Overview
overview
8Static
static
3LGS_9.04.4...ch.exe
windows7-x64
7LGS_9.04.4...ch.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$_32_/1-LG...PI.dll
windows7-x64
1$_32_/1-LG...PI.dll
windows10-2004-x64
1$_32_/1-LG...up.exe
windows7-x64
7$_32_/1-LG...up.exe
windows10-2004-x64
8$_32_/LogiKey.pub
windows7-x64
4$_32_/LogiKey.pub
windows10-2004-x64
3$_32_/MSetup.exe
windows7-x64
3$_32_/MSetup.exe
windows10-2004-x64
3$_32_/Setup.exe
windows7-x64
3$_32_/Setup.exe
windows10-2004-x64
7$_32_/SetupDll.dll
windows7-x64
3$_32_/SetupDll.dll
windows10-2004-x64
3$_32_/ui/h...s.html
windows7-x64
1$_32_/ui/h...s.html
windows10-2004-x64
1$_32_/ui/h...u.html
windows7-x64
1$_32_/ui/h...u.html
windows10-2004-x64
1$_32_/ui/h...k.html
windows7-x64
1$_32_/ui/h...k.html
windows10-2004-x64
1$_32_/ui/h...1.html
windows7-x64
1$_32_/ui/h...1.html
windows10-2004-x64
1$_32_/ui/h...f.html
windows7-x64
1$_32_/ui/h...f.html
windows10-2004-x64
1$_32_/ui/h...t.html
windows7-x64
1$_32_/ui/h...t.html
windows10-2004-x64
1$_32_/ui/h...s.html
windows7-x64
1$_32_/ui/h...s.html
windows10-2004-x64
1$_32_/ui/j...ler.js
windows7-x64
1$_32_/ui/j...ler.js
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
20/02/2024, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
LGS_9.04.49_x64_Logitech.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
LGS_9.04.49_x64_Logitech.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$_32_/1-LGS-x64/DiFxAPI.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$_32_/1-LGS-x64/DiFxAPI.dll
Resource
win10v2004-20240220-en
Behavioral task
behavioral7
Sample
$_32_/1-LGS-x64/Setup.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
$_32_/1-LGS-x64/Setup.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$_32_/LogiKey.pub
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$_32_/LogiKey.pub
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
$_32_/MSetup.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
$_32_/MSetup.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
$_32_/Setup.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
$_32_/Setup.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
$_32_/SetupDll.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
$_32_/SetupDll.dll
Resource
win10v2004-20240220-en
Behavioral task
behavioral17
Sample
$_32_/ui/html/FinishWithTasks.html
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
$_32_/ui/html/FinishWithTasks.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
$_32_/ui/html/FinishWithTasks_deu.html
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
$_32_/ui/html/FinishWithTasks_deu.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
$_32_/ui/html/FinishWithTasks_trk.html
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
$_32_/ui/html/FinishWithTasks_trk.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
$_32_/ui/html/Install_1.html
Resource
win7-20240215-en
Behavioral task
behavioral24
Sample
$_32_/ui/html/Install_1.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
$_32_/ui/html/Install_Overwolf.html
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
$_32_/ui/html/Install_Overwolf.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
$_32_/ui/html/exit.html
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
$_32_/ui/html/exit.html
Resource
win10v2004-20240220-en
Behavioral task
behavioral29
Sample
$_32_/ui/html/install_progress.html
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
$_32_/ui/html/install_progress.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
$_32_/ui/js/crawler.js
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
$_32_/ui/js/crawler.js
Resource
win10v2004-20231215-en
General
-
Target
$_32_/1-LGS-x64/Setup.exe
-
Size
118.1MB
-
MD5
5217f677000ea8c475eea1131163076c
-
SHA1
d76425f38d1869106a33c4c406ba3e5cba1c344f
-
SHA256
034c3d6537e802c6eaf3b40aca1f6242888a5091a51eec509f46815c75edc681
-
SHA512
9a620bdf8e44f51197b91c2c1822bebac2f55818b15dbf2f072514a74f46b9245fb8099ec1179ebf875d24c894247074d7630b0f6a3a0538065ae43063122efd
-
SSDEEP
3145728:0isR3UqWFXT54Abwop3Nfbv1FYBqQaYuvZU8PzZdzNOWeY:0isR37K4A0MVtFcBQXzr
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1664 vcredist.exe 2832 vcredist.exe -
Loads dropped DLL 9 IoCs
pid Process 1664 vcredist.exe 2832 vcredist.exe 1716 WerFault.exe 1716 WerFault.exe 1716 WerFault.exe 1716 WerFault.exe 1716 WerFault.exe 1716 WerFault.exe 1716 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{050d4fc8-5d48-4b8f-8972-47c82c46020f} = "\"C:\\ProgramData\\Package Cache\\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\\vcredist_x64.exe\" /burn.runonce" vcredist.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\WindowsUpdate.log vcredist.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1716 2832 WerFault.exe 29 -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\Version = "12.0.30501.0" vcredist.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\DisplayName = "Microsoft Visual C++ 2013 Redistributable (x64) - 12.0.30501" vcredist.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\Dependents\{050d4fc8-5d48-4b8f-8972-47c82c46020f} vcredist.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_amd64,v12 vcredist.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_amd64,v12\Dependents\{050d4fc8-5d48-4b8f-8972-47c82c46020f} vcredist.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\{050d4fc8-5d48-4b8f-8972-47c82c46020f} vcredist.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\ = "{050d4fc8-5d48-4b8f-8972-47c82c46020f}" vcredist.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\Dependents vcredist.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_amd64,v12 vcredist.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_amd64,v12\Dependents\{050d4fc8-5d48-4b8f-8972-47c82c46020f} vcredist.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeBackupPrivilege 2188 vssvc.exe Token: SeRestorePrivilege 2188 vssvc.exe Token: SeAuditPrivilege 2188 vssvc.exe Token: SeRestorePrivilege 548 DrvInst.exe Token: SeRestorePrivilege 548 DrvInst.exe Token: SeRestorePrivilege 548 DrvInst.exe Token: SeRestorePrivilege 548 DrvInst.exe Token: SeRestorePrivilege 548 DrvInst.exe Token: SeRestorePrivilege 548 DrvInst.exe Token: SeRestorePrivilege 548 DrvInst.exe Token: SeLoadDriverPrivilege 548 DrvInst.exe Token: SeLoadDriverPrivilege 548 DrvInst.exe Token: SeLoadDriverPrivilege 548 DrvInst.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1664 1624 Setup.exe 28 PID 1624 wrote to memory of 1664 1624 Setup.exe 28 PID 1624 wrote to memory of 1664 1624 Setup.exe 28 PID 1624 wrote to memory of 1664 1624 Setup.exe 28 PID 1624 wrote to memory of 1664 1624 Setup.exe 28 PID 1624 wrote to memory of 1664 1624 Setup.exe 28 PID 1624 wrote to memory of 1664 1624 Setup.exe 28 PID 1664 wrote to memory of 2832 1664 vcredist.exe 29 PID 1664 wrote to memory of 2832 1664 vcredist.exe 29 PID 1664 wrote to memory of 2832 1664 vcredist.exe 29 PID 1664 wrote to memory of 2832 1664 vcredist.exe 29 PID 1664 wrote to memory of 2832 1664 vcredist.exe 29 PID 1664 wrote to memory of 2832 1664 vcredist.exe 29 PID 1664 wrote to memory of 2832 1664 vcredist.exe 29 PID 2832 wrote to memory of 1716 2832 vcredist.exe 34 PID 2832 wrote to memory of 1716 2832 vcredist.exe 34 PID 2832 wrote to memory of 1716 2832 vcredist.exe 34 PID 2832 wrote to memory of 1716 2832 vcredist.exe 34 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\$_32_\1-LGS-x64\Setup.exe"C:\Users\Admin\AppData\Local\Temp\$_32_\1-LGS-x64\Setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\LGS-9.04.49\vcredist.exeC:\Users\Admin\AppData\Local\Temp\LGS-9.04.49/vcredist.exe /q2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\LGS-9.04.49\vcredist.exe"C:\Users\Admin\AppData\Local\Temp\LGS-9.04.49\vcredist.exe" /q -burn.unelevated BurnPipe.{26A81ACF-4933-4EEE-907C-09AEBBC28BAE} {E4E6366A-2EAD-45A5-9BB4-D4AD766593E0} 16643⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 3484⤵
- Loads dropped DLL
- Program crash
PID:1716
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005B0" "000000000000055C"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.9MB
MD596b61b8e069832e6b809f24ea74567ba
SHA18bf41ba9eef02d30635a10433817dbb6886da5a2
SHA256e554425243e3e8ca1cd5fe550db41e6fa58a007c74fad400274b128452f38fb8
SHA5123a55dce14bbd455808bd939a5008b67c9c7111cab61b1339528308022e587726954f8c55a597c6974dc543964bdb6532fe433556fbeeaf9f8cb4d95f2bbffc12
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
450KB
MD5e16e6d68ce1949c9721656390f47ce07
SHA19009cca5dc05e22f4cf0d8529a473f19b363103b
SHA25618e6d3d96fcd39ba069c0e6ebc108881ec5bb07e29a24b0177688ce391dac526
SHA51263a179e4db0cb7954ddc9aee9e3c7aecae9e160154243b248b94647eb8defafb7041ee291f6f880dc3ca7f298dd548e4b3cf0b650e9a7e34f34d2d2f0dd36127
-
Filesize
117KB
MD5a52e5220efb60813b31a82d101a97dcb
SHA156e16e4df0944cb07e73a01301886644f062d79b
SHA256e7c8e7edd9112137895820e789baaaeca41626b01fb99fede82968ddb66d02cf
SHA512d6565ba18b5b9795d6bde3ef94d8f7cd77bf8bb69ba3fe7adefb80fc7c5d888cdfdc79238d86a0839846aea4a1e51fc0caed3d62f7054885e8b15fad9f6c654e