File name: | !#setUp_2040_P@s$w0rd_!!.zip |
Full analysis: | https://app.any.run/tasks/ea65e9e4-7ccc-4791-8ddd-18764c525ccf |
Verdict: | Malicious activity |
Threats: | HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses. |
Analysis date: | July 22, 2024, 16:57:05 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/zip |
File info: | Zip archive data, at least v1.0 to extract, compression method=store |
MD5: | 646553B78767B1718025DD9238E99B42 |
SHA1: | 99796146E4743878185194F1B563B689148F87F6 |
SHA256: | 6DF0C27C9B7346FCFD227ACE641A6BBC9F1A2A86E19A1F8C82813C55094CDCD2 |
SSDEEP: | 98304:u4CAthgN1U6x4isNzg0txdSY0FmLVSDRzCpYNOmkjf6iXvttvRsW27Ko+i7s7H0p:CZML8tVmRFAZCOD |
.zip | | | ZIP compressed archive (100) |
---|
ZipRequiredVersion: | 10 |
---|---|
ZipBitFlag: | - |
ZipCompression: | None |
ZipModifyDate: | 2024:07:22 18:49:30 |
ZipCRC: | 0x00000000 |
ZipCompressedSize: | - |
ZipUncompressedSize: | - |
ZipFileName: | !#setUp_2040_P@s$w0rd_!!/ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
836 | powershell -exec bypass -f "C:\Users\admin\AppData\Local\Temp\YV3YOLMONVK25RFALZ.ps1" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | PeLoadDrv.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1048 | tasklist | C:\Windows\SysWOW64\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1084 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1148 | tasklist | C:\Windows\SysWOW64\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1244 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\TradeToken Elite Innovations Inc\TradeTokenElite.js" | C:\Windows\System32\wscript.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
1360 | "C:\Users\admin\AppData\Local\TradeToken Elite Innovations Inc\TradeTokenElite.pif" "C:\Users\admin\AppData\Local\TradeToken Elite Innovations Inc\r" | C:\Users\admin\AppData\Local\TradeToken Elite Innovations Inc\TradeTokenElite.pif | — | wscript.exe | |||||||||||
User: admin Company: AutoIt Team Integrity Level: MEDIUM Description: AutoIt v3 Script Exit code: 0 Version: 3, 3, 14, 4 Modules
| |||||||||||||||
1836 | findstr /V "DEUTSCHCOMEDYCONDITIONSMINDS" Clips | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Find String (QGREP) Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
2348 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | more.com | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
2368 | cmd /c md 484309 | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
2476 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
|
(PID) Process: | (3336) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtBMP |
Value: | |||
(PID) Process: | (3336) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtIcon |
Value: | |||
(PID) Process: | (3336) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip | |||
(PID) Process: | (3336) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\!#setUp_2040_P@s$w0rd_!!.zip | |||
(PID) Process: | (3336) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | name |
Value: 120 | |||
(PID) Process: | (3336) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | size |
Value: 80 | |||
(PID) Process: | (3336) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | type |
Value: 120 | |||
(PID) Process: | (3336) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | mtime |
Value: 100 | |||
(PID) Process: | (3336) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin |
Operation: | write | Name: | Placement |
Value: 2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000 | |||
(PID) Process: | (3336) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\General |
Operation: | write | Name: | LastFolder |
Value: C:\Users\admin\AppData\Local\Temp |
PID | Process | Filename | Type | |
---|---|---|---|---|
4748 | more.com | C:\Users\admin\AppData\Local\Temp\titphou | — | |
MD5:— | SHA256:— | |||
3336 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa3336.25070\!#setUp_2040_P@s$w0rd_!!\plugins\StartupHelper | executable | |
MD5:14934CACA84D5FE0288F27EFB31DCBF8 | SHA256:7FA86147035627BAE39576BCBE619D045E94A48C4DB8CA131968C20BB4DE4A36 | |||
3336 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa3336.25070\!#setUp_2040_P@s$w0rd_!!\libvlc.dll | executable | |
MD5:96214B94B796BFFC48D63289854AE5A2 | SHA256:528C416CFB4813EE5F1DA52743EF4ADB20043171230098B27E25D1DD90E3F288 | |||
3336 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa3336.25070\!#setUp_2040_P@s$w0rd_!!\plugins\lang-1049.dll | executable | |
MD5:0AC98A4BFC717523E344010A42C2F4BA | SHA256:68546336232AA2BE277711AFA7C1F08ECD5FCC92CC182F90459F0C61FB39507F | |||
3336 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa3336.25070\!#setUp_2040_P@s$w0rd_!!\libvlccore.dll | executable | |
MD5:E25413BB41C2F239FFDD3569F76E74B0 | SHA256:9126D9ABF91585456000FFFD9336478E91B9EA07ED2A25806A4E2E0437F96D29 | |||
3336 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa3336.25070\!#setUp_2040_P@s$w0rd_!!\cockboat.xml | binary | |
MD5:F1EEE8B3E3991DC9B33488A34BCA9CDF | SHA256:BD10FC128EEBF9B730E6842D32B6D7FD2432F1A02045C69C202D845BDC8FD1DC | |||
5576 | Setup.exe | C:\Users\admin\AppData\Local\Temp\c812c97f | binary | |
MD5:ADE91E8299BAEC30CCDCDF565D0C8EC4 | SHA256:D9DB4E18A12F6250716BD5B950E601F900E21620CD957C4FE13DBF6CF0D42D3A | |||
3336 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa3336.25070\!#setUp_2040_P@s$w0rd_!!\tak_deco_lib.dll | executable | |
MD5:402F61799F2C7C08DED975E09125A247 | SHA256:7D6C1029107DC81D9A96649908C546C55AFB3C9324F93E4271924FF2F8B0DB98 | |||
3336 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa3336.25070\!#setUp_2040_P@s$w0rd_!!\plugins\Microsoft.VisualStudio.VsWebProtocol | executable | |
MD5:91ACF072FE60B3EF9867FAEC1A7A8CB0 | SHA256:1F49ADC807A564E7C1ECF32F58074A1230A6FE4764E8F54CE7FFA8C2E880DCCA | |||
3336 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa3336.25070\!#setUp_2040_P@s$w0rd_!!\plugins\lang-1058.dll | executable | |
MD5:41C75E831A5571C3F72287794391A0E6 | SHA256:B3AD99AFDAEE3B9365E7A3FFCC44C2761E22A4F92DFF5E5EFDC52F6B08EA0105 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3148 | OfficeClickToRun.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
5440 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
5440 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
6012 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4140 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 2.16.110.193:443 | — | Akamai International B.V. | DE | unknown |
3952 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
— | — | 4.209.32.67:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1992 | slui.exe | 40.91.76.224:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5368 | SearchApp.exe | 2.16.110.193:443 | — | Akamai International B.V. | DE | unknown |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
arc.msn.com |
| whitelisted |
fd.api.iris.microsoft.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Not Suspicious Traffic | INFO [ANY.RUN] Azure Front Door domain observed in TLS SNI ( .azurefd .net) |