File name:

66055eb5779265037160e80546c6de3d

Full analysis: https://app.any.run/tasks/80fbd24d-8448-4c6b-9002-8208cec46df2
Verdict: Malicious activity
Threats:

HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses.

Analysis date: December 04, 2023, 04:00:39
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
hijackloader
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

66055EB5779265037160E80546C6DE3D

SHA1:

49D3AC6F095AF87C2940B16F52F1C72B81646B0D

SHA256:

6FC7BFC186B8207BCB43A0B012CF8AAA20B9C59BA3582EE48635044ABAA1598E

SSDEEP:

98304:rR0kqJ1Q7PHGvNSiHqEG9OJHmJEXmZeUpsxgXU+qAoSgVr9zsCqxCL9F5PQ68ccS:WNJybAt5

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • 66055eb5779265037160e80546c6de3d.exe (PID: 2128)
    • HIJACKLOADER has been detected (YARA)

      • cmd.exe (PID: 2216)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • VCDDaemon.exe (PID: 1228)
  • INFO

    • Reads the computer name

      • 66055eb5779265037160e80546c6de3d.exe (PID: 2128)
      • VCDDaemon.exe (PID: 1228)
    • Checks supported languages

      • 66055eb5779265037160e80546c6de3d.exe (PID: 2128)
      • VCDDaemon.exe (PID: 1228)
    • Manual execution by a user

      • VCDDaemon.exe (PID: 1228)
    • Create files in a temporary directory

      • VCDDaemon.exe (PID: 1228)
    • Creates files or folders in the user directory

      • 66055eb5779265037160e80546c6de3d.exe (PID: 2128)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (33)
.exe | Win32 Executable MS Visual C++ (generic) (23.9)
.exe | Win64 Executable (generic) (21.2)
.scr | Windows screen saver (10)
.dll | Win32 Dynamic Link Library (generic) (5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:10:07 16:54:17+02:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 380928
InitializedDataSize: 2682880
UninitializedDataSize: -
EntryPoint: 0x29683
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 23.4.39.9
ProductVersionNumber: 23.4.39.9
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Intel
FileDescription: Intel® Driver & Support Assistant
FileVersion: 23.4.39.9
InternalName: setup
LegalCopyright: Copyright © Intel Corporation. All rights reserved.
OriginalFileName: Intel-Driver-and-Support-Assistant-Installer.exe
ProductName: Intel® Driver & Support Assistant
ProductVersion: 23.4.39.9
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
4
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 66055eb5779265037160e80546c6de3d.exe no specs vcddaemon.exe no specs #HIJACKLOADER cmd.exe no specs msbuild.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1164C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MSBuild.exe
Exit code:
0
Version:
4.8.3761.0 built by: NET48REL1
1228C:\Users\admin\AppData\Roaming\msdt\VCDDaemon.exeC:\Users\admin\AppData\Roaming\msdt\VCDDaemon.exeexplorer.exe
User:
admin
Company:
Elaborate Bytes AG
Integrity Level:
MEDIUM
Description:
Virtual CloneDrive Daemon
Exit code:
1
Version:
5, 4, 5, 1
Modules
Images
c:\users\admin\appdata\roaming\msdt\vcddaemon.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2128"C:\Users\admin\AppData\Local\Temp\66055eb5779265037160e80546c6de3d.exe" C:\Users\admin\AppData\Local\Temp\66055eb5779265037160e80546c6de3d.exeexplorer.exe
User:
admin
Company:
Intel
Integrity Level:
MEDIUM
Description:
Intel® Driver & Support Assistant
Exit code:
0
Version:
23.4.39.9
Modules
Images
c:\users\admin\appdata\local\temp\66055eb5779265037160e80546c6de3d.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2216C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe
VCDDaemon.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
3
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
Total events
772
Read events
772
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
3
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2216cmd.exeC:\Users\admin\AppData\Local\Temp\ppxno
MD5:
SHA256:
212866055eb5779265037160e80546c6de3d.exeC:\Users\admin\AppData\Roaming\msdt\poppet.epsbinary
MD5:D0A7FAE3A0FDAE716C76300ADF70B2BB
SHA256:F1D7EB55FCAF9A6F71316559E33D40682F47CE3C0B1C1FF4908C71CA1015C9ED
212866055eb5779265037160e80546c6de3d.exeC:\Users\admin\AppData\Roaming\msdt\VCDDaemon.exeexecutable
MD5:3BD79A1F6D2EA0FDDEA3F8914B2A6A0C
SHA256:332E6806EFF846A2E6D0DC04A70D3503855DABFA83E6EC27F37E2D9103E80E51
1228VCDDaemon.exeC:\Users\admin\AppData\Local\Temp\de0cb0fcbinary
MD5:1AFB8D6945908B6479E3DCB21D4CE392
SHA256:FA90867D132BFF2D60D9A43503C452EB73E2C001C88FCFE6DD7D79F1B17F4BA3
212866055eb5779265037160e80546c6de3d.exeC:\Users\admin\AppData\Roaming\msdt\ElbyVCD.dllexecutable
MD5:AA490720CD3C26EFF6E6FBE9601673A5
SHA256:349B4DFA1E93144B010AFFBA926663264288A5CFCB7B305320F466B2551B93DF
2216cmd.exeC:\Users\admin\AppData\Local\Temp\mcxcxmuefvpbinary
MD5:233E00EF722E7687DE042945F3BB2176
SHA256:295ED86E68FA0EFB9427438E9353CD66C5825467CD3057DAA57EEE2C53C905F9
212866055eb5779265037160e80546c6de3d.exeC:\Users\admin\AppData\Roaming\msdt\ElbyCDIO.dllexecutable
MD5:5ABCD9F2323D7E4AC51728CC32F17CC6
SHA256:CFF34DFD4251C22458F73674E6D2E1CA4C38A2CA7D69491DB291E89C929D823B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
unknown
1956
svchost.exe
239.255.255.250:1900
whitelisted
324
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info