File name:

klogg-23.08.0.1580-x64-Qt6-setup.exe

Full analysis: https://app.any.run/tasks/9163b422-90e2-440a-9454-a67944b78301
Verdict: Malicious activity
Analysis date: August 26, 2024, 10:32:53
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
github
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

70F9CD4B769116C048C87B36E5CB7D43

SHA1:

32B3F4F8C6A3A7EF7947C7A425BC1FF5934EA02E

SHA256:

DDB0BC4B34012912DB953A5F98122CA72C0A060D2D9CF1111EEAACD4D9790700

SSDEEP:

98304:HJ8JFWk3jKO70htg7RN+DbClxChtrg4zOlhCdZl9tcI2lcfY+XOH2zpKIwe5uxO6:H964hj8YHCHCtaCmhE1fMD

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • klogg-23.08.0.1580-x64-Qt6-setup.exe (PID: 6744)
    • Executable content was dropped or overwritten

      • klogg-23.08.0.1580-x64-Qt6-setup.exe (PID: 6744)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • klogg-23.08.0.1580-x64-Qt6-setup.exe (PID: 6744)
    • Creates a software uninstall entry

      • klogg-23.08.0.1580-x64-Qt6-setup.exe (PID: 6744)
    • Process drops legitimate windows executable

      • klogg-23.08.0.1580-x64-Qt6-setup.exe (PID: 6744)
    • The process drops C-runtime libraries

      • klogg-23.08.0.1580-x64-Qt6-setup.exe (PID: 6744)
    • Drops the executable file immediately after the start

      • klogg-23.08.0.1580-x64-Qt6-setup.exe (PID: 6744)
  • INFO

    • Create files in a temporary directory

      • klogg-23.08.0.1580-x64-Qt6-setup.exe (PID: 6744)
      • klogg.exe (PID: 5988)
    • Creates files in the program directory

      • klogg-23.08.0.1580-x64-Qt6-setup.exe (PID: 6744)
    • Creates files or folders in the user directory

      • klogg-23.08.0.1580-x64-Qt6-setup.exe (PID: 6744)
      • klogg.exe (PID: 5988)
    • Manual execution by a user

      • klogg.exe (PID: 5988)
    • Checks supported languages

      • klogg.exe (PID: 5988)
      • klogg_crashpad_handler.exe (PID: 6168)
      • klogg-23.08.0.1580-x64-Qt6-setup.exe (PID: 6744)
    • Reads the machine GUID from the registry

      • klogg.exe (PID: 5988)
    • Reads the computer name

      • klogg.exe (PID: 5988)
      • klogg-23.08.0.1580-x64-Qt6-setup.exe (PID: 6744)
    • Reads Environment values

      • klogg.exe (PID: 5988)
    • Process checks computer location settings

      • klogg.exe (PID: 5988)
    • Reads the time zone

      • klogg.exe (PID: 5988)
    • Checks proxy server information

      • klogg.exe (PID: 5988)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:25 21:56:47+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 141824
UninitializedDataSize: 2048
EntryPoint: 0x3640
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start klogg-23.08.0.1580-x64-qt6-setup.exe klogg.exe no specs klogg_crashpad_handler.exe no specs klogg-23.08.0.1580-x64-qt6-setup.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2700"C:\Users\admin\AppData\Local\Temp\klogg-23.08.0.1580-x64-Qt6-setup.exe" C:\Users\admin\AppData\Local\Temp\klogg-23.08.0.1580-x64-Qt6-setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\klogg-23.08.0.1580-x64-qt6-setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
5988"C:\Program Files\klogg\klogg.exe" C:\Program Files\klogg\klogg.exeexplorer.exe
User:
admin
Company:
Anton Filimonov
Integrity Level:
MEDIUM
Description:
klogg log viewer
Exit code:
0
Version:
23.08.0.1580
Modules
Images
c:\program files\klogg\klogg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6168"C:\Program Files\klogg\klogg_crashpad_handler.exe" --no-rate-limit --database=C:\Users\admin\AppData\Roaming\klogg\klogg_dump --metrics-dir=C:\Users\admin\AppData\Roaming\klogg\klogg_dump --url=https://o453796.ingest.sentry.io:443/api/5442855/minidump/?sentry_client=sentry.native/0.6.5&sentry_key=aad3b270e5ba4ec2915eb5caf6e6d929 --attachment=C:\Users\admin\AppData\Roaming\klogg\klogg_dump\d1aeff41-389b-4685-3aa1-3709e0528969.run\__sentry-event --attachment=C:\Users\admin\AppData\Roaming\klogg\klogg_dump\d1aeff41-389b-4685-3aa1-3709e0528969.run\__sentry-breadcrumb1 --attachment=C:\Users\admin\AppData\Roaming\klogg\klogg_dump\d1aeff41-389b-4685-3aa1-3709e0528969.run\__sentry-breadcrumb2 --initial-client-data=0x4e4,0x4e8,0x4ec,0x4e0,0x4f0,0x7ff7a8b83ce8,0x7ff7a8b83d08,0x7ff7a8b83d20C:\Program Files\klogg\klogg_crashpad_handler.exeklogg.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\program files\klogg\klogg_crashpad_handler.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\powrprof.dll
6744"C:\Users\admin\AppData\Local\Temp\klogg-23.08.0.1580-x64-Qt6-setup.exe" C:\Users\admin\AppData\Local\Temp\klogg-23.08.0.1580-x64-Qt6-setup.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\klogg-23.08.0.1580-x64-qt6-setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
3 885
Read events
3 878
Write events
7
Delete events
0

Modification events

(PID) Process:(6744) klogg-23.08.0.1580-x64-Qt6-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\klogg.exe\shell\open
Operation:writeName:Klogg log viewer
Value:
klogg
(PID) Process:(6744) klogg-23.08.0.1580-x64-Qt6-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\klogg
Operation:writeName:UninstallString
Value:
"C:\Program Files\klogg\Uninstall.exe"
(PID) Process:(6744) klogg-23.08.0.1580-x64-Qt6-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\klogg
Operation:writeName:InstallLocation
Value:
C:\Program Files\klogg
(PID) Process:(6744) klogg-23.08.0.1580-x64-Qt6-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\klogg
Operation:writeName:DisplayName
Value:
klogg
(PID) Process:(6744) klogg-23.08.0.1580-x64-Qt6-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\klogg
Operation:writeName:DisplayVersion
Value:
23.08.0.1580
(PID) Process:(6744) klogg-23.08.0.1580-x64-Qt6-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\klogg
Operation:writeName:NoModify
Value:
1
(PID) Process:(6744) klogg-23.08.0.1580-x64-Qt6-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\klogg
Operation:writeName:NoRepair
Value:
1
Executable files
26
Suspicious files
3
Text files
17
Unknown types
0

Dropped files

PID
Process
Filename
Type
6744klogg-23.08.0.1580-x64-Qt6-setup.exeC:\Users\admin\AppData\Local\Temp\nsiAC96.tmp\nsDialogs.dllexecutable
MD5:6C3F8C94D0727894D706940A8A980543
SHA256:56B96ADD1978B1ABBA286F7F8982B0EFBE007D4A48B3DED6A4D408E01D753FE2
6744klogg-23.08.0.1580-x64-Qt6-setup.exeC:\Program Files\klogg\COPYINGtext
MD5:3C34AFDC3ADF82D2448F12715A255122
SHA256:0B383D5A63DA644F628D99C33976EA6487ED89AAA59F0B3257992DEAC1171E6B
6744klogg-23.08.0.1580-x64-Qt6-setup.exeC:\Program Files\klogg\klogg_crashpad_handler.exeexecutable
MD5:0085F03062157E8FF4291DF91DC1CB34
SHA256:D6B685868AA09CD6C23893A1D62E07212843B656BF2810448ADBBAEE95444854
6744klogg-23.08.0.1580-x64-Qt6-setup.exeC:\Program Files\klogg\klogg.exeexecutable
MD5:9EDF0D05AD4AF31952DFE77D6D892876
SHA256:55265BFD46B8C747D3950BDF4EA16D21433E08951E4092C9A2DC3B6AF960DB3F
6744klogg-23.08.0.1580-x64-Qt6-setup.exeC:\Users\admin\AppData\Local\Temp\nsiAC96.tmp\modern-wizard.bmpimage
MD5:CBE40FD2B1EC96DAEDC65DA172D90022
SHA256:3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2
6744klogg-23.08.0.1580-x64-Qt6-setup.exeC:\Program Files\klogg\Uninstall.exeexecutable
MD5:1E6D9F4B5F6D10DF443F126101907F14
SHA256:80F32C2D74AE072739BEDBB7FAECD3DE72813ED394B5B7415A47C5316F94CECF
6744klogg-23.08.0.1580-x64-Qt6-setup.exeC:\Program Files\klogg\Qt6Gui.dllexecutable
MD5:0AB8EFED44E94227D814F456E51F0B57
SHA256:1C7B79A164335B8C43D7267FA8A0EE43A2BDEB957AEF167B38BFEDDA21CFF825
6744klogg-23.08.0.1580-x64-Qt6-setup.exeC:\Program Files\klogg\Qt6Network.dllexecutable
MD5:228F4D0DF07520AA1FA57640FB6EC5F0
SHA256:298257EB27353C47FCD811E8202F03AA7EA2EEF0BCB6F3EE71E8060508B29D49
6744klogg-23.08.0.1580-x64-Qt6-setup.exeC:\Program Files\klogg\Qt6Core.dllexecutable
MD5:970DF5D767E87C18EBED28381B0F4ADC
SHA256:238B6DAD34D40EB3E1C4999ECD224BE2EF0FFF3CC7B2587D6B4D9DD260EFFA49
6744klogg-23.08.0.1580-x64-Qt6-setup.exeC:\Program Files\klogg\klogg_minidump_dump.exeexecutable
MD5:84DB7C760E658196B015ED9D88979DEA
SHA256:C8D1B3597F91A5D0E7368E447F233A01819EF562AADB7FF8DDA33D41BED4456F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
42
DNS requests
19
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2660
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3276
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
3276
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:138
whitelisted
6876
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6776
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6876
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3260
svchost.exe
20.7.2.167:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2660
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2660
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
3276
SIHClient.exe
52.165.165.26:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3276
SIHClient.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
whitelisted
google.com
  • 142.250.186.174
whitelisted
client.wns.windows.com
  • 20.7.2.167
whitelisted
login.live.com
  • 20.190.159.75
  • 20.190.159.0
  • 20.190.159.4
  • 20.190.159.23
  • 20.190.159.2
  • 40.126.31.69
  • 20.190.159.73
  • 20.190.159.68
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 52.165.165.26
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.166.126.56
whitelisted
www.bing.com
  • 2.23.209.161
  • 2.23.209.159
  • 2.23.209.154
  • 2.23.209.160
  • 2.23.209.166
  • 2.23.209.155
  • 2.23.209.162
  • 2.23.209.157
  • 2.23.209.158
whitelisted
r.bing.com
  • 202.89.233.100
  • 202.89.233.101
whitelisted

Threats

PID
Process
Class
Message
2256
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
No debug info