File name:

setup.exe

Full analysis: https://app.any.run/tasks/76b44032-d1f0-41e7-ae91-ddfbee01773e
Verdict: Malicious activity
Threats:

HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses.

Analysis date: February 02, 2025, 16:03:04
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
hijackloader
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

AEF1BEFBD1F2A1AD975A7088CDBD3377

SHA1:

DB92309A4E469815F71733E1B18D192D62B66950

SHA256:

1A48104AF995969DC905ED282E3AE1950E056E9B7D479E29E81B15A8AEE26F86

SSDEEP:

49152:n6dL+pHkE4MWWAA68/ZtpX/HpPsZ4rXYqbcwZ+X/Sh5aUqgbl869en:A+CE4LlA6OX/pPsZ4rXYCErL89e

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • setup.exe (PID: 1296)
    • LUMMA has been detected (YARA)

      • setup.exe (PID: 1296)
    • HIJACKLOADER has been detected (YARA)

      • iTunesHelper.exe (PID: 1732)
    • Known privilege escalation attack

      • dllhost.exe (PID: 5472)
    • LUMMA mutex has been found

      • setup.exe (PID: 1296)
    • Actions looks like stealing of personal data

      • setup.exe (PID: 1296)
  • SUSPICIOUS

    • Searches for installed software

      • setup.exe (PID: 1296)
    • The process drops C-runtime libraries

      • setup.exe (PID: 1296)
      • iTunesHelper.exe (PID: 2676)
    • Process drops legitimate windows executable

      • setup.exe (PID: 1296)
      • iTunesHelper.exe (PID: 2676)
    • There is functionality for taking screenshot (YARA)

      • setup.exe (PID: 1296)
    • Executable content was dropped or overwritten

      • setup.exe (PID: 1296)
      • iTunesHelper.exe (PID: 2676)
      • more.com (PID: 2412)
    • Starts application with an unusual extension

      • iTunesHelper.exe (PID: 1732)
      • iTunesHelper.exe (PID: 3552)
    • Starts itself from another location

      • iTunesHelper.exe (PID: 2676)
    • Connects to unusual port

      • updater.exe (PID: 5856)
  • INFO

    • The sample compiled with english language support

      • setup.exe (PID: 1296)
      • iTunesHelper.exe (PID: 2676)
      • more.com (PID: 2412)
    • Reads the computer name

      • setup.exe (PID: 1296)
      • iTunesHelper.exe (PID: 2676)
      • iTunesHelper.exe (PID: 1732)
      • more.com (PID: 520)
      • iTunesHelper.exe (PID: 3552)
      • updater.exe (PID: 5856)
      • more.com (PID: 2412)
    • Checks supported languages

      • iTunesHelper.exe (PID: 2676)
      • setup.exe (PID: 1296)
      • more.com (PID: 520)
      • iTunesHelper.exe (PID: 1732)
      • iTunesHelper.exe (PID: 3552)
      • more.com (PID: 2412)
      • updater.exe (PID: 5856)
    • Creates files in the program directory

      • iTunesHelper.exe (PID: 2676)
    • Reads the software policy settings

      • setup.exe (PID: 1296)
      • updater.exe (PID: 5856)
    • Create files in a temporary directory

      • setup.exe (PID: 1296)
      • iTunesHelper.exe (PID: 1732)
      • more.com (PID: 2412)
      • iTunesHelper.exe (PID: 3552)
    • Reads the machine GUID from the registry

      • more.com (PID: 520)
      • updater.exe (PID: 5856)
    • Reads security settings of Internet Explorer

      • dllhost.exe (PID: 5472)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:10:09 10:06:00+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 870912
InitializedDataSize: 79756800
UninitializedDataSize: -
EntryPoint: 0xa122d
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 2.2.0.1
ProductVersionNumber: 2.2.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
CompanyName: Starock Software, Inc
FileDescription: Stardock Groupy
FileVersion: 2.2.0.1
InternalName: GroupyCt.exe
LegalCopyright: Copyright (C) 2024 Stardock Software, Inc
OriginalFileName: GroupyCt.exe
ProductName: Stardock Groupy
ProductVersion: 2.2.0.1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
11
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #LUMMA setup.exe svchost.exe ituneshelper.exe #HIJACKLOADER ituneshelper.exe no specs more.com no specs conhost.exe no specs CMSTPLUA ituneshelper.exe no specs more.com conhost.exe no specs updater.exe

Process information

PID
CMD
Path
Indicators
Parent process
520C:\WINDOWS\SysWOW64\more.comC:\Windows\SysWOW64\more.comiTunesHelper.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
More Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\more.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1296"C:\Users\admin\AppData\Local\Temp\setup.exe" C:\Users\admin\AppData\Local\Temp\setup.exe
explorer.exe
User:
admin
Company:
Starock Software, Inc
Integrity Level:
MEDIUM
Description:
Stardock Groupy
Exit code:
0
Version:
2.2.0.1
Modules
Images
c:\users\admin\appdata\local\temp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
1732C:\ProgramData\MsiSleuth\iTunesHelper.exeC:\ProgramData\MsiSleuth\iTunesHelper.exe
iTunesHelper.exe
User:
admin
Company:
Apple Inc.
Integrity Level:
MEDIUM
Description:
iTunesHelper
Exit code:
1
Version:
12.12.9.4
Modules
Images
c:\programdata\msisleuth\ituneshelper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2412C:\WINDOWS\SysWOW64\more.comC:\Windows\SysWOW64\more.com
iTunesHelper.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
More Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\more.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2676"C:\Users\admin\AppData\Local\Temp\O55LCK6E73IC1W1VKHVRMYJ\iTunesHelper.exe"C:\Users\admin\AppData\Local\Temp\O55LCK6E73IC1W1VKHVRMYJ\iTunesHelper.exe
setup.exe
User:
admin
Company:
Apple Inc.
Integrity Level:
MEDIUM
Description:
iTunesHelper
Exit code:
0
Version:
12.12.9.4
Modules
Images
c:\users\admin\appdata\local\temp\o55lck6e73ic1w1vkhvrmyj\ituneshelper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
3128\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemore.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3552"C:\ProgramData\MsiSleuth\iTunesHelper.exe" C:\ProgramData\MsiSleuth\iTunesHelper.exedllhost.exe
User:
admin
Company:
Apple Inc.
Integrity Level:
HIGH
Description:
iTunesHelper
Exit code:
1
Version:
12.12.9.4
Modules
Images
c:\programdata\msisleuth\ituneshelper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\programdata\msisleuth\corefoundation.dll
c:\windows\system32\ucrtbase.dll
3744\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemore.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5472C:\WINDOWS\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}C:\Windows\SysWOW64\dllhost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ucrtbase.dll
c:\windows\syswow64\combase.dll
Total events
4 421
Read events
4 420
Write events
1
Delete events
0

Modification events

(PID) Process:(5472) dllhost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
Executable files
21
Suspicious files
2
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1296setup.exeC:\Users\admin\AppData\Local\Temp\O55LCK6E73IC1W1VKHVRMYJ\protozoa.m4a
MD5:
SHA256:
1296setup.exeC:\Users\admin\AppData\Local\Temp\O55LCK6E73IC1W1VKHVRMYJ\CoreFoundation.dll
MD5:
SHA256:
2676iTunesHelper.exeC:\ProgramData\MsiSleuth\CoreFoundation.dll
MD5:
SHA256:
1296setup.exeC:\Users\admin\AppData\Local\Temp\O55LCK6E73IC1W1VKHVRMYJ\vcruntime140_1.dllexecutable
MD5:CF0A1C4776FFE23ADA5E570FC36E39FE
SHA256:6FD366A691ED68430BCD0A3DE3D8D19A0CB2102952BFC140BBEF4354ED082C47
1296setup.exeC:\Users\admin\AppData\Local\Temp\O55LCK6E73IC1W1VKHVRMYJ\icudt62.dllexecutable
MD5:0DCCB0E8841ECE3D46B73D075D8FDF04
SHA256:A40A13C16A1FDBE2540CEA1F2C04ED128B0BC9BAA8C0550C34421B80515B82A4
1296setup.exeC:\Users\admin\AppData\Local\Temp\O55LCK6E73IC1W1VKHVRMYJ\signore.mkvbinary
MD5:904A594A59455B6F2D989FB74AAF50E1
SHA256:B7D814A774BE4BACE56B4518C88360C87CBC73F807FC43BFB7474ABCD16CE4F0
2676iTunesHelper.exeC:\ProgramData\MsiSleuth\protozoa.m4a
MD5:
SHA256:
1732iTunesHelper.exeC:\Users\admin\AppData\Local\Temp\189b6412
MD5:
SHA256:
3552iTunesHelper.exeC:\Users\admin\AppData\Local\Temp\1e4404cf
MD5:
SHA256:
2412more.comC:\Users\admin\AppData\Local\Temp\kvovdogewmtw
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
33
DNS requests
17
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5748
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5748
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
716
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2736
svchost.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3976
svchost.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1296
setup.exe
104.21.80.1:443
culinarydelighytts.top
CLOUDFLARENET
unknown
2736
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1296
setup.exe
188.114.97.3:443
u2.servicelandingkaraoke.shop
CLOUDFLARENET
NL
malicious
1176
svchost.exe
40.126.32.133:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1076
svchost.exe
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
culinarydelighytts.top
  • 104.21.80.1
  • 104.21.96.1
  • 104.21.112.1
  • 104.21.32.1
  • 104.21.64.1
  • 104.21.16.1
  • 104.21.48.1
unknown
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
cegu.shop
unknown
u2.servicelandingkaraoke.shop
  • 188.114.97.3
  • 188.114.96.3
malicious
login.live.com
  • 40.126.32.133
  • 40.126.32.136
  • 20.190.160.130
  • 20.190.160.17
  • 20.190.160.131
  • 40.126.32.76
  • 20.190.160.5
  • 40.126.32.140
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

PID
Process
Class
Message
2192
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
2192
svchost.exe
Potentially Bad Traffic
SUSPICIOUS [ANY.RUN] Suspected Malicious domain by CrossDomain ( .servicelandingkaraoke .shop)
No debug info