| File name: | mal.rar |
| Full analysis: | https://app.any.run/tasks/bfa70a1b-e2e8-4082-ba41-6f3a7d3ca3e7 |
| Verdict: | Malicious activity |
| Threats: | HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses. |
| Analysis date: | October 26, 2024, 12:18:38 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-rar |
| File info: | RAR archive data, v5 |
| MD5: | B760D9037315FB284810F2B5E19019D4 |
| SHA1: | 3A98BDD9C8B1D619EA26D701CB51B3CDAA0A40B7 |
| SHA256: | 0E2FDA8265343BD81BFDF4272918B120629807A5EE25960D535B28C6E5D6C1E9 |
| SSDEEP: | 98304:8vD6OVjDstK2hv/qSfN1Be4I50qoEhs2ce6gTEbPMP5yTwZc/4HslQJ7LSvplO1Y:40blbAWgeoqzIDz00q |
| .rar | | | RAR compressed archive (v5.0) (61.5) |
|---|---|---|
| .rar | | | RAR compressed archive (gen) (38.4) |
| FileVersion: | RAR v5 |
|---|---|
| CompressedSize: | 78098 |
| UncompressedSize: | 174496 |
| OperatingSystem: | Win32 |
| ArchivedFileName: | mal/AXE8SharedExpat.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1048 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | more.com | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1376 | "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exe" | C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exe | AutoIt3.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Update Version: 1.3.185.17 Modules
| |||||||||||||||
| 1712 | "C:\Users\admin\AppData\Local\Temp\9YMD2U8GKFLJ21712YCG.exe" | C:\Users\admin\AppData\Local\Temp\9YMD2U8GKFLJ21712YCG.exe | — | OpenWith.exe | |||||||||||
User: admin Company: Burnaware Integrity Level: MEDIUM Description: PDF Shaper Exit code: 0 Version: 14.3.0.0 Modules
| |||||||||||||||
| 2172 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2420 | "C:\Users\admin\AppData\Local\Temp\9YMD2U8GKFLJ21712YCG.exe" | C:\Users\admin\AppData\Local\Temp\9YMD2U8GKFLJ21712YCG.exe | — | dllhost.exe | |||||||||||
User: admin Company: Burnaware Integrity Level: HIGH Description: PDF Shaper Exit code: 1 Version: 14.3.0.0 Modules
| |||||||||||||||
| 3008 | C:\WINDOWS\SysWOW64\OpenWith.exe | C:\Windows\SysWOW64\OpenWith.exe | more.com | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Pick an app Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3276 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\mal.rar | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
| 3728 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | more.com | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3932 | C:\WINDOWS\SysWOW64\more.com | C:\Windows\SysWOW64\more.com | — | 9YMD2U8GKFLJ21712YCG.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: More Utility Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3948 | powershell -exec bypass -f "C:\Users\admin\AppData\Local\Temp\CRPS6QF7QGUK3924YXFLTWE3VA.ps1" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | OpenWith.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (3276) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip | |||
| (PID) Process: | (3276) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\mal.rar | |||
| (PID) Process: | (3276) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3276) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3276) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (3276) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (3276) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin |
| Operation: | write | Name: | Placement |
Value: 2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000 | |||
| (PID) Process: | (3276) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths |
| Operation: | write | Name: | name |
Value: 256 | |||
| (PID) Process: | (3276) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3276) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths |
| Operation: | write | Name: | psize |
Value: 80 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3276 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa3276.44035\mal\resources.pak | — | |
MD5:— | SHA256:— | |||
| 4236 | more.com | C:\Users\admin\AppData\Local\Temp\ljk | — | |
MD5:— | SHA256:— | |||
| 3276 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa3276.44035\mal\sqlite.dll | executable | |
MD5:67F929A6CD2A38849FFA7BDADD91FA36 | SHA256:446FD104092E55FEEA7DF2DCA8844CEE5508DB232EA9481FDE2B0A1584001F25 | |||
| 3276 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa3276.44035\mal\Setup.exe | executable | |
MD5:F778E9136AB0DB9DE9802A7043DE50A7 | SHA256:90803A583E9F693DE5E7B8A196832436F6F648B27FB82E55904C256F30CC8B3A | |||
| 3276 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa3276.44035\mal\msvcr90.dll | executable | |
MD5:11D49148A302DE4104DED6A92B78B0ED | SHA256:CEB0947D898BC2A55A50F092F5ED3F7BE64AC1CD4661022EEFD3EDD4029213B0 | |||
| 6336 | Setup.exe | C:\Users\admin\AppData\Roaming\mddwotmeguxy\AXE8SharedExpat.dll | executable | |
MD5:0CFB90C28768E26498834D780FBBD754 | SHA256:5B3434727CD6805870550C4912E23543D3F9B58A19D32C412B8978D1515E1229 | |||
| 3276 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa3276.44035\mal\nffnj | binary | |
MD5:6BF6ACDC3165729C52DC9C9E2B9A7C3F | SHA256:5281F149DE92A29FB633FBB5987536A23F7A8B758A73052F11C9BCD42CABE6B8 | |||
| 6336 | Setup.exe | C:\Users\admin\AppData\Roaming\mddwotmeguxy\BIB.dll | executable | |
MD5:759D71FC9442AB5A9B5749C0F6C0C263 | SHA256:109647F58E7E8386A4C025F2C8175A4D638E5C0E62768953390764010EA22A2E | |||
| 6336 | Setup.exe | C:\Users\admin\AppData\Roaming\mddwotmeguxy\sqlite.dll | executable | |
MD5:67F929A6CD2A38849FFA7BDADD91FA36 | SHA256:446FD104092E55FEEA7DF2DCA8844CEE5508DB232EA9481FDE2B0A1584001F25 | |||
| 3008 | OpenWith.exe | C:\Users\admin\AppData\Local\Temp\5ZPPZR\Ravine.cpl | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6944 | svchost.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6944 | svchost.exe | GET | 200 | 2.16.164.9:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
624 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
4360 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
7084 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
7084 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
2280 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
6944 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1248 | RUXIMICS.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5488 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
6944 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6944 | svchost.exe | 2.16.164.9:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
6944 | svchost.exe | 88.221.169.152:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5488 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4360 | SearchApp.exe | 104.126.37.184:443 | www.bing.com | Akamai International B.V. | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
th.bing.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2172 | svchost.exe | Domain Observed Used for C2 Detected | STEALER [ANY.RUN] Domain has been identified as part of Lumma Stealer's infrastructure (creative-habitat .shop) |
2172 | svchost.exe | Misc activity | ET INFO Pastebin Service Domain in DNS Lookup (rentry .co) |
3008 | OpenWith.exe | Misc activity | ET INFO Observed Pastebin Service Domain (rentry .co in TLS SNI) |