File name:

transport.exe

Full analysis: https://app.any.run/tasks/dec8e08f-2446-40b3-8095-112c31d981c6
Verdict: Malicious activity
Threats:

HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses.

Analysis date: February 06, 2025, 16:37:13
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
delphi
rhadamanthys
stealer
hijackloader
loader
shellcode
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, InstallShield self-extracting archive, 9 sections
MD5:

72EC64D0BC0B31F8842C9B5D488C11E7

SHA1:

85D81EDEAC18C67D6C8B73AB628347586A5039AD

SHA256:

019E368CDFE9E71959DFC32917463653DFA4C35C129F1FEB1FE492187D46A22A

SSDEEP:

98304:ESdDQsSdmtZCzmut3GKjKhoIYreG+ahB64Sw9jt9XWUw2YjWmj00M4b+QbSpfjFH:E5GX44OOiQM7+VWujI

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RHADAMANTHYS mutex has been found

      • explorer.exe (PID: 3988)
      • svchost.exe (PID: 1580)
    • HIJACKLOADER has been detected (YARA)

      • explorer.exe (PID: 3988)
    • RHADAMANTHYS has been detected (YARA)

      • svchost.exe (PID: 1580)
  • SUSPICIOUS

    • Starts itself from another location

      • transport.exe (PID: 5764)
      • WinX_DVD_Ripper_Platinum.exe (PID: 3612)
    • Executable content was dropped or overwritten

      • transport.exe (PID: 5764)
      • transport.exe (PID: 936)
      • WinX_DVD_Ripper_Platinum.exe (PID: 3612)
    • Process drops legitimate windows executable

      • transport.exe (PID: 936)
    • Executes application which crashes

      • transport.exe (PID: 936)
    • Starts CMD.EXE for commands execution

      • WinX_DVD_Ripper_Platinum.exe (PID: 2076)
    • The process checks if it is being run in the virtual environment

      • svchost.exe (PID: 1580)
    • Connects to unusual port

      • svchost.exe (PID: 1580)
  • INFO

    • Checks supported languages

      • transport.exe (PID: 5764)
      • transport.exe (PID: 936)
      • WinX_DVD_Ripper_Platinum.exe (PID: 3612)
      • WinX_DVD_Ripper_Platinum.exe (PID: 2076)
    • The sample compiled with english language support

      • transport.exe (PID: 5764)
      • transport.exe (PID: 936)
      • WinX_DVD_Ripper_Platinum.exe (PID: 3612)
    • Create files in a temporary directory

      • transport.exe (PID: 5764)
      • transport.exe (PID: 936)
      • WinX_DVD_Ripper_Platinum.exe (PID: 2076)
    • Reads the computer name

      • WinX_DVD_Ripper_Platinum.exe (PID: 3612)
      • WinX_DVD_Ripper_Platinum.exe (PID: 2076)
    • Creates files or folders in the user directory

      • WinX_DVD_Ripper_Platinum.exe (PID: 3612)
      • WerFault.exe (PID: 4300)
    • Reads the software policy settings

      • WerFault.exe (PID: 4300)
    • Compiled with Borland Delphi (YARA)

      • WinX_DVD_Ripper_Platinum.exe (PID: 2076)
    • Manual execution by a user

      • svchost.exe (PID: 1580)
    • Checks proxy server information

      • WerFault.exe (PID: 4300)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2023:04:05 13:00:45+00:00
ImageFileCharacteristics: Executable, Large address aware, Removable run from swap, Net run from swap
PEType: PE32+
LinkerVersion: 14.34
CodeSize: 515584
InitializedDataSize: 267776
UninitializedDataSize: -
EntryPoint: 0x53dd0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.7.3.0
ProductVersionNumber: 1.7.3.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: ASCII
CompanyName: Nymphet
FileDescription: Aesthete
FileVersion: 1.7.3.0
InternalName: burn
OriginalFileName: spirograph.exe
ProductName: Aesthete
ProductVersion: 1.7.3.0
LegalCopyright: Copyright (c) Nymphet. All rights reserved.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
120
Monitored processes
9
Malicious processes
7
Suspicious processes
0

Behavior graph

Click at the process to see the details
start transport.exe transport.exe winx_dvd_ripper_platinum.exe werfault.exe winx_dvd_ripper_platinum.exe no specs cmd.exe no specs conhost.exe no specs #RHADAMANTHYS explorer.exe no specs #RHADAMANTHYS svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
936"C:\Users\admin\AppData\Local\Temp\{E1AF0BAA-595C-47F7-9E3B-A64E224A6DED}\.cr\transport.exe" -burn.clean.room="C:\Users\admin\Desktop\transport.exe" -burn.filehandle.attached=620 -burn.filehandle.self=592C:\Users\admin\AppData\Local\Temp\{E1AF0BAA-595C-47F7-9E3B-A64E224A6DED}\.cr\transport.exe
transport.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\temp\{e1af0baa-595c-47f7-9e3b-a64e224a6ded}\.cr\transport.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
1580"C:\Windows\System32\svchost.exe"C:\Windows\SysWOW64\svchost.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\sechost.dll
c:\windows\syswow64\rpcrt4.dll
2076C:\Users\admin\AppData\Roaming\Dn_explore_test\WinX_DVD_Ripper_Platinum.exeC:\Users\admin\AppData\Roaming\Dn_explore_test\WinX_DVD_Ripper_Platinum.exeWinX_DVD_Ripper_Platinum.exe
User:
admin
Company:
Digiarty Software, Inc.
Integrity Level:
MEDIUM
Description:
WinX DVD Ripper Platinum
Exit code:
1
Version:
8.22.0.246
Modules
Images
c:\users\admin\appdata\roaming\dn_explore_test\winx_dvd_ripper_platinum.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
3612C:\Users\admin\AppData\Local\Temp\{AD957E84-36DF-4B10-ACC7-C5BAB043EB27}\.ba\WinX_DVD_Ripper_Platinum.exeC:\Users\admin\AppData\Local\Temp\{AD957E84-36DF-4B10-ACC7-C5BAB043EB27}\.ba\WinX_DVD_Ripper_Platinum.exe
transport.exe
User:
admin
Company:
Digiarty Software, Inc.
Integrity Level:
MEDIUM
Description:
WinX DVD Ripper Platinum
Exit code:
0
Version:
8.22.0.246
Modules
Images
c:\users\admin\appdata\local\temp\{ad957e84-36df-4b10-acc7-c5bab043eb27}\.ba\winx_dvd_ripper_platinum.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
3988C:\WINDOWS\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\ijnqciqnf
c:\windows\syswow64\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
4300C:\WINDOWS\system32\WerFault.exe -u -p 936 -s 744C:\Windows\System32\WerFault.exe
transport.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\oleaut32.dll
4328C:\WINDOWS\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exeWinX_DVD_Ripper_Platinum.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
5696\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5764"C:\Users\admin\Desktop\transport.exe" C:\Users\admin\Desktop\transport.exe
explorer.exe
User:
admin
Company:
Nymphet
Integrity Level:
MEDIUM
Description:
Aesthete
Exit code:
3221225477
Version:
1.7.3.0
Modules
Images
c:\users\admin\desktop\transport.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
6 671
Read events
6 670
Write events
1
Delete events
0

Modification events

(PID) Process:(3988) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\SibCode
Operation:writeName:sn3
Value:
DADCE69FB19E41BDF5049870453A2399EF02E97BD8F05EC34E2AA6179A303DF823D4BC46FE746F283519A9E25C8CD54BFCFC130821162644F239AB72E2A1E315
Executable files
8
Suspicious files
8
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
4300WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_transport.exe_b00b3a48ce3504ca26e6167595bbb577618616_0bba22c0_860b6d8f-8676-4682-a4e4-d4a4596f0374\Report.wer
MD5:
SHA256:
936transport.exeC:\Users\admin\AppData\Local\Temp\{AD957E84-36DF-4B10-ACC7-C5BAB043EB27}\.ba\profile.dllexecutable
MD5:A957F7E18D5493A99D151FF504214D09
SHA256:4E54F4D31BC41230F51A436613F00C893DFEBA11175667AF960E22E429849F3A
936transport.exeC:\Users\admin\AppData\Local\Temp\{AD957E84-36DF-4B10-ACC7-C5BAB043EB27}\.ba\Serum.dllexecutable
MD5:20AA36C2CE87D64CB58E7E32F0546FB1
SHA256:72A8176B2F34EA46B763AB64763F4434D660BC36E487E50E6137489403DA42F8
4328cmd.exeC:\Users\admin\AppData\Local\Temp\ijnqciqnf
MD5:
SHA256:
936transport.exeC:\Users\admin\AppData\Local\Temp\{AD957E84-36DF-4B10-ACC7-C5BAB043EB27}\.ba\transform.aspbinary
MD5:63AFA5CDF59535A6EE3A44C29972F740
SHA256:CB2DDAAB3E74CE3DDD633F401668B67331E9A7FB7BF506712C7557C3B1DDBC02
936transport.exeC:\Users\admin\AppData\Local\Temp\{AD957E84-36DF-4B10-ACC7-C5BAB043EB27}\.ba\libeay32.dllexecutable
MD5:73A8CDC0BB5B95C1BA6DEB39D71F0349
SHA256:639980C48DD692E9FF3144F3D932AA07E501F12197D587EC47EB5EC8F6B7696A
936transport.exeC:\Users\admin\AppData\Local\Temp\{AD957E84-36DF-4B10-ACC7-C5BAB043EB27}\.ba\BootstrapperApplicationData.xmlxml
MD5:DFD882FC7A7427413097437512706355
SHA256:EEB5F50C2F1D5F4789812C2EFA4D734188F1D40652C21C67C1B983B445624CAD
3612WinX_DVD_Ripper_Platinum.exeC:\Users\admin\AppData\Roaming\Dn_explore_test\transform.aspbinary
MD5:63AFA5CDF59535A6EE3A44C29972F740
SHA256:CB2DDAAB3E74CE3DDD633F401668B67331E9A7FB7BF506712C7557C3B1DDBC02
3612WinX_DVD_Ripper_Platinum.exeC:\Users\admin\AppData\Roaming\Dn_explore_test\libeay32.dllexecutable
MD5:73A8CDC0BB5B95C1BA6DEB39D71F0349
SHA256:639980C48DD692E9FF3144F3D932AA07E501F12197D587EC47EB5EC8F6B7696A
3612WinX_DVD_Ripper_Platinum.exeC:\Users\admin\AppData\Roaming\Dn_explore_test\profile.dllexecutable
MD5:A957F7E18D5493A99D151FF504214D09
SHA256:4E54F4D31BC41230F51A436613F00C893DFEBA11175667AF960E22E429849F3A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
32
DNS requests
4
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4300
WerFault.exe
104.208.16.94:443
watson.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:137
whitelisted
1580
svchost.exe
91.108.241.156:6450
SIA Singularity Telecom
AU
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 142.250.186.142
whitelisted
watson.events.data.microsoft.com
  • 104.208.16.94
whitelisted
self.events.data.microsoft.com
  • 20.189.173.26
whitelisted

Threats

No threats detected
No debug info