| File name: | setup_patched.exe |
| Full analysis: | https://app.any.run/tasks/04498585-f737-4678-bf37-aa9349d46497 |
| Verdict: | Malicious activity |
| Threats: | HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses. |
| Analysis date: | February 09, 2025, 17:18:05 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 11 sections |
| MD5: | D676F80F78AE44B48ED3036F3E7F739F |
| SHA1: | 7D95F9CE4C8170F9A55048A198756FBC819ACE3F |
| SHA256: | B016D6E32B4B85A86234CF7BD721B7343CAF8067C76FDA3BCD0B2B22C93261C6 |
| SSDEEP: | 98304:r/Ucbe2ADsPQE+fDaVHFGeeTMK4AdhULORE:Qkh4s |
| .exe | | | Inno Setup installer (46.7) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (1.9) |
| .exe | | | Generic Win/DOS Executable (0.8) |
| .exe | | | DOS Executable Generic (0.8) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2024:07:12 07:26:52+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 2802176 |
| InitializedDataSize: | 563712 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x2adbf4 |
| OSVersion: | 6.1 |
| ImageVersion: | - |
| SubsystemVersion: | 6.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 51.1052.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| FileDescription: | Setup/Uninstall |
| FileVersion: | 51.1052.0.0 |
| Comments: | This installation was built with Inno Setup. |
| CompanyName: | Hulubulu Software |
| LegalCopyright: | Copyright © Hulubulu Software by Kim Jensen |
| OriginalFileName: | |
| ProductName: | Advanced Renamer |
| ProductVersion: | 4.08 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2192 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2796 | C:\WINDOWS\SysWOW64\choice.exe | C:\Windows\SysWOW64\choice.exe | — | vcpkgsrv.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Offers the user a choice Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3128 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | choice.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5032 | C:\WINDOWS\SysWOW64\explorer.exe | C:\Windows\SysWOW64\explorer.exe | choice.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Explorer Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5096 | C:\WINDOWS\SysWOW64\choice.exe | C:\Windows\SysWOW64\choice.exe | — | vcpkgsrv.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Offers the user a choice Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5320 | C:\WINDOWS\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7} | C:\Windows\SysWOW64\dllhost.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5640 | "C:\ProgramData\FNPLicensingService\vcpkgsrv.exe" | C:\ProgramData\FNPLicensingService\vcpkgsrv.exe | — | dllhost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft (R) Visual C++ Package Server Exit code: 1 Version: 17.0.34202.158 built by: D17.7 Modules
| |||||||||||||||
| 6304 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | choice.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6312 | "C:\Users\admin\Desktop\setup_patched.exe" | C:\Users\admin\Desktop\setup_patched.exe | explorer.exe | ||||||||||||
User: admin Company: Hulubulu Software Integrity Level: MEDIUM Description: Setup/Uninstall Exit code: 0 Version: 51.1052.0.0 Modules
| |||||||||||||||
| 7060 | "C:\Users\admin\AppData\Local\Temp\Z6G4PJFMAP75FULUBVD1QBP2I3IUM57\vcpkgsrv.exe" | C:\Users\admin\AppData\Local\Temp\Z6G4PJFMAP75FULUBVD1QBP2I3IUM57\vcpkgsrv.exe | setup_patched.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft (R) Visual C++ Package Server Exit code: 0 Version: 17.0.34202.158 built by: D17.7 Modules
| |||||||||||||||
| (PID) Process: | (5320) dllhost.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer |
| Operation: | write | Name: | SlowContextMenuEntries |
Value: 6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6312 | setup_patched.exe | C:\Users\admin\AppData\Local\Temp\Z6G4PJFMAP75FULUBVD1QBP2I3IUM57\airstrip.eps | — | |
MD5:— | SHA256:— | |||
| 6312 | setup_patched.exe | C:\Users\admin\AppData\Local\Temp\Z6G4PJFMAP75FULUBVD1QBP2I3IUM57\cpfe.dll | — | |
MD5:— | SHA256:— | |||
| 6312 | setup_patched.exe | C:\Users\admin\AppData\Local\Temp\Z6G4PJFMAP75FULUBVD1QBP2I3IUM57\DbxDb2.dll | executable | |
MD5:438658D2D42B2417AFD34BACEC6A55AA | SHA256:85E12FF818F0412262B7D0070B7550E7F7E757DF735FAA7AAAC4B73F018FE26B | |||
| 6312 | setup_patched.exe | C:\Users\admin\AppData\Local\Temp\Z6G4PJFMAP75FULUBVD1QBP2I3IUM57\vclimg290.bpl | executable | |
MD5:8DA1CC2F7FEE2B1440CA4C2B48D7F991 | SHA256:68F84CCC92C047B8215713A97CA6E63BACD745D2A2636A46269D34F1F1F1CB8A | |||
| 6312 | setup_patched.exe | C:\Users\admin\AppData\Local\Temp\Z6G4PJFMAP75FULUBVD1QBP2I3IUM57\dbxasa.dll | executable | |
MD5:3E3E825275C968ACB0570C16B5CBC7BF | SHA256:D445FC8C454643B85DB63F39B22CC01168EE18578712766BE7A8CF49DEB752EB | |||
| 7060 | vcpkgsrv.exe | C:\ProgramData\FNPLicensingService\cpfe.dll | — | |
MD5:— | SHA256:— | |||
| 6312 | setup_patched.exe | C:\Users\admin\AppData\Local\Temp\Z6G4PJFMAP75FULUBVD1QBP2I3IUM57\dbxase.dll | executable | |
MD5:019F61F5BF96F5B80A846EFEF7FFE931 | SHA256:E136DB925A11447A2E0444D45866471A4BC54B03B403B912663054AA17BE469B | |||
| 6312 | setup_patched.exe | C:\Users\admin\AppData\Local\Temp\Z6G4PJFMAP75FULUBVD1QBP2I3IUM57\vcldb290.bpl | executable | |
MD5:2F377223D522CB65D97985F74CDFD4D8 | SHA256:A9A475B658CF202156CE5CB45D14E891970DE8F8F96ADB2D5856E308B096971C | |||
| 6312 | setup_patched.exe | C:\Users\admin\AppData\Local\Temp\Z6G4PJFMAP75FULUBVD1QBP2I3IUM57\vcl290.bpl | executable | |
MD5:3E043A4959D3E68162B06DCDB758FAB0 | SHA256:92BA4C51E0F68158FCC6FE67CE587AC0C2B3E28DB5CA6E19C5A297E872EC1963 | |||
| 7060 | vcpkgsrv.exe | C:\ProgramData\FNPLicensingService\airstrip.eps | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 23.48.23.143:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
1176 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6924 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
6924 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
3152 | backgroundTaskHost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | 20.73.194.208:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 23.48.23.143:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
— | — | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
1596 | svchost.exe | 20.73.194.208:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5064 | SearchApp.exe | 92.123.104.34:443 | www.bing.com | Akamai International B.V. | DE | whitelisted |
— | — | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
1176 | svchost.exe | 40.126.31.130:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1076 | svchost.exe | 23.35.238.131:443 | go.microsoft.com | AKAMAI-AS | DE | whitelisted |
1176 | svchost.exe | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
qcleveridea.cyou |
| malicious |
settings-win.data.microsoft.com |
| whitelisted |
cegu.shop |
| unknown |
u2.latenativereunion.shop |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
6312 | setup_patched.exe | A Network Trojan was detected | STEALER [ANY.RUN] Lumma Stealer TLS Connection |