File name: | Setup.exe |
Full analysis: | https://app.any.run/tasks/36bf3af6-7bc7-422b-b485-ee62fcc5f5a7 |
Verdict: | Malicious activity |
Threats: | HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses. |
Analysis date: | July 21, 2024, 00:44:14 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, Nullsoft Installer self-extracting archive |
MD5: | 60250D444207E665A278070A76DC811C |
SHA1: | 306DD3DDEA6D5DA2A4D10E1B85DA1D9E5F2E05E5 |
SHA256: | 979F393C1F1EF1D302B93004DE949810B98FD2544E3CECA2630FA1A60D159C65 |
SSDEEP: | 98304:U+FNSy3lQB/R60c1kPMkEJrcLgIh7buT7FfjFYh9oxlo7ODrtoifS9bUhsva7l+E:v0gicU |
.exe | | | InstallShield setup (25) |
---|---|---|
.exe | | | Win32 EXE PECompact compressed (generic) (24.2) |
.exe | | | Win32 Executable MS Visual C++ (generic) (18.1) |
.exe | | | Win64 Executable (generic) (16) |
.scr | | | Windows screen saver (7.6) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2024:06:26 19:41:05+00:00 |
ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit, No debug |
PEType: | PE32 |
LinkerVersion: | 2.38 |
CodeSize: | 40960 |
InitializedDataSize: | 51200 |
UninitializedDataSize: | 295936 |
EntryPoint: | 0x4b62 |
OSVersion: | 4 |
ImageVersion: | 6 |
SubsystemVersion: | 4 |
Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
844 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | netsh.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
884 | findstr /V "DEUTSCHCOMEDYCONDITIONSMINDS" Clips | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1212 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | netsh.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1284 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1764 | "C:\Windows\System32\cmd.exe" /k copy Nerve Nerve.cmd & Nerve.cmd & exit | C:\Windows\SysWOW64\cmd.exe | 8NTHES43T8MUJ6M8A.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
2116 | "C:\Users\admin\Desktop\Setup.exe" | C:\Users\admin\Desktop\Setup.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
2704 | cmd /c md 484309 | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
2860 | "C:\Users\admin\AppData\Local\Temp\nsyBBED.tmp\rta.exe" | C:\Users\admin\AppData\Local\Temp\nsyBBED.tmp\rta.exe | — | Setup.exe | |||||||||||
User: admin Company: IncrediMail, Ltd. Integrity Level: MEDIUM Description: IncrediMail Notifier Exit code: 1 Version: 6, 3, 9, 5274 Modules
| |||||||||||||||
2868 | findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
3628 | 484309\Bush.pif 484309\g | C:\Users\admin\AppData\Local\Temp\484309\Bush.pif | cmd.exe | ||||||||||||
User: admin Company: AutoIt Team Integrity Level: MEDIUM Description: AutoIt v3 Script Version: 3, 3, 14, 4 Modules
|
(PID) Process: | (6348) rta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\IncrediMail |
Operation: | write | Name: | ApplicationPath |
Value: C:\Users\admin\AppData\Local\IM | |||
(PID) Process: | (6348) rta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\IncrediMail |
Operation: | write | Name: | ApplicationPathBackup |
Value: C:\Users\admin\AppData\Local\IM | |||
(PID) Process: | (7404) 8NTHES43T8MUJ6M8A.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (7404) 8NTHES43T8MUJ6M8A.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (7404) 8NTHES43T8MUJ6M8A.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
(PID) Process: | (7404) 8NTHES43T8MUJ6M8A.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2116 | Setup.exe | C:\Users\admin\AppData\Local\Temp\nss955A.tmp\plugins\Microsoft.VisualStudio.VsWebProtocol | executable | |
MD5:91ACF072FE60B3EF9867FAEC1A7A8CB0 | SHA256:1F49ADC807A564E7C1ECF32F58074A1230A6FE4764E8F54CE7FFA8C2E880DCCA | |||
2116 | Setup.exe | C:\Users\admin\AppData\Local\Temp\nss955A.tmp\libvlc.dll | executable | |
MD5:96214B94B796BFFC48D63289854AE5A2 | SHA256:528C416CFB4813EE5F1DA52743EF4ADB20043171230098B27E25D1DD90E3F288 | |||
2116 | Setup.exe | C:\Users\admin\AppData\Local\Temp\nss955A.tmp\plugins\StartupHelper | executable | |
MD5:14934CACA84D5FE0288F27EFB31DCBF8 | SHA256:7FA86147035627BAE39576BCBE619D045E94A48C4DB8CA131968C20BB4DE4A36 | |||
2116 | Setup.exe | C:\Users\admin\AppData\Local\Temp\nss955A.tmp\plugins\NvStWiz | executable | |
MD5:9E82E3B658393BED3F7E4F090DF1FBE7 | SHA256:C2AD5BD189DF04B39BE18DEC5CD251CF79B066010706AD26D99DF7E49FD07762 | |||
2116 | Setup.exe | C:\Users\admin\AppData\Local\Temp\nss955A.tmp\plugins\lang-1058.dll | executable | |
MD5:41C75E831A5571C3F72287794391A0E6 | SHA256:B3AD99AFDAEE3B9365E7A3FFCC44C2761E22A4F92DFF5E5EFDC52F6B08EA0105 | |||
2116 | Setup.exe | C:\Users\admin\AppData\Local\Temp\nss955A.tmp\plugins\lang-1049.dll | executable | |
MD5:0AC98A4BFC717523E344010A42C2F4BA | SHA256:68546336232AA2BE277711AFA7C1F08ECD5FCC92CC182F90459F0C61FB39507F | |||
2116 | Setup.exe | C:\Users\admin\AppData\Local\Temp\nss955A.tmp\libvlccore.dll | executable | |
MD5:E25413BB41C2F239FFDD3569F76E74B0 | SHA256:9126D9ABF91585456000FFFD9336478E91B9EA07ED2A25806A4E2E0437F96D29 | |||
2116 | Setup.exe | C:\Users\admin\AppData\Local\Temp\nss955A.tmp\ImNtUtilU.dll | executable | |
MD5:BB326FE795E2C1C19CD79F320E169FD3 | SHA256:A8E1B0E676DCE9556037D29FD96521EC814858404BA4CFDD0DB0EDBE22C87BC7 | |||
2116 | Setup.exe | C:\Users\admin\AppData\Local\Temp\nss955A.tmp\mfc80u.dll | executable | |
MD5:CCC2E312486AE6B80970211DA472268B | SHA256:18BE5D3C656236B7E3CD6D619D62496FE3E7F66BF2859E460F8AC3D1A6BDAA9A | |||
2116 | Setup.exe | C:\Users\admin\AppData\Local\Temp\nss955A.tmp\ImWrappU.dll | executable | |
MD5:CBF4827A5920A5F02C50F78ED46D0319 | SHA256:7187903A9E4078F4D31F4B709A59D24EB6B417EA289F4F28EABCE1EA2E713DCE |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4716 | svchost.exe | 20.190.159.64:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5620 | MoUsoCoreWorker.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
7856 | svchost.exe | 4.209.33.156:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4032 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
2760 | svchost.exe | 40.113.103.199:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3404 | slui.exe | 40.91.76.224:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
4716 | svchost.exe | 20.190.159.68:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
4716 | svchost.exe | 20.190.159.0:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
Domain | IP | Reputation |
---|---|---|
login.live.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
arc.msn.com |
| whitelisted |
fd.api.iris.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
accessibledpzp.shop |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
— | — | A Network Trojan was detected | STEALER [ANY.RUN] Lumma Stealer TLS Connection |
— | — | Misc activity | ET INFO Pastebin Service Domain in DNS Lookup (rentry .co) |
— | — | Misc activity | ET INFO Observed Pastebin Service Domain (rentry .co in TLS SNI) |