| File name: | abb907bc3f2caa653bdc8b2951c95731f5473eb6c5043887d276d25694e20ba9.zip |
| Full analysis: | https://app.any.run/tasks/3d442c36-b2b5-4283-a7a9-d222acb218bc |
| Verdict: | Malicious activity |
| Threats: | HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses. |
| Analysis date: | April 24, 2025, 18:34:06 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v5.1 to extract, compression method=AES Encrypted |
| MD5: | ECA5998B8FB060109FC81477101D4DFD |
| SHA1: | B352D0F4C50D8BAA7F605DB91E0512954EC666B0 |
| SHA256: | AC7945C122110861626A97AFCE8BC12C23E0843E87516CE436468EACB2497FF8 |
| SSDEEP: | 98304:3eq0FsHJVrqOytm+9dOwYGZXxOBLUF2XEgn6k+4tGPygT/ZXddT6QF0l4675QjeR:8SaWMretDR5n2SXj8ooEpV |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 51 |
|---|---|
| ZipBitFlag: | 0x0003 |
| ZipCompression: | Unknown (99) |
| ZipModifyDate: | 2025:04:24 18:33:42 |
| ZipCRC: | 0x81bba1a4 |
| ZipCompressedSize: | 13419149 |
| ZipUncompressedSize: | 15181745 |
| ZipFileName: | abb907bc3f2caa653bdc8b2951c95731f5473eb6c5043887d276d25694e20ba9.zip |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 616 | cmd /c "reg add HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v shark /t REG_SZ /d C:\ProgramData\shark.exe /f" | C:\Windows\SysWOW64\cmd.exe | — | K7PVS8Y9J3YO5TPKAAKAZO4WJ8QP.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2392 | reg add HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v shark /t REG_SZ /d C:\ProgramData\shark.exe /f | C:\Windows\SysWOW64\reg.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Registry Console Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6268 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6480 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\abb907bc3f2caa653bdc8b2951c95731f5473eb6c5043887d276d25694e20ba9.zip | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
| 7296 | C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding | C:\Windows\System32\rundll32.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7676 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Rar$DIb6480.48256\abb907bc3f2caa653bdc8b2951c95731f5473eb6c5043887d276d25694e20ba9.zip | C:\Program Files\WinRAR\WinRAR.exe | WinRAR.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
| 7992 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa7676.49125\Setup.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa7676.49125\Setup.exe | WinRAR.exe | ||||||||||||
User: admin Company: Neowise Software Integrity Level: MEDIUM Description: Updates utility for RoboTask Exit code: 0 Version: 9.8.1.292 Modules
| |||||||||||||||
| 8028 | C:\Users\admin\AppData\Local\Temp\xd.com | C:\Users\admin\AppData\Local\Temp\xd.com | Setup.exe | ||||||||||||
User: admin Company: ASUSTek Compputer Inc. Integrity Level: MEDIUM Description: AAC MB HAL Exit code: 0 Version: 1.3.9.6 Modules
| |||||||||||||||
| 8060 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6480) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\preferences.zip | |||
| (PID) Process: | (6480) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\chromium_ext.zip | |||
| (PID) Process: | (6480) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
| (PID) Process: | (6480) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\abb907bc3f2caa653bdc8b2951c95731f5473eb6c5043887d276d25694e20ba9.zip | |||
| (PID) Process: | (6480) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (6480) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (6480) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (6480) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (6480) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface |
| Operation: | write | Name: | ShowPassword |
Value: 0 | |||
| (PID) Process: | (7676) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\chromium_ext.zip | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7676 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa7676.49125\rtl280.bpl | — | |
MD5:— | SHA256:— | |||
| 7676 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa7676.49125\Data\bug53885.phpt | text | |
MD5:EC9E92D16499A2F925F2688DDA88085B | SHA256:78D3EE494E769805DEC8BBDBE08B2C9B0F3F9DF4978E3E79E9E4632AA70E3881 | |||
| 7676 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa7676.49125\Data\8859-7.txt | text | |
MD5:22786452BFC098BA284C5D31FC61B745 | SHA256:FE7CE66A91023F73E2118B49D49867E311E91D9E3F3B46329004D7A5A15FAED9 | |||
| 6480 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DIb6480.48256\abb907bc3f2caa653bdc8b2951c95731f5473eb6c5043887d276d25694e20ba9.zip | compressed | |
MD5:B7ECAF75389E43A194B3B28F7F476A5A | SHA256:ABB907BC3F2CAA653BDC8B2951C95731F5473EB6C5043887D276D25694E20BA9 | |||
| 7676 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa7676.49125\Data\cdb.c | text | |
MD5:3E84111122DD645FA8A07E7BE8CD904A | SHA256:F2360B4E203988138E9D630F7B47357727F2FE6AB8D38F60AC882C371E244E64 | |||
| 7676 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa7676.49125\Data\area_element.c | text | |
MD5:19C4657F93148D837A4DAC256DC9B8D8 | SHA256:D7AA1E1F367866FB4CE16CCA63CF966C512C868B8BB38B4A237C478EA4E3D538 | |||
| 7676 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa7676.49125\Data\010.phpt | text | |
MD5:0DF0C68B989558B13BDF12563662F97D | SHA256:9DD63682CF21F89B0AD54253AADAF0C894ADF56C70A61D0277E5125E2C276219 | |||
| 7676 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa7676.49125\Data\bug73460-002.phpt | text | |
MD5:D3BC5B63F2E2631BB77FF5784776F391 | SHA256:FB5C64A6643C83264AF0BF40E867969BDC5981CD8908933F4312D93AC8AA9C7A | |||
| 7676 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa7676.49125\Klureartcik.st | binary | |
MD5:6CC8D4C3CC153FCBCBD3DF32EED72590 | SHA256:D0BDF50642C4A8C04D0CA71A27ECC1B8D20BD9AFFD6D3B54B1101746B64A9036 | |||
| 7676 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa7676.49125\Setup.exe | executable | |
MD5:1859BF06B619390CD740A034C480D7CC | SHA256:72B1457AB1B9DDA8D20582D2C0FB5CA8119829C35C6AF5FB922285277BC6F969 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.53.40.178:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
7836 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
2924 | SearchApp.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
2924 | SearchApp.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
7836 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.53.40.178:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5496 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
— | — | 172.211.123.248:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 20.190.159.2:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6544 | svchost.exe | 184.30.131.245:80 | ocsp.digicert.com | AKAMAI-AS | US | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2104 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
2196 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (changeaie .top) |
2196 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (salaccgfa .top) |
2196 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (quilltayle .live) |
2196 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (liftally .top) |
2196 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (starofliught .top) |
2196 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (zestmodp .top) |
2196 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (piratetwrath .run) |
2196 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (nighetwhisper .top) |
2196 | svchost.exe | Misc activity | ET TA_ABUSED_SERVICES DNS Query to Commonly Actor Abused Online Service (data-seed-prebsc-2-s1 .binance .org) |