac3ee4cb6b88

    SHA1

    058fc34cfb3ed7394b9fcf8b69f0fd0951d9d54e

    SHA256

    88eb7c57e3ba0185b6177ab4e5ce9b98a6b1a4d8a0ac8accf63541f2e64cac69

    SHA512

    bc3f67fd338e72769f3bc709eb421578c48e6fb4992daacb3c58c1cc644d7438e2e087a84e4591145c72c75d328731126a757201c5c88667fd8f8780357f4963

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8385a1acbc1b788fd7c74afda12a518

    SHA1

    c98348b749e473b024086ca0f3066c27e27a712a

    SHA256

    41fea886585061deb69e8744d40bbd1ebc569c6b766b18e10ff6b08958c0db24

    SHA512

    a3fb206b2828804ef849a805a04b60c549d3b8d51cbd883b0eaec7ddd27b4c7873537f0b54dc805c0b460c81478dc3c39466d8dd041298b1d321194a0af983a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5836a7914f5f0f543e956495f8dd2ae

    SHA1

    13d154796583b4cf1b84d4e5015a5ec4c139102d

    SHA256

    21b2737c9d6e9543cdb3b8cea93b1cc188dcacf149b3633cc627588f206a98a7

    SHA512

    967c03adf61ad3f8f4bf3d372b1fa00c2a11455a1b626e563aa3de3cec05dcf24245c5a3705fce01c8e5eed1db10e378f64e83e318516413547ebe4e71afccf3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd28d651a9d34c2adaefff34ff37e488

    SHA1

    dcbb2ed52cc7aa2d42cdc618286447cd2fce80a8

    SHA256

    a57e55de6ea0890b8fb7b52b984c34b40f457f107084eaab5ead96b59be0eb99

    SHA512

    8071fcbfa5b8a3090515e316d9e4b9065dc7bb3aac790c39542f2010a930aaaa2f8ecdbc15fe703eb5ef832fa226fce23895d1aba9ad2891edb504e84ce9bb0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1584664392643226c518438f86d37589

    SHA1

    84eda44d1d3d763a61ac6406d9eea859febdb9b6

    SHA256

    a053cf48743e6fb8cea76a2e58fa9a4656a77dcedfb9595957a4ca59f6bc8cee

    SHA512

    e0a36c7008ea77c5d2243e84ced5f7e6e8ebde2426cd763bf1da985e1a6adf1056c2912ad5b7c3aabf3d501edbd4519b7114e457af5fe6928fc8284075b1456e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bef15516d148b4cd5ecac5e42f226fb0

    SHA1

    a31eff99cfb27e253937c335af005f9591f50546

    SHA256

    0b695c54365dfa0941369b896b877a86137afba6aa9bee1fd95770651874fc9d

    SHA512

    9e7b93100a6148268339ab99ef44879a61c59f502c0d4a8a0ba8bc463a752a064bb9fbd185d629ba342cc7c6d7b02321117eba7a3ec2a1b46a1c0148c694fc4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c54550e4ec0172b5a494510d6637e45

    SHA1

    412e294c639d6a70883257c2e2cae566eaa5ea52

    SHA256

    856a8167d4e8a666f0bba0d0b9bdc1936958177b51734ee44128b3f6cb8533ca

    SHA512

    eae61f40302228aee943784acda71a54a53b23387ebf28b3e33ac00afad1fbbbe5361bcc4b8b26fab4b86ddce62deea581d2ea50ad51ddd45e227cc5cf17edb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d0a868e5bd40586dffb1c4c595d1e372

    SHA1

    c5780036db59639a0adaa1019b8bc38bf55e087e

    SHA256

    8567129d03d4b57282a647822142bf9ab2fc6966be3b163ae3190fd72ff2a89c

    SHA512

    6817180a96802fe4ad4a96beb5a28286732f7913eaccca993cd48658260cba754f7461620848d28de48bb1f5ecbd315ecf9464798247e8e64c8fd0aaf0e38e8a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc52c82818a88ef8410ed6b423438751

    SHA1

    b9bff09d078171d88c8b0ccc5b876273b931976f

    SHA256

    8af5a3e1cb64fbead64b998a2272fb3cb6b478e90b178a78dd112ed9f101f3e1

    SHA512

    d85db68b435ac1cb3fefe2669674348d83047de56771c25f8e80d60a860d469c37a45982b56178f88043c7599ffad7be24ac3698704ad5b0305d638ea543855e

  • C:\Users\Admin\AppData\Local\Temp\CabC34.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC94.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b