| File name: | UZWQKZQO.msi |
| Full analysis: | https://app.any.run/tasks/e260461a-9ead-440a-b33b-8d85efe84087 |
| Verdict: | Malicious activity |
| Threats: | HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses. |
| Analysis date: | April 18, 2025, 11:45:25 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-msi |
| File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: Installation Database, Comments: Contact: Your local administrator, Keywords: Installer,MSI,Database, Subject: Blank Project Template, Author: InstallShield, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2021 - Premier Edition with Virtualization Pack 27, Last Saved Time/Date: Wed Apr 16 23:40:31 2025, Create Time/Date: Wed Apr 16 23:40:31 2025, Last Printed: Wed Apr 16 23:40:31 2025, Revision Number: {232C0583-F062-4AF1-8D0B-46C5034E7530}, Code page: 1252, Template: Intel;1033 |
| MD5: | 741A1E78AA32FBA1A21FA16C24116301 |
| SHA1: | 1520A6849ADF7B89CAF4DC3DE471DA8483FD7B0F |
| SHA256: | 329F64BB5413CB69ED61DCDCAFD3686782D8AC163301DE64FF60BA158F35B5C9 |
| SSDEEP: | 98304:U6n1cLVbtJACD3H4o7mMyIc0nME+3q323x327D1icyZ94VV2njyofgR3XfBQ53vF:UYMt3CS1yXsZnQtx |
| .mst | | | Windows SDK Setup Transform Script (60.2) |
|---|---|---|
| .msi | | | Microsoft Installer (100) |
| Characters: | - |
|---|---|
| LastModifiedBy: | InstallShield |
| Words: | - |
| Title: | Installation Database |
| Comments: | Contact: Your local administrator |
| Keywords: | Installer,MSI,Database |
| Subject: | Blank Project Template |
| Author: | InstallShield |
| Security: | Password protected |
| Pages: | 200 |
| Software: | InstallShield? 2021 - Premier Edition with Virtualization Pack 27 |
| ModifyDate: | 2025:04:16 23:40:31 |
| CreateDate: | 2025:04:16 23:40:31 |
| LastPrinted: | 2025:04:16 23:40:31 |
| RevisionNumber: | {232C0583-F062-4AF1-8D0B-46C5034E7530} |
| CodePage: | Windows Latin 1 (Western European) |
| Template: | Intel;1033 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1088 | "C:\Windows\System32\msiexec.exe" /i C:\Users\admin\AppData\Local\Temp\UZWQKZQO.msi | C:\Windows\System32\msiexec.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows® installer Version: 5.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1180 | C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{9EAE3CE2-33D7-4EE8-A138-77570FB3544C} | C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exe | — | msiexec.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1660 | C:\Windows\syswow64\MsiExec.exe -Embedding 218DF575CC22474B082344A8F3FA01AF C | C:\Windows\SysWOW64\msiexec.exe | msiexec.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows® installer Version: 5.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2108 | C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8F5188C5-88FF-4A67-BFA0-DFFD9CCFE69C} | C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exe | — | msiexec.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2108 | C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B8ACF381-56FB-49FC-959C-742563020973} | C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exe | — | msiexec.exe | |||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 2108 | C:\ProgramData\Ultraupload_v4\Deco_I.exe | C:\ProgramData\Ultraupload_v4\Deco_I.exe | — | — | |||||||||||
User: admin Company: TiVo Inc. Integrity Level: MEDIUM Description: TiVo Windows Media Library Publisher Version: 2.8.3 | |||||||||||||||
| 2236 | C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{7A55C37C-925B-4466-A2B8-FDD6E3D51A9D} | C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exe | — | msiexec.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3268 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4120 | C:\WINDOWS\SysWOW64\cmd.exe | C:\Windows\SysWOW64\cmd.exe | — | Deco_I.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4244 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (4448) certutil.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Application10 |
| Operation: | write | Name: | b |
Value: 2233613139356165352D346662632D386330342D363634352D61383832623839386262346122 | |||
| (PID) Process: | (4448) certutil.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Application10 |
| Operation: | write | Name: | c |
Value: 7B2231223A22614E6B76567978355255424D39774434593850695A79506A4E75343D222C2230223A7B2232223A22486578442F42774233447575747A734B54767779414176446F30733D222C2230223A747275652C2231223A5B7B2230223A2231222C2231223A225E5C5C732A286263317C5B31335D295B612D7A412D484A2D4E502D5A302D395D7B32362C33357D5C5C732A24222C2232223A226263317137636B6177766A7A657574616A6E36366178613272657370357333377676736B3973616C6B38227D2C7B2230223A2232222C2231223A225E5C5C732A6263315B612D7A412D484A2D4E502D5A302D395D7B33352C34317D5C5C732A24222C2232223A226263317137636B6177766A7A657574616A6E36366178613272657370357333377676736B3973616C6B38227D2C7B2230223A2233222C2231223A225E5C5C732A345B302D3941425D5B312D39412D484A2D4E502D5A612D6B6D2D7A5D7B39337D5C5C732A24222C2232223A22344244726E613269555250647244677258513938324E434A6D67666D5778754B5A4553345770747951704836394C4D67686D677247764C52336D67577836423547694D437A37576A78614B7A68624D5131376F626B4D50473557746E6E6A63227D2C7B2230223A2234222C2231223A225E5C5C732A475B302D39612D7A412D5A5D7B35357D5C5C732A24227D2C7B2230223A2235222C2231223A225E5C5C732A725B302D39612D7A412D5A5D7B32342C33347D5C5C732A24222C2232223A227266726B5A6862673173547234477748595857367077436554763577475877446575227D2C7B2230223A2236222C2231223A225E5C5C732A283F3A4C7C4D7C6C746331295B612D7A412D5A302D395D7B32362C33357D5C5C732A24227D2C7B2230223A2237222C2231223A225E5C5C732A6C7463315B612D7A302D395D7B33392C35397D5C5C732A24222C2232223A226C7463317175786A36686A6A64647871617533747071366339706530726570746832716435323539793732227D2C7B2230223A2238222C2231223A225E5C5C732A415B302D39612D7A412D5A5D7B33337D5C5C732A24227D2C7B2230223A2239222C2231223A225E5C5C732A28626974636F696E636173683A293F2828717C70295B612D7A302D395D7B34317D7C28317C33295B612D7A412D5A302D395D7B32362C33357D295C5C732A24227D2C7B2230223A223130222C2231223A225E5C5C732A585B312D39412D484A2D4E502D5A612D6B6D2D7A5D7B33337D5C5C732A24227D2C7B2230223A223131222C2231223A225E5C5C732A447B317D5B352D39412D484A2D4E502D555D7B317D5B312D39412D484A2D4E502D5A612D6B6D2D7A5D7B33327D5C5C732A24227D2C7B2230223A223132222C2231223A225E5C5C732A626E625B612D7A412D5A302D395D7B33397D5C5C732A24227D2C7B2230223A223133222C2231223A225E5C5C732A30785B612D66412D46302D395D7B34307D5C5C732A24222C2232223A22307837336537346634393465386633353962393061616363323265313136346237373166336534373739227D2C7B2230223A223134222C2231223A225E5C5C732A545B612D7A412D5A302D395D7B32382C33337D5C5C732A24222C2232223A2254435978745636483735696A6331565632676854387365514A4445716A4D4B483974227D2C7B2230223A223135222C2231223A225E5C5C732A74315B302D39412D7A5D7B33337D5C5C732A24227D5D7D7D | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2108 | Deco_I.exe | C:\Users\admin\AppData\Local\Temp\EB9C8D0.tmp | — | |
MD5:— | SHA256:— | |||
| 1660 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\{142E3B50-832B-4288-A02C-44FE6C0F48FC}\StlpMt45.dll | executable | |
MD5:94BEB60D54D38E532619DCB5DD723FEA | SHA256:3868CE9BD2CF15F171655448060768C23A61EC366454E1EAA40DFE6DA6F92041 | |||
| 1660 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\{142E3B50-832B-4288-A02C-44FE6C0F48FC}\Koorzut.tnh | binary | |
MD5:B8147F487B100DA3381A8E718E406A89 | SHA256:AED6D26132F00714360BFF26A46CF1545CD8A31D7FCA4CC68B8E917563B17F99 | |||
| 1660 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\{142E3B50-832B-4288-A02C-44FE6C0F48FC}\Fultaischoot.sfj | binary | |
MD5:C600455C9EB324B187C41B700750A21C | SHA256:D45813250761E7E40C3E3CD695FAFCB371659D83F0C0A172510DB7C6C42E5B4E | |||
| 1088 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\MSIBF3B.tmp | executable | |
MD5:A0E940A3D3C1523416675125E3B0C07E | SHA256:B8FA7AA425E4084EA3721780A13D11E08B8D53D1C5414B73F22FAECA1BFD314F | |||
| 1660 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\{142E3B50-832B-4288-A02C-44FE6C0F48FC}\CC3260MT.dll | executable | |
MD5:991FCD00637921278FC3EEAD84F2970E | SHA256:96E894B0DD2E0BE7E53BB33371265EB4CE08DE27BF331C36D2AA2632F36C77BF | |||
| 1660 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\setup.inx | binary | |
MD5:4C660D85D001FD1BABD7FBFC8BFF2BCF | SHA256:A35FCAD9765F8C3F05A2BFF4A6EAD46B35EF36EFD07F6D8B895866B3C23D1EB1 | |||
| 1660 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\{142E3B50-832B-4288-A02C-44FE6C0F48FC}\Rtl60.bpl | executable | |
MD5:F5F25B8106DEDAA22A053E4CBA2CD9FC | SHA256:AA4A46B7921F225910414422EC7FF5533CD5FAD87E2FE2CCA248F25EB9899480 | |||
| 1660 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISRT.dll | executable | |
MD5:8AF02BF8E358E11CAEC4F2E7884B43CC | SHA256:58A724D23C63387A2DDA27CCFDBC8CA87FD4DB671BEA8BB636247667F6A5A11E | |||
| 1088 | msiexec.exe | C:\Users\admin\AppData\Local\Temp\MSIC21A.tmp | executable | |
MD5:86A383C8482F0B1C68B154FDF517E46C | SHA256:B856BA4A9BBD151D8DC1E836EFE80F303DE1F322BC1180E722D065825790BE96 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.48.23.156:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
4448 | certutil.exe | GET | 101 | 104.21.53.74:80 | http://games1-server.cfd/c | unknown | — | — | unknown |
1532 | SIHClient.exe | GET | 200 | 2.16.253.202:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
1532 | SIHClient.exe | GET | 200 | 2.16.253.202:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.48.23.156:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 40.126.32.140:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6544 | svchost.exe | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
2104 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1532 | SIHClient.exe | 4.175.87.197:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
1532 | SIHClient.exe | 2.16.253.202:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
games1-server.cfd |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
4448 | certutil.exe | A Network Trojan was detected | ET MALWARE DeerStealer Websocket Initial Request |