| File name: | HEUR-Trojan.Multi.Loader.exe |
| Full analysis: | https://app.any.run/tasks/28a694b0-48c0-47ea-983d-227a0eb2e4af |
| Verdict: | Malicious activity |
| Threats: | HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses. |
| Analysis date: | April 09, 2025, 22:16:44 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows, InstallShield self-extracting archive, 9 sections |
| MD5: | 72EC64D0BC0B31F8842C9B5D488C11E7 |
| SHA1: | 85D81EDEAC18C67D6C8B73AB628347586A5039AD |
| SHA256: | 019E368CDFE9E71959DFC32917463653DFA4C35C129F1FEB1FE492187D46A22A |
| SSDEEP: | 98304:ESdDQsSdmtZCzmut3GKjKhoIYreG+ahB64Sw9jt9XWUw2YjWmj00M4b+QbSpfjFH:E5GX44OOiQM7+VWujI |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2023:04:05 13:00:45+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware, Removable run from swap, Net run from swap |
| PEType: | PE32+ |
| LinkerVersion: | 14.34 |
| CodeSize: | 515584 |
| InitializedDataSize: | 267776 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x53dd0 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.7.3.0 |
| ProductVersionNumber: | 1.7.3.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | ASCII |
| CompanyName: | Nymphet |
| FileDescription: | Aesthete |
| FileVersion: | 1.7.3.0 |
| InternalName: | burn |
| OriginalFileName: | spirograph.exe |
| ProductName: | Aesthete |
| ProductVersion: | 1.7.3.0 |
| LegalCopyright: | Copyright (c) Nymphet. All rights reserved. |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 3156 | C:\WINDOWS\SysWOW64\explorer.exe | C:\Windows\SysWOW64\explorer.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7544 | "C:\Users\admin\AppData\Local\Temp\HEUR-Trojan.Multi.Loader.exe" | C:\Users\admin\AppData\Local\Temp\HEUR-Trojan.Multi.Loader.exe | explorer.exe | ||||||||||||
User: admin Company: Nymphet Integrity Level: MEDIUM Description: Aesthete Exit code: 3221225477 Version: 1.7.3.0 Modules
| |||||||||||||||
| 7696 | "C:\Users\admin\AppData\Local\Temp\{F17ACEC3-E37A-4EC9-A7A8-E8CB7C6B00B8}\.cr\HEUR-Trojan.Multi.Loader.exe" -burn.clean.room="C:\Users\admin\AppData\Local\Temp\HEUR-Trojan.Multi.Loader.exe" -burn.filehandle.attached=696 -burn.filehandle.self=700 | C:\Users\admin\AppData\Local\Temp\{F17ACEC3-E37A-4EC9-A7A8-E8CB7C6B00B8}\.cr\HEUR-Trojan.Multi.Loader.exe | HEUR-Trojan.Multi.Loader.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221225477 Modules
| |||||||||||||||
| 7744 | C:\Users\admin\AppData\Local\Temp\{49D63430-1EFA-4E66-A54F-751AB9022FE1}\.ba\WinX_DVD_Ripper_Platinum.exe | C:\Users\admin\AppData\Local\Temp\{49D63430-1EFA-4E66-A54F-751AB9022FE1}\.ba\WinX_DVD_Ripper_Platinum.exe | HEUR-Trojan.Multi.Loader.exe | ||||||||||||
User: admin Company: Digiarty Software, Inc. Integrity Level: MEDIUM Description: WinX DVD Ripper Platinum Exit code: 0 Version: 8.22.0.246 Modules
| |||||||||||||||
| 7868 | C:\WINDOWS\system32\WerFault.exe -u -p 7696 -s 628 | C:\Windows\System32\WerFault.exe | — | HEUR-Trojan.Multi.Loader.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7904 | C:\Users\admin\AppData\Roaming\Dn_explore_test\WinX_DVD_Ripper_Platinum.exe | C:\Users\admin\AppData\Roaming\Dn_explore_test\WinX_DVD_Ripper_Platinum.exe | WinX_DVD_Ripper_Platinum.exe | ||||||||||||
User: admin Company: Digiarty Software, Inc. Integrity Level: MEDIUM Description: WinX DVD Ripper Platinum Exit code: 1 Version: 8.22.0.246 Modules
| |||||||||||||||
| 7944 | C:\WINDOWS\SysWOW64\cmd.exe | C:\Windows\SysWOW64\cmd.exe | — | WinX_DVD_Ripper_Platinum.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7952 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 8064 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 8096 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | — | SppExtComObj.Exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7868 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_HEUR-Trojan.Mult_a9e77233f19b89eb5f97c95d39fd3f572963fd37_389931ac_7e529d15-6201-41e1-af2a-e6c742876a46\Report.wer | — | |
MD5:— | SHA256:— | |||
| 7696 | HEUR-Trojan.Multi.Loader.exe | C:\Users\admin\AppData\Local\Temp\{49D63430-1EFA-4E66-A54F-751AB9022FE1}\.ba\libeay32.dll | executable | |
MD5:73A8CDC0BB5B95C1BA6DEB39D71F0349 | SHA256:639980C48DD692E9FF3144F3D932AA07E501F12197D587EC47EB5EC8F6B7696A | |||
| 7544 | HEUR-Trojan.Multi.Loader.exe | C:\Users\admin\AppData\Local\Temp\{F17ACEC3-E37A-4EC9-A7A8-E8CB7C6B00B8}\.cr\HEUR-Trojan.Multi.Loader.exe | executable | |
MD5:93860D60D2DF0F9DA732E45513E7BA5D | SHA256:9366725E71CF2999398B7B257286637B9FCB11D8B49A4AFB96649921DFB31B1B | |||
| 7944 | cmd.exe | C:\Users\admin\AppData\Local\Temp\estkmmcicb | — | |
MD5:— | SHA256:— | |||
| 7696 | HEUR-Trojan.Multi.Loader.exe | C:\Users\admin\AppData\Local\Temp\{49D63430-1EFA-4E66-A54F-751AB9022FE1}\.ba\Serum.dll | executable | |
MD5:20AA36C2CE87D64CB58E7E32F0546FB1 | SHA256:72A8176B2F34EA46B763AB64763F4434D660BC36E487E50E6137489403DA42F8 | |||
| 7696 | HEUR-Trojan.Multi.Loader.exe | C:\Users\admin\AppData\Local\Temp\{49D63430-1EFA-4E66-A54F-751AB9022FE1}\.ba\WinX_DVD_Ripper_Platinum.exe | executable | |
MD5:3C64548B4AEDBD79411D69029BDAE67F | SHA256:1F7A9CF0F11E5D30538E7162AA69C9216839DDA3928B25368434F7E6E96EA0FB | |||
| 7744 | WinX_DVD_Ripper_Platinum.exe | C:\Users\admin\AppData\Roaming\Dn_explore_test\transform.asp | binary | |
MD5:63AFA5CDF59535A6EE3A44C29972F740 | SHA256:CB2DDAAB3E74CE3DDD633F401668B67331E9A7FB7BF506712C7557C3B1DDBC02 | |||
| 7696 | HEUR-Trojan.Multi.Loader.exe | C:\Users\admin\AppData\Local\Temp\{49D63430-1EFA-4E66-A54F-751AB9022FE1}\.ba\restart.msg | binary | |
MD5:D1F6010ADEEEB153FCBF492A2013176D | SHA256:EA3CCEFF70E25F5E4B809CC2E31C2FD6D32C7E8936D456E1D46371B69DCA311F | |||
| 7744 | WinX_DVD_Ripper_Platinum.exe | C:\Users\admin\AppData\Roaming\Dn_explore_test\WinX_DVD_Ripper_Platinum.exe | executable | |
MD5:3C64548B4AEDBD79411D69029BDAE67F | SHA256:1F7A9CF0F11E5D30538E7162AA69C9216839DDA3928B25368434F7E6E96EA0FB | |||
| 7744 | WinX_DVD_Ripper_Platinum.exe | C:\Users\admin\AppData\Roaming\Dn_explore_test\profile.dll | executable | |
MD5:A957F7E18D5493A99D151FF504214D09 | SHA256:4E54F4D31BC41230F51A436613F00C893DFEBA11175667AF960E22E429849F3A | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 23.216.77.42:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
7356 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
7356 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4208 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 23.216.77.42:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2104 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3216 | svchost.exe | 172.211.123.248:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
7356 | SIHClient.exe | 4.175.87.197:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
7356 | SIHClient.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
7356 | SIHClient.exe | 13.85.23.206:443 | fe3cr.delivery.mp.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |