Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/01/2025, 15:49

General

  • Target

    New folder/lossless scaling/language/uk-UA/LosslessScaling.exe

  • Size

    953KB

  • MD5

    2c98d33096e97094cbbbd19f27f40883

  • SHA1

    7e28af9d119d2658f962e3b28140c6081be1612b

  • SHA256

    010ac1120a88a772e87d9e9018aa5db034a9bac9399803d4a7c4db3c47a71df6

  • SHA512

    f9070ad6b2e3295fdde13aa8d7486147a7f9a675a924ad3bf117479baf5b573cf92650199e58378dd8345a28ab890bbd5021d374030c24836bfa65bb037dddc7

  • SSDEEP

    12288:ApDJEDS4MCLSyf6mOuGyW38yHJc+CKtOaO5Z7WhawnzE4ZbuRCwmhI2J+0sDgwl1:btMCLPf1Oi32OvzGo4ZiRlT/sN0

Score
1/10

Malware Config

Signatures

  • Modifies Control Panel 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New folder\lossless scaling\language\uk-UA\LosslessScaling.exe
    "C:\Users\Admin\AppData\Local\Temp\New folder\lossless scaling\language\uk-UA\LosslessScaling.exe"
    1⤵
    • Modifies Control Panel
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4980

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Lossless Scaling\Settings.xml

    Filesize

    2KB

    MD5

    45fed0a3bcbc889ca99d0c5943210e7e

    SHA1

    602584366a413cb9ae459b6c3231190cd787241e

    SHA256

    9812fe8104a86e693d6baa02a4cdb56ea9a4aedb500b050346eb5ec6bda8dd09

    SHA512

    d0728fcce9484daedb2c9552ee2a818f7cccbeb1e9bca24a1c4fc1ca6e8c181c46cdc89670bfee3d6ad219ea6f69750bd03f776af4f9e4667872c66c11dbd255

  • memory/4980-10-0x000001C32A550000-0x000001C32A602000-memory.dmp

    Filesize

    712KB

  • memory/4980-11-0x000001C32A6C0000-0x000001C32A77A000-memory.dmp

    Filesize

    744KB

  • memory/4980-6-0x000001C3265F0000-0x000001C3265FA000-memory.dmp

    Filesize

    40KB

  • memory/4980-5-0x000001C3265C0000-0x000001C3265C8000-memory.dmp

    Filesize

    32KB

  • memory/4980-4-0x000001C327F40000-0x000001C327F66000-memory.dmp

    Filesize

    152KB

  • memory/4980-3-0x00007FF976220000-0x00007FF976CE1000-memory.dmp

    Filesize

    10.8MB

  • memory/4980-7-0x00007FF976220000-0x00007FF976CE1000-memory.dmp

    Filesize

    10.8MB

  • memory/4980-0-0x00007FF976223000-0x00007FF976225000-memory.dmp

    Filesize

    8KB

  • memory/4980-2-0x000001C327E30000-0x000001C327F16000-memory.dmp

    Filesize

    920KB

  • memory/4980-12-0x000001C32A600000-0x000001C32A638000-memory.dmp

    Filesize

    224KB

  • memory/4980-8-0x00007FF976220000-0x00007FF976CE1000-memory.dmp

    Filesize

    10.8MB

  • memory/4980-14-0x00007FF976220000-0x00007FF976CE1000-memory.dmp

    Filesize

    10.8MB

  • memory/4980-13-0x000001C32AE70000-0x000001C32AE78000-memory.dmp

    Filesize

    32KB

  • memory/4980-16-0x000001C32AD90000-0x000001C32AD9E000-memory.dmp

    Filesize

    56KB

  • memory/4980-1-0x000001C30C090000-0x000001C30C184000-memory.dmp

    Filesize

    976KB

  • memory/4980-32-0x00007FF976223000-0x00007FF976225000-memory.dmp

    Filesize

    8KB

  • memory/4980-33-0x00007FF976220000-0x00007FF976CE1000-memory.dmp

    Filesize

    10.8MB