File name:

UZWQKZQO.msi

Full analysis: https://app.any.run/tasks/e260461a-9ead-440a-b33b-8d85efe84087
Verdict: Malicious activity
Threats:

HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses.

Analysis date: April 18, 2025, 11:45:25
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
generated-doc
hijackloader
loader
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: Installation Database, Comments: Contact: Your local administrator, Keywords: Installer,MSI,Database, Subject: Blank Project Template, Author: InstallShield, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2021 - Premier Edition with Virtualization Pack 27, Last Saved Time/Date: Wed Apr 16 23:40:31 2025, Create Time/Date: Wed Apr 16 23:40:31 2025, Last Printed: Wed Apr 16 23:40:31 2025, Revision Number: {232C0583-F062-4AF1-8D0B-46C5034E7530}, Code page: 1252, Template: Intel;1033
MD5:

741A1E78AA32FBA1A21FA16C24116301

SHA1:

1520A6849ADF7B89CAF4DC3DE471DA8483FD7B0F

SHA256:

329F64BB5413CB69ED61DCDCAFD3686782D8AC163301DE64FF60BA158F35B5C9

SSDEEP:

98304:U6n1cLVbtJACD3H4o7mMyIc0nME+3q323x327D1icyZ94VV2njyofgR3XfBQ53vF:UYMt3CS1yXsZnQtx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • ISBEW64.exe (PID: 6744)
      • ISBEW64.exe (PID: 1180)
      • ISBEW64.exe (PID: 2108)
      • ISBEW64.exe (PID: 7148)
      • ISBEW64.exe (PID: 4300)
      • ISBEW64.exe (PID: 5800)
      • ISBEW64.exe (PID: 2236)
      • ISBEW64.exe (PID: 5124)
      • ISBEW64.exe (PID: 7052)
      • ISBEW64.exe (PID: 2108)
    • HIJACKLOADER has been detected (YARA)

      • Deco_I.exe (PID: 2108)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • Deco_I.exe (PID: 2108)
  • INFO

    • An automatically generated document

      • msiexec.exe (PID: 1088)
    • Checks supported languages

      • msiexec.exe (PID: 6728)
      • msiexec.exe (PID: 1660)
      • ISBEW64.exe (PID: 6744)
      • ISBEW64.exe (PID: 1180)
      • ISBEW64.exe (PID: 2108)
      • ISBEW64.exe (PID: 7148)
      • ISBEW64.exe (PID: 4300)
      • ISBEW64.exe (PID: 2236)
      • ISBEW64.exe (PID: 5800)
      • ISBEW64.exe (PID: 5124)
      • ISBEW64.exe (PID: 2108)
      • ISBEW64.exe (PID: 7052)
    • Reads the computer name

      • msiexec.exe (PID: 1660)
      • msiexec.exe (PID: 6728)
      • ISBEW64.exe (PID: 6744)
      • ISBEW64.exe (PID: 1180)
      • ISBEW64.exe (PID: 2108)
      • ISBEW64.exe (PID: 7148)
      • ISBEW64.exe (PID: 5800)
      • ISBEW64.exe (PID: 4300)
      • ISBEW64.exe (PID: 5124)
      • ISBEW64.exe (PID: 2236)
      • ISBEW64.exe (PID: 2108)
      • ISBEW64.exe (PID: 7052)
    • The sample compiled with english language support

      • msiexec.exe (PID: 1088)
      • msiexec.exe (PID: 1660)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 1088)
      • msiexec.exe (PID: 1660)
    • Create files in a temporary directory

      • msiexec.exe (PID: 1660)
      • Deco_I.exe (PID: 2108)
    • Reads the software policy settings

      • slui.exe (PID: 3268)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.mst | Windows SDK Setup Transform Script (60.2)
.msi | Microsoft Installer (100)

EXIF

FlashPix

Characters: -
LastModifiedBy: InstallShield
Words: -
Title: Installation Database
Comments: Contact: Your local administrator
Keywords: Installer,MSI,Database
Subject: Blank Project Template
Author: InstallShield
Security: Password protected
Pages: 200
Software: InstallShield? 2021 - Premier Edition with Virtualization Pack 27
ModifyDate: 2025:04:16 23:40:31
CreateDate: 2025:04:16 23:40:31
LastPrinted: 2025:04:16 23:40:31
RevisionNumber: {232C0583-F062-4AF1-8D0B-46C5034E7530}
CodePage: Windows Latin 1 (Western European)
Template: Intel;1033
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
150
Monitored processes
20
Malicious processes
4
Suspicious processes
9

Behavior graph

Click at the process to see the details
start msiexec.exe msiexec.exe no specs sppextcomobj.exe no specs slui.exe msiexec.exe isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs deco_i.exe no specs certutil.exe cmd.exe no specs conhost.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1088"C:\Windows\System32\msiexec.exe" /i C:\Users\admin\AppData\Local\Temp\UZWQKZQO.msiC:\Windows\System32\msiexec.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1180C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{9EAE3CE2-33D7-4EE8-A138-77570FB3544C}C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exemsiexec.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\{21c96af3-eefe-4521-a638-380f49f65b9f}\isbew64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
1660C:\Windows\syswow64\MsiExec.exe -Embedding 218DF575CC22474B082344A8F3FA01AF CC:\Windows\SysWOW64\msiexec.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
2108C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8F5188C5-88FF-4A67-BFA0-DFFD9CCFE69C}C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exemsiexec.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\{21c96af3-eefe-4521-a638-380f49f65b9f}\isbew64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
2108C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B8ACF381-56FB-49FC-959C-742563020973}C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exemsiexec.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\{21c96af3-eefe-4521-a638-380f49f65b9f}\isbew64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
2108C:\ProgramData\Ultraupload_v4\Deco_I.exeC:\ProgramData\Ultraupload_v4\Deco_I.exe
User:
admin
Company:
TiVo Inc.
Integrity Level:
MEDIUM
Description:
TiVo Windows Media Library Publisher
Version:
2.8.3
2236C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{7A55C37C-925B-4466-A2B8-FDD6E3D51A9D}C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exemsiexec.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\{21c96af3-eefe-4521-a638-380f49f65b9f}\isbew64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
3268"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4120C:\WINDOWS\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exeDeco_I.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
4244\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
1 338
Read events
1 336
Write events
2
Delete events
0

Modification events

(PID) Process:(4448) certutil.exeKey:HKEY_CURRENT_USER\SOFTWARE\Application10
Operation:writeName:b
Value:
2233613139356165352D346662632D386330342D363634352D61383832623839386262346122
(PID) Process:(4448) certutil.exeKey:HKEY_CURRENT_USER\SOFTWARE\Application10
Operation:writeName:c
Value:
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
Executable files
11
Suspicious files
5
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2108Deco_I.exeC:\Users\admin\AppData\Local\Temp\EB9C8D0.tmp
MD5:
SHA256:
1660msiexec.exeC:\Users\admin\AppData\Local\Temp\{142E3B50-832B-4288-A02C-44FE6C0F48FC}\StlpMt45.dllexecutable
MD5:94BEB60D54D38E532619DCB5DD723FEA
SHA256:3868CE9BD2CF15F171655448060768C23A61EC366454E1EAA40DFE6DA6F92041
1660msiexec.exeC:\Users\admin\AppData\Local\Temp\{142E3B50-832B-4288-A02C-44FE6C0F48FC}\Koorzut.tnhbinary
MD5:B8147F487B100DA3381A8E718E406A89
SHA256:AED6D26132F00714360BFF26A46CF1545CD8A31D7FCA4CC68B8E917563B17F99
1660msiexec.exeC:\Users\admin\AppData\Local\Temp\{142E3B50-832B-4288-A02C-44FE6C0F48FC}\Fultaischoot.sfjbinary
MD5:C600455C9EB324B187C41B700750A21C
SHA256:D45813250761E7E40C3E3CD695FAFCB371659D83F0C0A172510DB7C6C42E5B4E
1088msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIBF3B.tmpexecutable
MD5:A0E940A3D3C1523416675125E3B0C07E
SHA256:B8FA7AA425E4084EA3721780A13D11E08B8D53D1C5414B73F22FAECA1BFD314F
1660msiexec.exeC:\Users\admin\AppData\Local\Temp\{142E3B50-832B-4288-A02C-44FE6C0F48FC}\CC3260MT.dllexecutable
MD5:991FCD00637921278FC3EEAD84F2970E
SHA256:96E894B0DD2E0BE7E53BB33371265EB4CE08DE27BF331C36D2AA2632F36C77BF
1660msiexec.exeC:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\setup.inxbinary
MD5:4C660D85D001FD1BABD7FBFC8BFF2BCF
SHA256:A35FCAD9765F8C3F05A2BFF4A6EAD46B35EF36EFD07F6D8B895866B3C23D1EB1
1660msiexec.exeC:\Users\admin\AppData\Local\Temp\{142E3B50-832B-4288-A02C-44FE6C0F48FC}\Rtl60.bplexecutable
MD5:F5F25B8106DEDAA22A053E4CBA2CD9FC
SHA256:AA4A46B7921F225910414422EC7FF5533CD5FAD87E2FE2CCA248F25EB9899480
1660msiexec.exeC:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISRT.dllexecutable
MD5:8AF02BF8E358E11CAEC4F2E7884B43CC
SHA256:58A724D23C63387A2DDA27CCFDBC8CA87FD4DB671BEA8BB636247667F6A5A11E
1088msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIC21A.tmpexecutable
MD5:86A383C8482F0B1C68B154FDF517E46C
SHA256:B856BA4A9BBD151D8DC1E836EFE80F303DE1F322BC1180E722D065825790BE96
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
20
DNS requests
15
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4448
certutil.exe
GET
101
104.21.53.74:80
http://games1-server.cfd/c
unknown
unknown
1532
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1532
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.140:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1532
SIHClient.exe
4.175.87.197:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1532
SIHClient.exe
2.16.253.202:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.32.140
  • 40.126.32.68
  • 40.126.32.136
  • 20.190.160.128
  • 20.190.160.2
  • 20.190.160.65
  • 40.126.32.76
  • 20.190.160.67
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
www.microsoft.com
  • 2.16.253.202
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
games1-server.cfd
  • 104.21.53.74
  • 172.67.210.97
unknown

Threats

PID
Process
Class
Message
4448
certutil.exe
A Network Trojan was detected
ET MALWARE DeerStealer Websocket Initial Request
No debug info