File name:

CITACION DEMANDA JUDICIAL (1).zip

Full analysis: https://app.any.run/tasks/7eee754a-9794-4b2f-9bb1-0756da583f7a
Verdict: Malicious activity
Threats:

HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses.

Analysis date: April 26, 2024, 14:58:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
hijackloader
loader
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

108ADDBED9D017E1665DBAFA3654B837

SHA1:

C1E77A5E22A4C1CAE9EC2E3AECF4B831D04701DC

SHA256:

06D966537F2236E4ECC8F4BA62070398980CF42D74971B47D0018DD8089C3A15

SSDEEP:

98304:DUlYv0PHyFqg57anKGzBoIY02RCMzK5v4Fcq+OGw6SA8hDjnn1Udl6F3ZKcymmTV:3K/x

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • HIJACKLOADER has been detected (YARA)

      • 01 CITACION DEMANDA.exe (PID: 4064)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 3976)
  • INFO

    • Checks supported languages

      • 01 CITACION DEMANDA.exe (PID: 4064)
    • Reads the computer name

      • 01 CITACION DEMANDA.exe (PID: 4064)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3976)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3976)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2024:04:22 11:06:36
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: CITACION DEMANDA JUDICIAL/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe #HIJACKLOADER 01 citacion demanda.exe

Process information

PID
CMD
Path
Indicators
Parent process
3976"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\CITACION DEMANDA JUDICIAL (1).zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
4064"C:\Users\admin\AppData\Local\Temp\Rar$EXb3976.35616\CITACION DEMANDA JUDICIAL\01 CITACION DEMANDA.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb3976.35616\CITACION DEMANDA JUDICIAL\01 CITACION DEMANDA.exe
WinRAR.exe
User:
admin
Company:
VMware, Inc.
Integrity Level:
MEDIUM
Description:
VMware Tools Core Service
Exit code:
3221225477
Version:
10.0.12.325
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb3976.35616\citacion demanda judicial\01 citacion demanda.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
Total events
3 730
Read events
3 709
Write events
21
Delete events
0

Modification events

(PID) Process:(3976) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3976) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3976) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3976) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3976) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3976) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(3976) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\CITACION DEMANDA JUDICIAL (1).zip
(PID) Process:(3976) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3976) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3976) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
8
Suspicious files
0
Text files
0
Unknown types
1

Dropped files

PID
Process
Filename
Type
3976WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3976.35616\CITACION DEMANDA JUDICIAL\iconv.dllexecutable
MD5:862DFC9BF209A46D6F4874614A6631CC
SHA256:84538F1AACEBF9DAAD9FDB856611AB3D98A6D71C9EC79A8250EEE694D2652A8B
3976WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3976.35616\CITACION DEMANDA JUDICIAL\gthread-2.0.dllexecutable
MD5:78CF6611F6928A64B03A57FE218C3CD4
SHA256:DBAAD965702B89C371462E735DD925C694EDA8D8557B280F7264BBA992C0E698
3976WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3976.35616\CITACION DEMANDA JUDICIAL\glib-2.0.dllexecutable
MD5:3E7CD1D2B1BDEE2E417E928DABBA5098
SHA256:723EE58A96214EF72018467196F168C021E3B20D08A2299D1994AA4912E4012A
3976WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3976.35616\CITACION DEMANDA JUDICIAL\gobject-2.0.dllexecutable
MD5:24A7A712160ABC3F23F7410B18DE85B8
SHA256:78DD76027E10C17824978DB821777FCAA58D7CD5D5EB9D80D6EE817E26B18AB8
3976WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3976.35616\CITACION DEMANDA JUDICIAL\vmtools.dllexecutable
MD5:65C3C2A741838474A592679CDA346753
SHA256:4E5F2C54D9ECFE48999EDFCCE0DE038948F8B20FF68E299C55D9A2D6F65713E8
3976WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3976.35616\CITACION DEMANDA JUDICIAL\gmodule-2.0.dllexecutable
MD5:B0A421B1534F3194132EC091780472D8
SHA256:2D6BC34B38BC0ABF0C5E2F40E2513B4DF47AF57848534E011A76D4E974AD958B
3976WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3976.35616\CITACION DEMANDA JUDICIAL\01 CITACION DEMANDA.exeexecutable
MD5:AE224C5E196FF381836C9E95DEEBB7D5
SHA256:BF933CCF86C55FC328E343B55DBF2E8EBD528E8A0A54F8F659CD0D4B4F261F26
3976WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3976.35616\CITACION DEMANDA JUDICIAL\intl.dllexecutable
MD5:D1A21E38593FDDBA8E51ED6BF7ACF404
SHA256:6A64C9CB0904ED48CE0D5CDA137FCFD6DD463D84681436CA647B195AA2038A7E
3976WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3976.35616\CITACION DEMANDA JUDICIAL\peso.htmlbinary
MD5:4CDCB5684BF00CD2CF2ADDDF97E3E982
SHA256:B9D6261970BFDE1E5E8830C0C6F03286B064732F4C0C9FA9E2BDE8EFAA79ACB4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted

DNS requests

No data

Threats

No threats detected
No debug info