| File name: | #!SetUp_17638--!PassW0rdz#$.zip |
| Full analysis: | https://app.any.run/tasks/8accf484-57a1-4747-9524-0b0318680f2b |
| Verdict: | Malicious activity |
| Threats: | HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses. |
| Analysis date: | July 13, 2024, 11:56:16 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v1.0 to extract, compression method=store |
| MD5: | CF0BD0EE8B971CB86E75583A4D00F1C4 |
| SHA1: | 5AB2509F9AA7946B24B55B7C968AE84CAF0988C2 |
| SHA256: | 83E0C1FD57F73AE0208304AC8BF85A20ED91D4B16EBB3ABAA78C3771DD54BDFF |
| SSDEEP: | 98304:iMUAYrc5CLShZXj1of6HpSUXUVkO6t7kvbTXym6LhOGfJUWqmeZXtv9ZbzI178K0:ihOSOK |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 10 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | None |
| ZipModifyDate: | 2024:07:13 11:05:32 |
| ZipCRC: | 0x00000000 |
| ZipCompressedSize: | - |
| ZipUncompressedSize: | - |
| ZipFileName: | 0pen___files/ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 884 | "C:\Users\admin\AppData\Local\Temp\Rar$EXb6524.11444\Setup.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXb6524.11444\Setup.exe | WinRAR.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 1 Modules
| |||||||||||||||
| 1452 | "C:\Users\admin\AppData\Local\Temp\7HMCSGEDNQW7A4I2.exe" | C:\Users\admin\AppData\Local\Temp\7HMCSGEDNQW7A4I2.exe | — | SearchIndexer.exe | |||||||||||
User: admin Company: Vitaliy Levchenko Software Integrity Level: MEDIUM Description: Icons from File Exit code: 1 Version: 5.1.1.16 Modules
| |||||||||||||||
| 2704 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4456 | "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\admin\AppData\Local\Temp\Rar$DIb6524.15643\snippet.pptx" /ou "" | C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE | WinRAR.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft PowerPoint Exit code: 0 Version: 16.0.16026.20146 Modules
| |||||||||||||||
| 5396 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\#!SetUp_17638--!PassW0rdz#$.zip | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 1 Version: 5.91.0 Modules
| |||||||||||||||
| 5524 | C:\Users\admin\AppData\Local\Temp\TraceFmt.exe | C:\Users\admin\AppData\Local\Temp\TraceFmt.exe | more.com | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Format Message traces to text Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 6244 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | more.com | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6256 | C:\WINDOWS\SysWOW64\more.com | C:\Windows\SysWOW64\more.com | 7HMCSGEDNQW7A4I2.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: More Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6456 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\#!SetUp_17638--!PassW0rdz#$.zip" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
| 6496 | C:\WINDOWS\SysWOW64\more.com | C:\Windows\SysWOW64\more.com | — | Setup.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: More Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (5396) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (5396) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (5396) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\General |
| Operation: | write | Name: | LastFolder |
Value: C:\Users\admin\Desktop | |||
| (PID) Process: | (5396) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (5396) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (5396) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (5396) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (5396) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\General\Toolbar\Layout |
| Operation: | write | Name: | Band76_0 |
Value: 4C000000730100000402000000000000F0F0F00000000000000000000000000000000000000000006A02040000000000000000003B000000B402000000000000000000000000000001000000 | |||
| (PID) Process: | (5396) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\General\Toolbar\Layout |
| Operation: | write | Name: | Band76_1 |
Value: 4C000000730100000500000000000000F0F0F0000000000000000000000000000000000000000000060303000000000000000000180000002A00000000000000000000000000000002000000 | |||
| (PID) Process: | (5396) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\General\Toolbar\Layout |
| Operation: | write | Name: | Band76_2 |
Value: 4C000000730100000400000000000000F0F0F0000000000000000000000000000000000000000000C60205000000000000000000180000006400000000000000000000000000000003000000 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6496 | more.com | C:\Users\admin\AppData\Local\Temp\kubr | — | |
MD5:— | SHA256:— | |||
| 6524 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXb6524.11444\snippet.pptx | binary | |
MD5:AA81480D01721067832365B92D0E11BC | SHA256:8D7A250EC751E60069065A029F46E8208F95913689AA64A91E92785BE339170D | |||
| 884 | Setup.exe | C:\Users\admin\AppData\Roaming\gn_auth\d3dx9_43.dll | executable | |
MD5:65C3EAC200C1C62B8A8BBFBA72631170 | SHA256:AB94E21740F9B5429C2DC4CCAC99CB66508E536E5E3CF1978202C0BBA2790E39 | |||
| 6524 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXb6524.11444\Setup.exe | executable | |
MD5:D9530ECEE42ACCCFD3871672A511BC9E | SHA256:81E04F9A131534ACC0E9DE08718C062D3D74C80C7F168EC7E699CD4B2BD0F280 | |||
| 6524 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXb6524.11444\d3dx9_43.dll | executable | |
MD5:65C3EAC200C1C62B8A8BBFBA72631170 | SHA256:AB94E21740F9B5429C2DC4CCAC99CB66508E536E5E3CF1978202C0BBA2790E39 | |||
| 6524 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DIb6524.15643\snippet.pptx | binary | |
MD5:AA81480D01721067832365B92D0E11BC | SHA256:8D7A250EC751E60069065A029F46E8208F95913689AA64A91E92785BE339170D | |||
| 884 | Setup.exe | C:\Users\admin\AppData\Roaming\gn_auth\plea.cfg | binary | |
MD5:FDDFDA8936DF7117D9D4FB75D6AFA84D | SHA256:89E70157E073E987124B663638278F909383034989A0B65540AE2457198131FB | |||
| 884 | Setup.exe | C:\Users\admin\AppData\Roaming\gn_auth\snippet.pptx | binary | |
MD5:AA81480D01721067832365B92D0E11BC | SHA256:8D7A250EC751E60069065A029F46E8208F95913689AA64A91E92785BE339170D | |||
| 884 | Setup.exe | C:\Users\admin\AppData\Local\Temp\9985df66 | binary | |
MD5:9EA2A02E9F2F055FC98CB52D22F106B0 | SHA256:6738971AF64EEA39F7B165CDF95097B4970275CBD3195906CA07473193E02500 | |||
| 4456 | POWERPNT.EXE | C:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres | binary | |
MD5:44555A7DAFDD7EA5BA41D11C08C6BEBF | SHA256:38A2C0088EE46975C7A4DD55CCF4310D637258DE0922A209AEB91B4A9B46A169 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5592 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
4656 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
4452 | svchost.exe | GET | 200 | 23.48.23.156:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4452 | svchost.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4544 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
4148 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
916 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
916 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
4456 | POWERPNT.EXE | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
3040 | OfficeClickToRun.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4452 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
4032 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
— | — | 2.23.209.185:443 | www.bing.com | Akamai International B.V. | GB | whitelisted |
1452 | RUXIMICS.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
444 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
4656 | SearchApp.exe | 2.23.209.185:443 | www.bing.com | Akamai International B.V. | GB | whitelisted |
4656 | SearchApp.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5592 | svchost.exe | 20.190.159.73:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
google.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
6764 | SearchIndexer.exe | A Network Trojan was detected | STEALER [ANY.RUN] Lumma Stealer TLS Connection |
6764 | SearchIndexer.exe | Misc activity | ET INFO Observed Pastebin Service Domain (rentry .co in TLS SNI) |
2168 | svchost.exe | Misc activity | ET INFO Pastebin Service Domain in DNS Lookup (rentry .co) |