File name: | 2025-07-06_763adeb4b265c09d7e5ef6fb171ffe2c_black-basta_elex_hijackloader |
Full analysis: | https://app.any.run/tasks/0208240b-a20a-4369-9d50-b59ce9609fef |
Verdict: | Malicious activity |
Analysis date: | July 06, 2025, 03:34:31 |
OS: | Windows 10 Professional (build: 19044, 64 bit) |
Indicators: | |
MIME: | application/vnd.microsoft.portable-executable |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 2 sections |
MD5: | 763ADEB4B265C09D7E5EF6FB171FFE2C |
SHA1: | 68B173664E39577FBB97EF94B174FCF9550FA4C9 |
SHA256: | 9D3BA35A4AA7CFB92E6D13D2B437EDD394A9FE5527B828569F5F713C891BC38B |
SSDEEP: | 49152:s92X5xd4X5Rl+JbXEM3lZmslTY8ranKtLzfObDdEFP304YY3EVJzb3boSwijiGNM:Y5T8rjAbpENaUOW+XGMw |
.exe | | | DOS Executable Generic (100) |
---|
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 0000:00:00 00:00:00 |
ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
PEType: | PE32 |
LinkerVersion: | 0.37 |
CodeSize: | 66560 |
InitializedDataSize: | 37888 |
UninitializedDataSize: | - |
EntryPoint: | 0x361ec |
OSVersion: | 4 |
ImageVersion: | - |
SubsystemVersion: | 4 |
Subsystem: | Windows GUI |
FileVersionNumber: | 1.0.0.0 |
ProductVersionNumber: | 1.0.0.0 |
FileFlagsMask: | 0x003f |
FileFlags: | (none) |
FileOS: | Win32 |
ObjectFileType: | Executable application |
FileSubtype: | - |
LanguageCode: | Chinese (Simplified) |
CharacterSet: | Windows, Chinese (Simplified) |
CompanyName: | - |
FileDescription: | - |
FileVersion: | 1.0.0.0 |
InternalName: | - |
LegalCopyright: | - |
LegalTrademarks: | - |
OriginalFileName: | - |
ProductName: | - |
ProductVersion: | 1.0.0.0 |
Comments: | - |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
440 | "C:\Users\admin\Desktop\2025-07-06_763adeb4b265c09d7e5ef6fb171ffe2c_black-basta_elex_hijackloader.exe" | C:\Users\admin\Desktop\2025-07-06_763adeb4b265c09d7e5ef6fb171ffe2c_black-basta_elex_hijackloader.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
2732 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
3100 | net stop "Kingsoft AntiVirus Service" | C:\Windows\SysWOW64\net.exe | — | 2025-07-06_763adeb4b265c09d7e5ef6fb171ffe2c_black-basta_elex_hijackloader.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
3564 | "C:\Users\admin\Desktop\2025-07-06_763adeb4b265c09d7e5ef6fb171ffe2c_black-basta_elex_hijackloader.exe" | C:\Users\admin\Desktop\2025-07-06_763adeb4b265c09d7e5ef6fb171ffe2c_black-basta_elex_hijackloader.exe | cmd.exe | ||||||||||||
User: admin Company: Adobe Systems Incorporated Integrity Level: MEDIUM Description: Adobe AcroCEF Exit code: 3228369022 Version: 23.8.20533.0 Modules
| |||||||||||||||
6412 | C:\WINDOWS\system32\WerFault.exe -u -p 3564 -s 428 | C:\Windows\System32\WerFault.exe | 2025-07-06_763adeb4b265c09d7e5ef6fb171ffe2c_black-basta_elex_hijackloader.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6528 | C:\WINDOWS\system32\net1 stop "Kingsoft AntiVirus Service" | C:\Windows\SysWOW64\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
6936 | C:\WINDOWS\system32\cmd.exe /c C:\Users\admin\AppData\Local\Temp\$a6234.bat | C:\Windows\SysWOW64\cmd.exe | 2025-07-06_763adeb4b265c09d7e5ef6fb171ffe2c_black-basta_elex_hijackloader.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
7064 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
7096 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
|
PID | Process | Filename | Type | |
---|---|---|---|---|
6412 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_2025-07-06_763ad_dcda1547525156b8f32015d9b5d44d96259a8_19e542cc_af6f363a-eec0-47a4-b725-976c691264f3\Report.wer | — | |
MD5:— | SHA256:— | |||
6936 | cmd.exe | C:\Users\admin\Desktop\2025-07-06_763adeb4b265c09d7e5ef6fb171ffe2c_black-basta_elex_hijackloader.exe | executable | |
MD5:CD53C61345139DD549495633C7195A9D | SHA256:2B2538D62A3D95CAA1EAAF402DDA55E9B0DC66E5A0B8F6C8FD3042550E48D56D | |||
440 | 2025-07-06_763adeb4b265c09d7e5ef6fb171ffe2c_black-basta_elex_hijackloader.exe | C:\Users\admin\AppData\Local\Temp\$a6234.bat | text | |
MD5:E38E905DD5771BA95A9D4EB67D0ECC6D | SHA256:4DA43E066A38A4188529917DC81A45FDEADA123351D363763EBD6E59A4D5FBD7 | |||
6412 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER64B5.tmp.dmp | binary | |
MD5:77825B3E9285B78A8C5F4014F3248829 | SHA256:0F1D1E68186A395FA41427D64B477515F8FBBEB94F6DAEA79C571C424E120E7A | |||
440 | 2025-07-06_763adeb4b265c09d7e5ef6fb171ffe2c_black-basta_elex_hijackloader.exe | C:\Users\admin\Desktop\2025-07-06_763adeb4b265c09d7e5ef6fb171ffe2c_black-basta_elex_hijackloader.exe.exe | executable | |
MD5:CD53C61345139DD549495633C7195A9D | SHA256:2B2538D62A3D95CAA1EAAF402DDA55E9B0DC66E5A0B8F6C8FD3042550E48D56D | |||
6412 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER6504.tmp.WERInternalMetadata.xml | xml | |
MD5:1B22DD3984B3B2609AB8D3DF38E792C7 | SHA256:529C82A49724F9047083F2F595EC1A29498ECCB346BB333CF528E811DF081D33 | |||
6412 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER6515.tmp.xml | xml | |
MD5:5FF6B284814B5B2ACA27EC9316301C2B | SHA256:35E0D3DA3B8CB0F3F4CDC97029EB3DD54378D507E693D197E5199FC1A2F36744 | |||
6412 | WerFault.exe | C:\Users\admin\AppData\Local\CrashDumps\2025-07-06_763adeb4b265c09d7e5ef6fb171ffe2c_black-basta_elex_hijackloader.exe.3564.dmp | binary | |
MD5:80694355207DF8821E457F8D8F82CBB6 | SHA256:06DBF0A4BF54C76F291C081EA6DC9E3F1D593CD25C6BEA96172B108651A003D8 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
7092 | RUXIMICS.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
7092 | RUXIMICS.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 500 | 20.83.72.98:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
2940 | svchost.exe | GET | 200 | 69.192.161.44:80 | http://x1.c.lencr.org/ | unknown | — | — | whitelisted |
— | — | POST | 500 | 20.83.72.98:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1268 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
7092 | RUXIMICS.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 23.216.77.6:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1268 | svchost.exe | 23.216.77.6:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
7092 | RUXIMICS.exe | 23.216.77.6:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5944 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
1268 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
watson.events.data.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
x1.c.lencr.org |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |