analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://logtagrecorders.com/wp-content/uploads/ltanalyzer_31r5.exe

Full analysis: https://app.any.run/tasks/0b600547-f29e-463c-9e44-1fb9f65b8fc3
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 23, 2019, 23:54:56
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
loader
Indicators:
MD5:

2144B4B58E0B4B9412D8C03D01204BF5

SHA1:

32F9DEC458BCD89803747E7E13BB095AE8779EA0

SHA256:

08F178FF9B19DE91123E6781037A1382DA7F204BF2FBF1729C6B58AE62DD069A

SSDEEP:

3:N1KSKCRcGKHRSVOlAQyfELgiTXfdAn:CSZ2GKUVOlAZEb1An

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • ltanalyzer_31r5.exe (PID: 2520)
      • ltanalyzer_31r5.exe (PID: 1708)
      • vcredist_x86.exe (PID: 2104)
      • Setup.exe (PID: 3348)
      • ltanalyzer_31r5.exe (PID: 2052)
      • AnalyzerDesktop.exe (PID: 4008)
    • Downloads executable files from the Internet

      • iexplore.exe (PID: 768)
    • Changes settings of System certificates

      • ltanalyzer_31r5.exe (PID: 2520)
    • Loads dropped or rewritten executable

      • ltanalyzer_31r5.exe (PID: 2520)
      • Setup.exe (PID: 3348)
      • AnalyzerDesktop.exe (PID: 4008)
    • Loads the Task Scheduler DLL interface

      • ltanalyzer_31r5.exe (PID: 2520)
  • SUSPICIOUS

    • Creates files in the Windows directory

      • ltanalyzer_31r5.exe (PID: 2520)
      • msiexec.exe (PID: 3520)
      • DrvInst.exe (PID: 2896)
      • DrvInst.exe (PID: 3080)
    • Adds / modifies Windows certificates

      • ltanalyzer_31r5.exe (PID: 2520)
    • Executable content was dropped or overwritten

      • vcredist_x86.exe (PID: 2104)
      • ltanalyzer_31r5.exe (PID: 2520)
      • MsiExec.exe (PID: 3876)
      • msiexec.exe (PID: 3520)
      • msiexec.exe (PID: 2424)
      • DrvInst.exe (PID: 3080)
      • MsiExec.exe (PID: 2656)
    • Application launched itself

      • ltanalyzer_31r5.exe (PID: 2520)
    • Executed via COM

      • DrvInst.exe (PID: 2556)
      • DrvInst.exe (PID: 2896)
      • DrvInst.exe (PID: 3080)
    • Executed as Windows Service

      • vssvc.exe (PID: 2804)
    • Creates files in the user directory

      • ltanalyzer_31r5.exe (PID: 2520)
      • msiexec.exe (PID: 2424)
      • AnalyzerDesktop.exe (PID: 4008)
    • Reads Environment values

      • MsiExec.exe (PID: 2656)
    • Modifies the open verb of a shell class

      • msiexec.exe (PID: 2424)
    • Creates files in the driver directory

      • DrvInst.exe (PID: 2896)
      • DrvInst.exe (PID: 3080)
    • Removes files from Windows directory

      • DrvInst.exe (PID: 2896)
      • DrvInst.exe (PID: 3080)
      • ltanalyzer_31r5.exe (PID: 2520)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 2568)
    • Creates files in the user directory

      • iexplore.exe (PID: 768)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 768)
      • iexplore.exe (PID: 2568)
    • Application launched itself

      • iexplore.exe (PID: 2568)
      • msiexec.exe (PID: 2424)
    • Loads dropped or rewritten executable

      • MsiExec.exe (PID: 1032)
      • MsiExec.exe (PID: 3876)
      • MsiExec.exe (PID: 4072)
      • MsiExec.exe (PID: 2656)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 3520)
      • msiexec.exe (PID: 2424)
      • MsiExec.exe (PID: 2656)
    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 2804)
    • Searches for installed software

      • msiexec.exe (PID: 2424)
    • Dropped object may contain Bitcoin addresses

      • ltanalyzer_31r5.exe (PID: 2520)
      • msiexec.exe (PID: 2424)
      • MSI552E.tmp (PID: 3140)
    • Starts application with an unusual extension

      • msiexec.exe (PID: 2424)
    • Application was dropped or rewritten from another process

      • MSI552E.tmp (PID: 3140)
    • Creates files in the program directory

      • MsiExec.exe (PID: 4072)
      • MsiExec.exe (PID: 2656)
      • msiexec.exe (PID: 2424)
    • Manual execution by user

      • AnalyzerDesktop.exe (PID: 4008)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
59
Monitored processes
19
Malicious processes
7
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start iexplore.exe iexplore.exe ltanalyzer_31r5.exe no specs ltanalyzer_31r5.exe msiexec.exe msiexec.exe no specs vcredist_x86.exe setup.exe msiexec.exe msiexec.exe ltanalyzer_31r5.exe no specs vssvc.exe no specs drvinst.exe no specs msiexec.exe no specs msiexec.exe msi552e.tmp no specs drvinst.exe no specs drvinst.exe analyzerdesktop.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2568"C:\Program Files\Internet Explorer\iexplore.exe" http://logtagrecorders.com/wp-content/uploads/ltanalyzer_31r5.exeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
768"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2568 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
1708"C:\Users\admin\Downloads\ltanalyzer_31r5.exe" C:\Users\admin\Downloads\ltanalyzer_31r5.exeiexplore.exe
User:
admin
Company:
LogTag Recorders
Integrity Level:
MEDIUM
Description:
LogTag Analyzer Installer
Exit code:
3221226540
Version:
3.1.5.6
2520"C:\Users\admin\Downloads\ltanalyzer_31r5.exe" C:\Users\admin\Downloads\ltanalyzer_31r5.exe
iexplore.exe
User:
admin
Company:
LogTag Recorders
Integrity Level:
HIGH
Description:
LogTag Analyzer Installer
Exit code:
0
Version:
3.1.5.6
3520C:\Windows\system32\msiexec.exe /VC:\Windows\system32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
1032C:\Windows\system32\MsiExec.exe -Embedding 4986515FF3B72EC1B6DD2752BADF7017 CC:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
2104"C:\Users\admin\AppData\Roaming\LogTag Recorders\LogTag Analyzer\prerequisites\Visual C++ 2010 SP1\vcredist_x86.exe" C:\Users\admin\AppData\Roaming\LogTag Recorders\LogTag Analyzer\prerequisites\Visual C++ 2010 SP1\vcredist_x86.exe
ltanalyzer_31r5.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2010 x86 Redistributable Setup
Exit code:
0
Version:
10.0.40219.325
3348c:\4eefa51461631bbd1d39068dd99de6\Setup.exe c:\4eefa51461631bbd1d39068dd99de6\Setup.exe
vcredist_x86.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Setup Installer
Exit code:
0
Version:
10.0.40219.325 built by: SP1LDR
2424C:\Windows\system32\msiexec.exe /VC:\Windows\system32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
3876C:\Windows\system32\MsiExec.exe -Embedding 3859F4ADC75115273FDD6EBA275FA4F5 CC:\Windows\system32\MsiExec.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Total events
4 160
Read events
2 952
Write events
0
Delete events
0

Modification events

No data
Executable files
179
Suspicious files
33
Text files
1 504
Unknown types
30

Dropped files

PID
Process
Filename
Type
2568iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFBAE5508BDA9F1425.TMP
MD5:
SHA256:
2568iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico
MD5:
SHA256:
2568iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
768iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\4CE7YLUT\ltanalyzer_31r5[1].exe
MD5:
SHA256:
2568iexplore.exeC:\Users\admin\Downloads\ltanalyzer_31r5.exe
MD5:
SHA256:
2520ltanalyzer_31r5.exeC:\Users\admin\AppData\Roaming\LogTag Recorders\LogTag Analyzer 3.1.5.6\install\holder0.aiph
MD5:
SHA256:
2520ltanalyzer_31r5.exeC:\Users\admin\AppData\Roaming\LogTag Recorders\LogTag Analyzer 3.1.5.6\install\7890922\ltanalyzer_3.1.5.6.msi
MD5:
SHA256:
2568iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{32FFCA9C-7DB6-11E9-A370-5254004A04AF}.datbinary
MD5:A8A51EC007F376E01BB33E132E541E0C
SHA256:8111F14374577E5E946F237022A340644B161AE2100B2FEE56B51CC465430B2F
2568iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019052420190525\index.datdat
MD5:C00AA341A3E2AFC7890409603B72F40A
SHA256:9AA853AEB6B045B63A779C519C9BB8DB19505F0C6DA1A4881D5CEE7E3C2DF03A
768iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:19C81FB12240C3BC31F786E911F3E242
SHA256:0A44136D6C0228204491C3EB1BF3D3F696C206FEBBCBB6B824F3454D4E7BAA3B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
2
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
768
iexplore.exe
GET
200
77.104.154.224:80
http://logtagrecorders.com/wp-content/uploads/ltanalyzer_31r5.exe
US
executable
54.3 Mb
malicious
2568
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2568
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
768
iexplore.exe
77.104.154.224:80
logtagrecorders.com
SingleHop, Inc.
US
malicious

DNS requests

Domain
IP
Reputation
logtagrecorders.com
  • 77.104.154.224
malicious
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted

Threats

PID
Process
Class
Message
768
iexplore.exe
A Network Trojan was detected
ET TROJAN EXE Download Request To Wordpress Folder Likely Malicious
768
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Process
Message
Setup.exe
The operation completed successfully.
Setup.exe
The operation completed successfully.