File name:

setup.exe

Full analysis: https://app.any.run/tasks/cb949432-46e2-4250-a818-024f0ab7452b
Verdict: Malicious activity
Threats:

HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses.

Analysis date: February 02, 2025, 12:59:26
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
lumma
hijackloader
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

992F7D23DF1C73FC1F8237CCC76356F6

SHA1:

F72A6DDC291966EB92FA63005EA9CD743DE02717

SHA256:

746EF1A45EA2ED7A5B871E7F59CCB4EE545E31A60BA00A076D6CE555B5DEACBF

SSDEEP:

98304:/XWUUIbs2WTNn5izRF6tDiogiMKpPsZ4rXYCWTOglHMOE6q9Xh0jibLxNMJSgs7z:Kn/6UmF1urXjW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LUMMA mutex has been found

      • setup.exe (PID: 6728)
    • Actions looks like stealing of personal data

      • setup.exe (PID: 6728)
    • Steals credentials from Web Browsers

      • setup.exe (PID: 6728)
    • LUMMA has been detected (YARA)

      • setup.exe (PID: 6728)
    • HIJACKLOADER has been detected (YARA)

      • iTunesHelper.exe (PID: 5472)
      • iTunesHelper.exe (PID: 3508)
    • Known privilege escalation attack

      • dllhost.exe (PID: 1684)
  • SUSPICIOUS

    • Searches for installed software

      • setup.exe (PID: 6728)
    • The process drops C-runtime libraries

      • setup.exe (PID: 6728)
      • iTunesHelper.exe (PID: 3220)
    • Executable content was dropped or overwritten

      • setup.exe (PID: 6728)
      • iTunesHelper.exe (PID: 3220)
      • more.com (PID: 6148)
    • Process drops legitimate windows executable

      • setup.exe (PID: 6728)
      • iTunesHelper.exe (PID: 3220)
    • Starts itself from another location

      • iTunesHelper.exe (PID: 3220)
    • Starts application with an unusual extension

      • iTunesHelper.exe (PID: 5472)
      • iTunesHelper.exe (PID: 3508)
    • Connects to unusual port

      • updater.exe (PID: 2928)
  • INFO

    • The sample compiled with english language support

      • setup.exe (PID: 6728)
      • iTunesHelper.exe (PID: 3220)
      • more.com (PID: 6148)
    • Checks supported languages

      • setup.exe (PID: 6728)
      • iTunesHelper.exe (PID: 3220)
      • more.com (PID: 5872)
      • iTunesHelper.exe (PID: 3508)
      • more.com (PID: 6148)
      • iTunesHelper.exe (PID: 5472)
      • updater.exe (PID: 2928)
    • Reads the computer name

      • setup.exe (PID: 6728)
      • iTunesHelper.exe (PID: 3220)
      • iTunesHelper.exe (PID: 3508)
      • more.com (PID: 5872)
      • iTunesHelper.exe (PID: 5472)
      • updater.exe (PID: 2928)
      • more.com (PID: 6148)
    • Reads the software policy settings

      • setup.exe (PID: 6728)
      • updater.exe (PID: 2928)
    • Create files in a temporary directory

      • setup.exe (PID: 6728)
      • iTunesHelper.exe (PID: 5472)
      • iTunesHelper.exe (PID: 3508)
      • more.com (PID: 6148)
    • Creates files in the program directory

      • iTunesHelper.exe (PID: 3220)
    • Reads security settings of Internet Explorer

      • dllhost.exe (PID: 1684)
    • Reads the machine GUID from the registry

      • more.com (PID: 5872)
      • updater.exe (PID: 2928)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (3.6)
.exe | Generic Win/DOS Executable (1.6)
.exe | DOS Executable Generic (1.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:10:09 10:16:11+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.16
CodeSize: 2074624
InitializedDataSize: 7549952
UninitializedDataSize: -
EntryPoint: 0x1c3f15
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 2.2.0.1
ProductVersionNumber: 2.2.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
CompanyName: Stardock Software
FileDescription: Stardock Groupy 2 Configuration Utility
FileVersion: 2.2.0.1
InternalName: GroupyConfig.exe
LegalCopyright: Copyright (C) 2024 Stardock Software, Inc
OriginalFileName: GroupyConfig.EXE
ProductName: Stardock Groupy 2
ProductVersion: 2.2.0.1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
11
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #LUMMA setup.exe svchost.exe ituneshelper.exe #HIJACKLOADER ituneshelper.exe no specs more.com no specs conhost.exe no specs CMSTPLUA #HIJACKLOADER ituneshelper.exe no specs more.com conhost.exe no specs updater.exe

Process information

PID
CMD
Path
Indicators
Parent process
1684C:\WINDOWS\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}C:\Windows\SysWOW64\dllhost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ucrtbase.dll
c:\windows\syswow64\combase.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2928C:\Users\admin\AppData\Local\Temp\updater.exeC:\Users\admin\AppData\Local\Temp\updater.exe
more.com
User:
admin
Company:
Caphyon
Integrity Level:
HIGH
Description:
updater 18.0
Version:
18.0
Modules
Images
c:\users\admin\appdata\local\temp\oardpoawo
c:\users\admin\appdata\local\temp\updater.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
3220"C:\Users\admin\AppData\Local\Temp\ZWB1F75QCOAJMMRT9G7KU\iTunesHelper.exe"C:\Users\admin\AppData\Local\Temp\ZWB1F75QCOAJMMRT9G7KU\iTunesHelper.exe
setup.exe
User:
admin
Company:
Apple Inc.
Integrity Level:
MEDIUM
Description:
iTunesHelper
Exit code:
0
Version:
12.12.9.4
Modules
Images
c:\users\admin\appdata\local\temp\zwb1f75qcoajmmrt9g7ku\ituneshelper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
3508"C:\ProgramData\MsiSleuth\iTunesHelper.exe" C:\ProgramData\MsiSleuth\iTunesHelper.exe
dllhost.exe
User:
admin
Company:
Apple Inc.
Integrity Level:
HIGH
Description:
iTunesHelper
Exit code:
1
Version:
12.12.9.4
Modules
Images
c:\programdata\msisleuth\ituneshelper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\programdata\msisleuth\corefoundation.dll
c:\windows\system32\ucrtbase.dll
4672\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemore.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5472C:\ProgramData\MsiSleuth\iTunesHelper.exeC:\ProgramData\MsiSleuth\iTunesHelper.exe
iTunesHelper.exe
User:
admin
Company:
Apple Inc.
Integrity Level:
MEDIUM
Description:
iTunesHelper
Exit code:
1
Version:
12.12.9.4
Modules
Images
c:\programdata\msisleuth\ituneshelper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
5872C:\WINDOWS\SysWOW64\more.comC:\Windows\SysWOW64\more.comiTunesHelper.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
More Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\more.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6148C:\WINDOWS\SysWOW64\more.comC:\Windows\SysWOW64\more.com
iTunesHelper.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
More Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\more.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6156\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemore.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
4 419
Read events
4 419
Write events
0
Delete events
0

Modification events

No data
Executable files
21
Suspicious files
2
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
6728setup.exeC:\Users\admin\AppData\Local\Temp\ZWB1F75QCOAJMMRT9G7KU\protozoa.m4a
MD5:
SHA256:
6728setup.exeC:\Users\admin\AppData\Local\Temp\ZWB1F75QCOAJMMRT9G7KU\CoreFoundation.dll
MD5:
SHA256:
3220iTunesHelper.exeC:\ProgramData\MsiSleuth\CoreFoundation.dll
MD5:
SHA256:
6728setup.exeC:\Users\admin\AppData\Local\Temp\ZWB1F75QCOAJMMRT9G7KU\vcruntime140.dllexecutable
MD5:49C96CECDA5C6C660A107D378FDFC3D4
SHA256:69320F278D90EFAAEB67E2A1B55E5B0543883125834C812C8D9C39676E0494FC
6728setup.exeC:\Users\admin\AppData\Local\Temp\ZWB1F75QCOAJMMRT9G7KU\msvcp140.dllexecutable
MD5:1BA6D1CF0508775096F9E121A24E5863
SHA256:74892D9B4028C05DEBAF0B9B5D9DC6D22F7956FA7D7EEE00C681318C26792823
6728setup.exeC:\Users\admin\AppData\Local\Temp\ZWB1F75QCOAJMMRT9G7KU\libicuin.dllexecutable
MD5:87E2273BF7E052EC5B8ED96DFCA5D5EA
SHA256:09D99E34E29B86E46633EF6E9E6EB6915EB2CCC92F6DD34B39CF459DFF77040F
3220iTunesHelper.exeC:\ProgramData\MsiSleuth\protozoa.m4a
MD5:
SHA256:
5472iTunesHelper.exeC:\Users\admin\AppData\Local\Temp\1970cde2
MD5:
SHA256:
3508iTunesHelper.exeC:\Users\admin\AppData\Local\Temp\1ea6c1a2
MD5:
SHA256:
6148more.comC:\Users\admin\AppData\Local\Temp\oardpoawo
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
33
DNS requests
18
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6640
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6640
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6324
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
20.190.160.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
6728
setup.exe
104.21.32.1:443
clammypunero.com
CLOUDFLARENET
malicious
4536
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1916
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6728
setup.exe
188.114.96.3:443
u2.servicelandingkaraoke.shop
CLOUDFLARENET
NL
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
login.live.com
  • 20.190.160.128
  • 20.190.160.67
  • 20.190.160.14
  • 20.190.160.4
  • 20.190.160.2
  • 20.190.160.22
  • 40.126.32.74
  • 20.190.160.130
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
thingspouter.top
unknown
clammypunero.com
  • 104.21.32.1
  • 104.21.64.1
  • 104.21.112.1
  • 104.21.96.1
  • 104.21.16.1
  • 104.21.48.1
  • 104.21.80.1
malicious
cegu.shop
unknown
u2.servicelandingkaraoke.shop
  • 188.114.96.3
  • 188.114.97.3
malicious
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

PID
Process
Class
Message
2192
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
2192
svchost.exe
Potentially Bad Traffic
SUSPICIOUS [ANY.RUN] Suspected Malicious domain by CrossDomain ( .servicelandingkaraoke .shop)
No debug info