Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2025, 06:49

General

  • Target

    Registration (Crack)/language/uk-UA/LosslessScaling.exe

  • Size

    953KB

  • MD5

    2c98d33096e97094cbbbd19f27f40883

  • SHA1

    7e28af9d119d2658f962e3b28140c6081be1612b

  • SHA256

    010ac1120a88a772e87d9e9018aa5db034a9bac9399803d4a7c4db3c47a71df6

  • SHA512

    f9070ad6b2e3295fdde13aa8d7486147a7f9a675a924ad3bf117479baf5b573cf92650199e58378dd8345a28ab890bbd5021d374030c24836bfa65bb037dddc7

  • SSDEEP

    12288:ApDJEDS4MCLSyf6mOuGyW38yHJc+CKtOaO5Z7WhawnzE4ZbuRCwmhI2J+0sDgwl1:btMCLPf1Oi32OvzGo4ZiRlT/sN0

Score
1/10

Malware Config

Signatures

  • Modifies Control Panel 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Registration (Crack)\language\uk-UA\LosslessScaling.exe
    "C:\Users\Admin\AppData\Local\Temp\Registration (Crack)\language\uk-UA\LosslessScaling.exe"
    1⤵
    • Modifies Control Panel
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4744

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Lossless Scaling\Settings.xml

    Filesize

    2KB

    MD5

    45fed0a3bcbc889ca99d0c5943210e7e

    SHA1

    602584366a413cb9ae459b6c3231190cd787241e

    SHA256

    9812fe8104a86e693d6baa02a4cdb56ea9a4aedb500b050346eb5ec6bda8dd09

    SHA512

    d0728fcce9484daedb2c9552ee2a818f7cccbeb1e9bca24a1c4fc1ca6e8c181c46cdc89670bfee3d6ad219ea6f69750bd03f776af4f9e4667872c66c11dbd255

  • memory/4744-9-0x000001203F210000-0x000001203F2C2000-memory.dmp

    Filesize

    712KB

  • memory/4744-11-0x00007FFD9B030000-0x00007FFD9BAF1000-memory.dmp

    Filesize

    10.8MB

  • memory/4744-3-0x00007FFD9B030000-0x00007FFD9BAF1000-memory.dmp

    Filesize

    10.8MB

  • memory/4744-6-0x00000120213D0000-0x00000120213DA000-memory.dmp

    Filesize

    40KB

  • memory/4744-5-0x00000120213C0000-0x00000120213C8000-memory.dmp

    Filesize

    32KB

  • memory/4744-4-0x000001203B4E0000-0x000001203B506000-memory.dmp

    Filesize

    152KB

  • memory/4744-7-0x00007FFD9B030000-0x00007FFD9BAF1000-memory.dmp

    Filesize

    10.8MB

  • memory/4744-0-0x00007FFD9B033000-0x00007FFD9B035000-memory.dmp

    Filesize

    8KB

  • memory/4744-2-0x000001203B400000-0x000001203B4E6000-memory.dmp

    Filesize

    920KB

  • memory/4744-12-0x000001203F2C0000-0x000001203F2F8000-memory.dmp

    Filesize

    224KB

  • memory/4744-10-0x000001203F380000-0x000001203F43A000-memory.dmp

    Filesize

    744KB

  • memory/4744-13-0x000001203FB30000-0x000001203FB38000-memory.dmp

    Filesize

    32KB

  • memory/4744-14-0x00007FFD9B030000-0x00007FFD9BAF1000-memory.dmp

    Filesize

    10.8MB

  • memory/4744-16-0x000001203FA50000-0x000001203FA5E000-memory.dmp

    Filesize

    56KB

  • memory/4744-1-0x0000012020D60000-0x0000012020E54000-memory.dmp

    Filesize

    976KB

  • memory/4744-32-0x00007FFD9B033000-0x00007FFD9B035000-memory.dmp

    Filesize

    8KB

  • memory/4744-33-0x00007FFD9B030000-0x00007FFD9BAF1000-memory.dmp

    Filesize

    10.8MB