Analysis

  • max time kernel
    95s
  • max time network
    89s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28/03/2025, 20:00

General

  • Target

    https://logicalrl.com/

Malware Config

Signatures

  • Downloads MZ/PE file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 52 IoCs
  • Suspicious use of FindShellTrayWindow 39 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://logicalrl.com/
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec006dcf8,0x7ffec006dd04,0x7ffec006dd10
      2⤵
        PID:3484
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1828,i,475005728095669570,10712309465584295612,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=1824 /prefetch:2
        2⤵
          PID:3916
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1412,i,475005728095669570,10712309465584295612,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=2224 /prefetch:11
          2⤵
          • Downloads MZ/PE file
          PID:4400
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2300,i,475005728095669570,10712309465584295612,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=2436 /prefetch:13
          2⤵
            PID:3688
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,475005728095669570,10712309465584295612,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=3144 /prefetch:1
            2⤵
              PID:5696
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3104,i,475005728095669570,10712309465584295612,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=3164 /prefetch:1
              2⤵
                PID:3920
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4164,i,475005728095669570,10712309465584295612,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=4188 /prefetch:9
                2⤵
                  PID:4436
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4964,i,475005728095669570,10712309465584295612,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5128 /prefetch:14
                  2⤵
                    PID:2552
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5524,i,475005728095669570,10712309465584295612,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5172 /prefetch:1
                    2⤵
                      PID:1952
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5168,i,475005728095669570,10712309465584295612,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5496 /prefetch:14
                      2⤵
                      • Subvert Trust Controls: Mark-of-the-Web Bypass
                      • NTFS ADS
                      PID:2688
                    • C:\Users\Admin\Downloads\LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe
                      "C:\Users\Admin\Downloads\LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe"
                      2⤵
                      • Executes dropped EXE
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: GetForegroundWindowSpam
                      • Suspicious use of SetWindowsHookEx
                      PID:3384
                  • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                    1⤵
                      PID:5848
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:4596

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                        Filesize

                        649B

                        MD5

                        a474714fb56e9cae1f25a30bb9b18c5a

                        SHA1

                        7c3bcaaffb1126074cd150bb0aade262ad633ba0

                        SHA256

                        321089e8649e6fb65c6a4db5e9d00b33ef7088eb4e8e9b4dce8925edb5e1ccea

                        SHA512

                        a58cd635cf5b1f5e134cab891cbda3e510c1893ced6e8f41d6836a371223cd80b0335986dc062eccbd7b64c7c3edb5ffe7962cb8aa3db6abd0dec0f7852c404a

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                        Filesize

                        312B

                        MD5

                        8ce787f333cec0108ef93f244efe812a

                        SHA1

                        9239a52d8fc8a523ec62a6048f543409da047fcf

                        SHA256

                        5cc3027877ab0ae4ef410ddd7eabc947915a9c030772c8da5eebeab0cd7d99a0

                        SHA512

                        1b988923104a06aac57b5575166dc37787d109d7d3bbc92899bb52cd50650f330080d14f5f209a561a013d466babaf198f7b88edd0b21846c00395429b5dc4a5

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnGraphiteCache\data_1

                        Filesize

                        264KB

                        MD5

                        f50f89a0a91564d0b8a211f8921aa7de

                        SHA1

                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                        SHA256

                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                        SHA512

                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        4KB

                        MD5

                        fa9cdc0cd8a0652f5d7b8903819acd40

                        SHA1

                        f165c4f4ce80f6dbb1a378801d58b44b02b7591f

                        SHA256

                        c3f42c8eb03d923e32c1913572923c2f694b22b7063f27ecca1a4098355a3e66

                        SHA512

                        6c989b8b555982eca27908e6778730d2aefea2b8d2ff3e85cd25fe50bc4dd2cca23a42e41b341a3adafb4dc16d8362611ddf6ca1ecbae3ba7a03095529fe8980

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                        Filesize

                        2B

                        MD5

                        d751713988987e9331980363e24189ce

                        SHA1

                        97d170e1550eee4afc0af065b78cda302a97674c

                        SHA256

                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                        SHA512

                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                        Filesize

                        1019B

                        MD5

                        b787330e54e6539aaeaf77fb8da10fa7

                        SHA1

                        20e54fc47c575f8f5ccb8a49f5c806a0c6b29e75

                        SHA256

                        d33772e5ba94607e4f625b6fa71fb2ab72a37eb268103cefbce378fdc7f4cbf3

                        SHA512

                        481708dc8615abf3fca808e73e877f283adeaabf3c27394ab220eb6131b39fd476e9712efd6ebf050e12769d44c27e5891f972c335c85ee8d52cfb33e03aa6fb

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        10KB

                        MD5

                        a3447dff58cc7ec072db3efeb937231c

                        SHA1

                        10ea65a996171121f1b017d29c4811d97b505838

                        SHA256

                        0b7027d943685112501362a9b29e6810c708dd300877cffbe8d01005dbaef030

                        SHA512

                        c2c086b8a4e8bc22a477f1318aec27eb6d6e1b9f4eebf960dd24af3a659e2434c76bd5ee810f8ebda68e078b408b102f1073eabe6647ddd0ce9f0b75a18fb690

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        10KB

                        MD5

                        d5d544488ea98efbbaaa8267338c2d67

                        SHA1

                        96d3623230dd89ea66f88f423f1587f77441c3f6

                        SHA256

                        ff3fcf1293aaea4a9c7d58dfc97a15427661b410f7671946c58c487a7f1740cd

                        SHA512

                        eb2cc8529f2ca5d1bf4a7f15c3b33afa75c33732c4cd689fe040ed868077f0e534310e2dc4d6f37a38e5350ef7ec9d167f1297aae60915b11b5847c89a99beff

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                        Filesize

                        15KB

                        MD5

                        69b73254d9fba705761cc4ac24b246f9

                        SHA1

                        fdccd69dc5d5ea1683dcd275cc4bed830ed0db67

                        SHA256

                        79350f75b31ea293964b7d01e77fb8641a1530dd13ff2292a9ff459ccd4caebc

                        SHA512

                        5087328ae5498b4812ab8e28b0f912550e2a40bc08ecbe20af79a6efedeb9234c76a42cfd3669a378272a55febc6dad58e4d5c75802e97db1d55a8c06ca3965a

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                        Filesize

                        72B

                        MD5

                        3c439555190649a3fb58ecb2fe16a0a1

                        SHA1

                        c9607817876d2b94674545856e24a8ac760e523b

                        SHA256

                        7338d9986f43dc00642dded7b657429c5bf4ade4b5cd71f97e9d49cb45edbc11

                        SHA512

                        691ce3644d4ef3d33ecade3a9e0a955197688a7391f940284e41b3ff44ea43e014b3256ce8786c6fe74cd670d2ed9c1945e0a9863eea84a6bf691981c26c0e05

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57c4f6.TMP

                        Filesize

                        48B

                        MD5

                        e5d47151ebae7fe03c3f72bb6706daf4

                        SHA1

                        3e62c3d4393b385c3be297798657af88900206fb

                        SHA256

                        17de95a9b78374567d782bfe57211fee877bd7d93ad4ffd15b9246056ecbccd8

                        SHA512

                        1bcb5f4395765edbb496dae0b7637cd73b67a0d3e17be9140ed095d484fdecfe91fd6ed6a9e38dd899e281494cedf37f4f86a2eca09a88f1f176534cb0115d42

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        80KB

                        MD5

                        b54228e55d39a66e34b6ab5c5e7e4942

                        SHA1

                        5bf8112c1bafbe894fd4f94bc78abd7be4bb73cb

                        SHA256

                        a5b19cd0bf683f559e7ea295d9b1527d72b1e4affd0906ccc5b32302b0941f06

                        SHA512

                        0c23bb4a2b941b9e6e4499a46d430c180bd75058940ff1d29ce5ffb72a916b1f795ce844ff9e2aba01828dd7599a62cf4072c397b136889f2536ac8d233da8c7

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        81KB

                        MD5

                        56d08e3336381de5f01d5fb61ba7d318

                        SHA1

                        850db8c1042e1624d29fab44567d667f8dffe384

                        SHA256

                        82a92d89b690f04755d402f513a42a7a0e5a0d69dc8982b465533c3c3f12cba1

                        SHA512

                        1998739f5b0cb9ce68a1f0d877fbaeecc65dc460cf0c98fae296fe93f47d44ea15d2dbfb510fb4ca8835fbdded653dbf54ad6b77b701862d0bae716b0dfc63ae

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        81KB

                        MD5

                        8827b3d8621f9c5c6c7251b2b88138c7

                        SHA1

                        daec56da9daaba75ff07a4fa6a8c36708c0462df

                        SHA256

                        1bdcfbc2ba3e9113f8c8cdcd4635b182678fe787265d52a76d18a5b3906a74cd

                        SHA512

                        b5a22ebbf2083932634c716370770956d523d6beb5088e44eea8ca9c7007ac42ad2eecbac097275365b9c4d1e2d52456afbf7ada7a9bf687af2641cb6a059e3d

                      • C:\Users\Admin\AppData\Local\LogicalRL\Loader\Config.json

                        Filesize

                        98B

                        MD5

                        98fbd33e76de25a0d0889f0001a2f8d7

                        SHA1

                        cb433f26fd18b6dab9c34021ab8ec6946ab3d9ea

                        SHA256

                        742fb116d21d1bfc11cc1caf02019aae43e86604a193928b6c7bb4a612314cdc

                        SHA512

                        28e17a93e22d1b3d2c8650fdb12f93fa7179dfd6bdfd382c18620827cd1461497c667683b32b368f298f5573c22ad94f84f0b46fa14c25a6c962002062d07a3a

                      • C:\Users\Admin\Downloads\LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe:Zone.Identifier

                        Filesize

                        26B

                        MD5

                        fbccf14d504b7b2dbcb5a5bda75bd93b

                        SHA1

                        d59fc84cdd5217c6cf74785703655f78da6b582b

                        SHA256

                        eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                        SHA512

                        aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                      • C:\Users\Admin\Downloads\Unconfirmed 426548.crdownload

                        Filesize

                        8.3MB

                        MD5

                        422892e2e35043cc2219606f9fa3d855

                        SHA1

                        2fb4970f33e55df52aedeadf48cdc896e9589b0e

                        SHA256

                        4da86b047e5f05accd66484032b6eab439a359ea6be0560f538843620c338ce7

                        SHA512

                        72a82725df275d3cc59c42af1e5ef94fcffa0e819e4eb9b93cb7317ee96449a8fbda09935435c718e4e8166cc0276075c5a2f8effc17d770f4e2ddd24ad7511c

                      • memory/3384-157-0x0000000140576000-0x000000014087E000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/3384-163-0x0000000140000000-0x00000001410D5000-memory.dmp

                        Filesize

                        16.8MB

                      • memory/3384-159-0x00007FFECF0E0000-0x00007FFECF0E2000-memory.dmp

                        Filesize

                        8KB

                      • memory/3384-282-0x0000000140576000-0x000000014087E000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/3384-283-0x0000000140000000-0x00000001410D5000-memory.dmp

                        Filesize

                        16.8MB

                      • memory/3384-158-0x00007FFECF0D0000-0x00007FFECF0D2000-memory.dmp

                        Filesize

                        8KB