| File name: | 2ec43e78f3c28fb3dba7c9fc3d3a48a66e2ceee4ff360ca13404cbf1f0b73a89.exe |
| Full analysis: | https://app.any.run/tasks/80cc53e8-2790-45ae-8c66-e0a1e95e64cc |
| Verdict: | Malicious activity |
| Threats: | HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses. |
| Analysis date: | July 25, 2024, 18:30:25 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 9AB6880B493D9654733D6D4FAE0872C4 |
| SHA1: | 6A825737BB57A63D755FA68C2362721639587D2D |
| SHA256: | 2EC43E78F3C28FB3DBA7C9FC3D3A48A66E2CEEE4FF360CA13404CBF1F0B73A89 |
| SSDEEP: | 98304:ojJwV03KLCgO2yXJ3Bp/h8866XSW1yD02ttZ90mo8CKZPk4WgnJ1eAZPNOcRZacR:l22EdAc |
| .exe | | | InstallShield setup (45.2) |
|---|---|---|
| .exe | | | Win32 EXE PECompact compressed (generic) (43.6) |
| .exe | | | Win32 Executable (generic) (4.7) |
| .exe | | | Win16/32 Executable Delphi generic (2.1) |
| .exe | | | Generic Win/DOS Executable (2.1) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2024:03:11 09:19:17+00:00 |
| ImageFileCharacteristics: | Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 3019264 |
| InitializedDataSize: | 2093056 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x2e2888 |
| OSVersion: | 5 |
| ImageVersion: | - |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 7.0.6.5176 |
| ProductVersionNumber: | 7.0.6.5176 |
| FileFlagsMask: | 0x003f |
| FileFlags: | Private build |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Dynamic link library |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| FileDescription: | VirtualBox DHCP Server |
| InternalName: | VBoxNetDHCPHardened |
| OriginalFileName: | VBoxNetDHCP.exe |
| CompanyName: | Vektor T13 Technologies LLC. |
| FileVersion: | 7.0.6.155176 |
| LegalCopyright: | Copyright (C) 2018-2024 Vektor T13 Technologies LLC. |
| ProductName: | Antidetect 4 Patreon Premium Edition (January 2024 r.1) |
| ProductVersion: | 7.0.6.155176 |
| PrivateBuild: | Private build by User |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 188 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1504 | "C:\Users\admin\Desktop\2ec43e78f3c28fb3dba7c9fc3d3a48a66e2ceee4ff360ca13404cbf1f0b73a89.exe" | C:\Users\admin\Desktop\2ec43e78f3c28fb3dba7c9fc3d3a48a66e2ceee4ff360ca13404cbf1f0b73a89.exe | explorer.exe | ||||||||||||
User: admin Company: Vektor T13 Technologies LLC. Integrity Level: MEDIUM Description: VirtualBox DHCP Server Version: 7.0.6.155176 Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1504 | 2ec43e78f3c28fb3dba7c9fc3d3a48a66e2ceee4ff360ca13404cbf1f0b73a89.exe | C:\Users\admin\AppData\Local\Temp\c5e1ec17 | image | |
MD5:E5BFF4E4D03BAB5F606CF7F76D3C8086 | SHA256:4D4B01D97D0EB9FC777E8A7DA2D69A5E3BAF89491FAF68CE36C18FCD5AA0ACA4 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | — |
— | — | POST | 500 | 20.83.72.98:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | — |
— | — | POST | 200 | 20.42.65.88:443 | https://self.events.data.microsoft.com/OneCollector/1.0/ | unknown | binary | 9 b | — |
— | — | POST | 401 | 4.209.32.198:443 | https://licensing.mp.microsoft.com/v7.0/licenses/content | unknown | binary | 340 b | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3948 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6012 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3704 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4204 | svchost.exe | 4.208.221.206:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
— | — | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
6012 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
3948 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
4372 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Generic Protocol Command Decode | SURICATA HTTP Request unrecognized authorization method |