File name:

setup_patched.exe

Full analysis: https://app.any.run/tasks/04498585-f737-4678-bf37-aa9349d46497
Verdict: Malicious activity
Threats:

HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses.

Analysis date: February 09, 2025, 17:18:05
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
inno
installer
delphi
hijackloader
loader
golang
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 11 sections
MD5:

D676F80F78AE44B48ED3036F3E7F739F

SHA1:

7D95F9CE4C8170F9A55048A198756FBC819ACE3F

SHA256:

B016D6E32B4B85A86234CF7BD721B7343CAF8067C76FDA3BCD0B2B22C93261C6

SSDEEP:

98304:r/Ucbe2ADsPQE+fDaVHFGeeTMK4AdhULORE:Qkh4s

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LUMMA has been detected (SURICATA)

      • setup_patched.exe (PID: 6312)
    • LUMMA has been detected (YARA)

      • setup_patched.exe (PID: 6312)
    • LUMMA mutex has been found

      • setup_patched.exe (PID: 6312)
    • Steals credentials from Web Browsers

      • setup_patched.exe (PID: 6312)
    • Actions looks like stealing of personal data

      • setup_patched.exe (PID: 6312)
    • HIJACKLOADER has been detected (YARA)

      • vcpkgsrv.exe (PID: 7152)
    • Known privilege escalation attack

      • dllhost.exe (PID: 5320)
  • SUSPICIOUS

    • Searches for installed software

      • setup_patched.exe (PID: 6312)
    • Executable content was dropped or overwritten

      • setup_patched.exe (PID: 6312)
      • vcpkgsrv.exe (PID: 7060)
    • The process drops C-runtime libraries

      • setup_patched.exe (PID: 6312)
      • vcpkgsrv.exe (PID: 7060)
    • Process drops legitimate windows executable

      • setup_patched.exe (PID: 6312)
      • vcpkgsrv.exe (PID: 7060)
    • Starts itself from another location

      • vcpkgsrv.exe (PID: 7060)
    • Connects to unusual port

      • explorer.exe (PID: 5032)
    • Starts a Microsoft application from unusual location

      • vcpkgsrv.exe (PID: 7060)
  • INFO

    • Checks supported languages

      • setup_patched.exe (PID: 6312)
      • vcpkgsrv.exe (PID: 7152)
      • vcpkgsrv.exe (PID: 5640)
      • vcpkgsrv.exe (PID: 7060)
    • Reads the computer name

      • setup_patched.exe (PID: 6312)
      • vcpkgsrv.exe (PID: 7152)
      • vcpkgsrv.exe (PID: 5640)
      • vcpkgsrv.exe (PID: 7060)
    • Reads the software policy settings

      • setup_patched.exe (PID: 6312)
      • explorer.exe (PID: 5032)
    • Compiled with Borland Delphi (YARA)

      • setup_patched.exe (PID: 6312)
    • Detects InnoSetup installer (YARA)

      • setup_patched.exe (PID: 6312)
    • Create files in a temporary directory

      • setup_patched.exe (PID: 6312)
      • vcpkgsrv.exe (PID: 7152)
      • vcpkgsrv.exe (PID: 5640)
      • choice.exe (PID: 5096)
    • The sample compiled with english language support

      • setup_patched.exe (PID: 6312)
      • vcpkgsrv.exe (PID: 7060)
    • Creates files in the program directory

      • vcpkgsrv.exe (PID: 7060)
    • Reads security settings of Internet Explorer

      • dllhost.exe (PID: 5320)
    • Detects GO elliptic curve encryption (YARA)

      • explorer.exe (PID: 5032)
    • Application based on Golang

      • explorer.exe (PID: 5032)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (46.7)
.exe | Win32 Executable (generic) (1.9)
.exe | Generic Win/DOS Executable (0.8)
.exe | DOS Executable Generic (0.8)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:07:12 07:26:52+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 2.25
CodeSize: 2802176
InitializedDataSize: 563712
UninitializedDataSize: -
EntryPoint: 0x2adbf4
OSVersion: 6.1
ImageVersion: -
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 51.1052.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription: Setup/Uninstall
FileVersion: 51.1052.0.0
Comments: This installation was built with Inno Setup.
CompanyName: Hulubulu Software
LegalCopyright: Copyright © Hulubulu Software by Kim Jensen
OriginalFileName:
ProductName: Advanced Renamer
ProductVersion: 4.08
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
11
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #LUMMA setup_patched.exe vcpkgsrv.exe #HIJACKLOADER vcpkgsrv.exe no specs choice.exe no specs conhost.exe no specs CMSTPLUA vcpkgsrv.exe no specs choice.exe no specs conhost.exe no specs explorer.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2796C:\WINDOWS\SysWOW64\choice.exeC:\Windows\SysWOW64\choice.exevcpkgsrv.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Offers the user a choice
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\choice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
3128\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exechoice.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5032C:\WINDOWS\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe
choice.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Explorer
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\fkcbwfsvragyu
c:\windows\syswow64\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
5096C:\WINDOWS\SysWOW64\choice.exeC:\Windows\SysWOW64\choice.exevcpkgsrv.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Offers the user a choice
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\choice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
5320C:\WINDOWS\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}C:\Windows\SysWOW64\dllhost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ucrtbase.dll
c:\windows\syswow64\combase.dll
5640"C:\ProgramData\FNPLicensingService\vcpkgsrv.exe" C:\ProgramData\FNPLicensingService\vcpkgsrv.exedllhost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft (R) Visual C++ Package Server
Exit code:
1
Version:
17.0.34202.158 built by: D17.7
Modules
Images
c:\programdata\fnplicensingservice\vcpkgsrv.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ole32.dll
6304\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exechoice.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6312"C:\Users\admin\Desktop\setup_patched.exe" C:\Users\admin\Desktop\setup_patched.exe
explorer.exe
User:
admin
Company:
Hulubulu Software
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\desktop\setup_patched.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
7060"C:\Users\admin\AppData\Local\Temp\Z6G4PJFMAP75FULUBVD1QBP2I3IUM57\vcpkgsrv.exe"C:\Users\admin\AppData\Local\Temp\Z6G4PJFMAP75FULUBVD1QBP2I3IUM57\vcpkgsrv.exe
setup_patched.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) Visual C++ Package Server
Exit code:
0
Version:
17.0.34202.158 built by: D17.7
Modules
Images
c:\users\admin\appdata\local\temp\z6g4pjfmap75fulubvd1qbp2i3ium57\vcpkgsrv.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ole32.dll
Total events
4 473
Read events
4 472
Write events
1
Delete events
0

Modification events

(PID) Process:(5320) dllhost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
Executable files
23
Suspicious files
2
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
6312setup_patched.exeC:\Users\admin\AppData\Local\Temp\Z6G4PJFMAP75FULUBVD1QBP2I3IUM57\airstrip.eps
MD5:
SHA256:
6312setup_patched.exeC:\Users\admin\AppData\Local\Temp\Z6G4PJFMAP75FULUBVD1QBP2I3IUM57\cpfe.dll
MD5:
SHA256:
6312setup_patched.exeC:\Users\admin\AppData\Local\Temp\Z6G4PJFMAP75FULUBVD1QBP2I3IUM57\DbxDb2.dllexecutable
MD5:438658D2D42B2417AFD34BACEC6A55AA
SHA256:85E12FF818F0412262B7D0070B7550E7F7E757DF735FAA7AAAC4B73F018FE26B
6312setup_patched.exeC:\Users\admin\AppData\Local\Temp\Z6G4PJFMAP75FULUBVD1QBP2I3IUM57\vclimg290.bplexecutable
MD5:8DA1CC2F7FEE2B1440CA4C2B48D7F991
SHA256:68F84CCC92C047B8215713A97CA6E63BACD745D2A2636A46269D34F1F1F1CB8A
6312setup_patched.exeC:\Users\admin\AppData\Local\Temp\Z6G4PJFMAP75FULUBVD1QBP2I3IUM57\dbxasa.dllexecutable
MD5:3E3E825275C968ACB0570C16B5CBC7BF
SHA256:D445FC8C454643B85DB63F39B22CC01168EE18578712766BE7A8CF49DEB752EB
7060vcpkgsrv.exeC:\ProgramData\FNPLicensingService\cpfe.dll
MD5:
SHA256:
6312setup_patched.exeC:\Users\admin\AppData\Local\Temp\Z6G4PJFMAP75FULUBVD1QBP2I3IUM57\dbxase.dllexecutable
MD5:019F61F5BF96F5B80A846EFEF7FFE931
SHA256:E136DB925A11447A2E0444D45866471A4BC54B03B403B912663054AA17BE469B
6312setup_patched.exeC:\Users\admin\AppData\Local\Temp\Z6G4PJFMAP75FULUBVD1QBP2I3IUM57\vcldb290.bplexecutable
MD5:2F377223D522CB65D97985F74CDFD4D8
SHA256:A9A475B658CF202156CE5CB45D14E891970DE8F8F96ADB2D5856E308B096971C
6312setup_patched.exeC:\Users\admin\AppData\Local\Temp\Z6G4PJFMAP75FULUBVD1QBP2I3IUM57\vcl290.bplexecutable
MD5:3E043A4959D3E68162B06DCDB758FAB0
SHA256:92BA4C51E0F68158FCC6FE67CE587AC0C2B3E28DB5CA6E19C5A297E872EC1963
7060vcpkgsrv.exeC:\ProgramData\FNPLicensingService\airstrip.eps
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
45
DNS requests
24
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6924
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6924
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3152
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1596
svchost.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5064
SearchApp.exe
92.123.104.34:443
www.bing.com
Akamai International B.V.
DE
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
40.126.31.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1076
svchost.exe
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
www.bing.com
  • 92.123.104.34
  • 92.123.104.36
  • 92.123.104.38
  • 92.123.104.33
  • 92.123.104.37
  • 92.123.104.40
  • 92.123.104.41
  • 92.123.104.43
  • 92.123.104.46
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
login.live.com
  • 40.126.31.130
  • 40.126.31.131
  • 40.126.31.71
  • 20.190.159.0
  • 20.190.159.129
  • 40.126.31.129
  • 20.190.159.71
  • 20.190.159.128
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
qcleveridea.cyou
  • 104.21.96.1
  • 104.21.112.1
  • 104.21.16.1
  • 104.21.32.1
  • 104.21.48.1
  • 104.21.80.1
  • 104.21.64.1
malicious
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
  • 51.104.136.2
whitelisted
cegu.shop
unknown
u2.latenativereunion.shop
  • 104.21.48.1
  • 104.21.80.1
  • 104.21.32.1
  • 104.21.96.1
  • 104.21.112.1
  • 104.21.16.1
  • 104.21.64.1
unknown

Threats

PID
Process
Class
Message
6312
setup_patched.exe
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
No debug info