Analysis

  • max time kernel
    120s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-01-2025 10:30

General

  • Target

    lossless scaling/language/uk-UA/LosslessScaling.exe

  • Size

    953KB

  • MD5

    2c98d33096e97094cbbbd19f27f40883

  • SHA1

    7e28af9d119d2658f962e3b28140c6081be1612b

  • SHA256

    010ac1120a88a772e87d9e9018aa5db034a9bac9399803d4a7c4db3c47a71df6

  • SHA512

    f9070ad6b2e3295fdde13aa8d7486147a7f9a675a924ad3bf117479baf5b573cf92650199e58378dd8345a28ab890bbd5021d374030c24836bfa65bb037dddc7

  • SSDEEP

    12288:ApDJEDS4MCLSyf6mOuGyW38yHJc+CKtOaO5Z7WhawnzE4ZbuRCwmhI2J+0sDgwl1:btMCLPf1Oi32OvzGo4ZiRlT/sN0

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lossless scaling\language\uk-UA\LosslessScaling.exe
    "C:\Users\Admin\AppData\Local\Temp\lossless scaling\language\uk-UA\LosslessScaling.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=LosslessScaling.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2312
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12220c3308deb401c43bd8216acc7457

    SHA1

    067e5f6016f4a4ed1afc188bf1af54d9ea45435a

    SHA256

    a4366d9b7eb5f00cc78bc5bc166c8c881f1bf61b6f82b43d48739ef3357c1502

    SHA512

    607fdc7b376c3d81a4204ff5fcb6624f9cd013aa9627efcf726fe91290492421c5f4d4cb26cbd607163d51662afbf21934eaaa18d3ffc480fef62ce2c182a732

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b24d67fac45d7de940d2e57d8bdb5b7e

    SHA1

    343353d7f1d8be8b6c9e9bb40d77446779b6854f

    SHA256

    6d5080377430b411fff8de8f121eb8fd0ce322602e1dff5140cd3fd2c6bf52f0

    SHA512

    72a71307d2b902a81569c52625eb711b9202b6b9600052fe6df2595f735f143dff56d80138fa1d20cdc13050a18ca71c9f1ff64d8ebbc0d4b699759a7416d2f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af14f4c903824d8f570557ce092c28a1

    SHA1

    d6d87fbe121495f66373fc5334dc22594cbc46e4

    SHA256

    2f0bdeddc47ebf9605b205065db8978e0b4aa9d3149f0aa3695af120a7ddaf97

    SHA512

    4f5f97654ec837609097fe307deb6459d2023e62c01abd0fa56da76eaab5ce065ec4c87526a4cb70e7573b7b88261e9151174ba30ed4d30a81ce6a10699cdd67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c97c8936b9e18c5b8cef2537794e5ed

    SHA1

    e14dfbc168b67dabf382793fe919ab8106b7dd20

    SHA256

    6fdf156bd42acfeacff1f4a325364e11981877309cda36791b6f3206174b718f

    SHA512

    83816e9ed4ca74eb2aeee73810125f22853ce97686d994b05c9400b661ca70e117f693fe5bda249030e51b5e7317e01c9efa4984d5eb66a1c6369fcb490b51dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bbe807dde2152889e58518b01f86a127

    SHA1

    169288d8aa10e4ea36d85167f9b02527078a3971

    SHA256

    d8545073f1c2ba109a7aed6d03ab6dacb6153a3d6d0760c0ad95697f4f22f1cf

    SHA512

    9d8a8d6ec7154c055bcaf3c34ba01c233e5d2fd190d26b1162fddcce0e576b6adf23a082efe09cf3af79a3cc5bbdcf3c3ab03683b2b3e94826c5bf28da8e77af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6bc2a099cfff3255daded8ea5149a034

    SHA1

    49096d4c674a981ee6dc7c7842fe277d866a7d6d

    SHA256

    7ecc773c3caac3feeabf7c28163d5451942418b7dc0094c4d2be4468d8b03960

    SHA512

    94d4427734566ef86544b6b5016e726e528f6b326ffccf63810df8edd0295076e6bbaa263b0696b7ed5e53e76b9b07ddd8165bc16f3b041a0ebc2515ef4fb73e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8eac3886f18469b44ff7ed5c0aa55613

    SHA1

    0517549341205327c6c4d22820c3088fb9575c33

    SHA256

    5010db411c40ac239caa5bbeaf243256f19a2972af3491863999b3a2ad11637a

    SHA512

    9e33ecd47fd6f461d67c2c6c66936a3da912b9757577b35338866624dd05354002c15a51fdc44b81200a491b736237064e991ced33c2e04924a07b905cc7f21e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95f1ec7f27802099489c106d39b2f19c

    SHA1

    aea2633df001320b5b149768e3a7405d7d267697

    SHA256

    a14d3486beeb1bbb56a767310816b65c20a2fef03c9d0963a67f10d2169a1994

    SHA512

    55925ef1de3cc03c9000bd8eb8851816761e7c9df8a26ac203732b4fa02069b6a44687b8fcc65b16db8c30cc7914aa96be74401030d1ebed9c491b2db88ea3d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    48e30ca995e8fed93cbdcfd4258643e3

    SHA1

    12d62df6254a7e0b295e9334211ff22d1f85fbc2

    SHA256

    71a0ba1506e2b202a71359e98916adde734dc4bc056dea916ed441c9c92dbd04

    SHA512

    6a1a0119ca32aeaa5232a7c8068d69a62555d2172ea92c1fc28b9344cc356ba54d80f72ad1aa3bbf684a8e29ae6f7d07048bf3621c435b8ab8a5673daf3c611c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9bb7e1c98ba7a83b67f62c5a2dcfd263

    SHA1

    92b63c484b6fe316f09d43dd6b9a401861093f6a

    SHA256

    3432ba2669032e0a327afd9de007999b1b359635f40691e0f76d846b133eecb2

    SHA512

    74e55322f25262530a5e81f99f5693fab67e749148cefdce33cea2976af9224b29cd5d4def957b4bb0ad612d4128ae0b12fe6df2e2e5d7c38f944b9c2d084481

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e4ce1204867419ee4d99c5f34f4e956b

    SHA1

    c7b3a76b8c0aea419fa1597f57710fed0b94eb69

    SHA256

    7afe18f3d009e16ca9209ac19c217b76f8601761ff93582e54679f5484fe95fc

    SHA512

    d77079213c23081c24388f9b0fbd5fd3520a0cfc3dc42c557c1cc5bc6d7c0126e547cc030581b9018d5cb7b1ffc85b4d8b3bd39a62f4be9ec73d6973b73a5bed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1901dbd0cff64c87c54b02352e6a8f00

    SHA1

    223cc093e4bb5741c4983314c3dc1076e803bc6d

    SHA256

    67ee70a3a611884ae4b1c7cfa6d04b3cb60de062a8b2e1ddb9363f0d331ea45f

    SHA512

    c5c6d300310a5f6907ff942f43c9b08cd7f04219d44f8fadd9649aa5724a61ed3dba5319340629a51013237b2f4caaa12e5cf972dfa78801c950fd94f3875657

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47dfb94e7d9373a7fd2f4b3a86693bc0

    SHA1

    064ff854992829992c3dde4f077fc7ef8195375d

    SHA256

    b93455c8e7898a44ba354ba7ae1cd08aa2cc70c400e493b28ca23d64b0ab3abd

    SHA512

    9c7bccf1533a4613f106aabadb3c8cf7f06e4b01e9ed5a5c8a0bff1aa01f4cca17f3cdae27a70a58aa3398eecdc749e1afe14a585b3b337c313e99101fedae7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b2d06e1c067d280ca8a41cd31583bd6

    SHA1

    7c3820f2a4ce9c4e3dbeb53ca53cc43b7f9220cd

    SHA256

    39d6fb5d101fb960593951c5525dc4e7e57598ccacfee50d95425d9e85470742

    SHA512

    ee0529e8717d1cc17a335a03e9fe1ae17b89188b5759098312b2bfe1c0285c85137a4c7a3b35c29577f4c985053aa94004089bb754839c08a7a84f3bca552cc4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    24cd021a2de3659ac16f7bcd68456595

    SHA1

    06c71024246d04570ad40e9a318b5180533c93d0

    SHA256

    4959c4173b993467298b9c1df38e625f77ae4a85cbb8749401a546628435e505

    SHA512

    48b596e68479f38fba1e9dcf5f9a787f64da13dec7644276eb92d97f40ae1e0d2e3381b75a82116c5c38ee637077c4a18da47a60f50454f027b5e101a12abe21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    985809bfeaad60263fa7986a541b6aab

    SHA1

    9f91d7943fd758835c628e10f90cc79c1390ec12

    SHA256

    4499dc9d85c2f2ad060b1ead17bfc18edf1f78613ad585d5f9c7626aa0d3dc07

    SHA512

    e1896dca5c69e3b3be4ba39c851cf439eefbed1bbc333e2ae3deea14936bb7cd2ea3e62ed77db6171779e1894239e49273609ceb2ab7c24822f6783fc519b84c

  • C:\Users\Admin\AppData\Local\Temp\CabD0E8.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD10A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b