File name:

crowdstrike-hotfix.zip

Full analysis: https://app.any.run/tasks/541d5d3d-28fc-4a15-b102-ac1fc82e64e6
Verdict: Malicious activity
Threats:

HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses.

Analysis date: July 22, 2024, 11:19:32
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
hijackloader
loader
remcos
rat
remote
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

1E84736EFCE206DC973ACBC16540D3E5

SHA1:

FEF212EC979F2FE2F48641160AADEB86B83F7B35

SHA256:

C44506FE6E1EDE5A104008755ABF5B6ACE51F1A84AD656A2DCCC7F2C39C0ECA2

SSDEEP:

98304:tqYE8lPCNYpYpkNU7Tfb5WK0ZLcCb9C52ycVfRRX2/o+czw94RF+XfUpyO7crJg1:bNDJ5+uzMWJ3

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 1032)
      • Setup.exe (PID: 5492)
    • HIJACKLOADER has been detected (YARA)

      • cmd.exe (PID: 5936)
      • explorer.exe (PID: 8004)
      • cmd.exe (PID: 7296)
    • REMCOS has been detected

      • explorer.exe (PID: 8004)
      • explorer.exe (PID: 7464)
    • REMCOS has been detected (SURICATA)

      • explorer.exe (PID: 8004)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 1032)
    • Process drops SQLite DLL files

      • WinRAR.exe (PID: 1032)
      • Setup.exe (PID: 5492)
      • WinRAR.exe (PID: 8000)
    • Executable content was dropped or overwritten

      • Setup.exe (PID: 5492)
    • Starts CMD.EXE for commands execution

      • Setup.exe (PID: 5492)
      • Setup.exe (PID: 3624)
      • Setup.exe (PID: 5156)
    • Contacting a server suspected of hosting an CnC

      • explorer.exe (PID: 8004)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1032)
      • WinRAR.exe (PID: 8000)
    • Checks supported languages

      • Setup.exe (PID: 5492)
      • vlc.exe (PID: 7164)
      • Setup.exe (PID: 3624)
      • Setup.exe (PID: 5156)
    • Creates files or folders in the user directory

      • Setup.exe (PID: 5492)
      • explorer.exe (PID: 8004)
    • Reads the computer name

      • Setup.exe (PID: 5492)
      • vlc.exe (PID: 7164)
      • Setup.exe (PID: 3624)
      • Setup.exe (PID: 5156)
    • Create files in a temporary directory

      • Setup.exe (PID: 5492)
      • Setup.exe (PID: 3624)
      • Setup.exe (PID: 5156)
    • Reads Microsoft Office registry keys

      • WinRAR.exe (PID: 1032)
      • OpenWith.exe (PID: 2728)
    • Manual execution by a user

      • WinRAR.exe (PID: 8000)
      • cmd.exe (PID: 2104)
      • Setup.exe (PID: 5156)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 8000)
    • Checks proxy server information

      • explorer.exe (PID: 8004)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 8004)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2024:07:19 07:46:20
ZipCRC: 0x42981c68
ZipCompressedSize: 779055
ZipUncompressedSize: 2012160
ZipFileName: vcl120.bpl
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
157
Monitored processes
20
Malicious processes
7
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe setup.exe #HIJACKLOADER cmd.exe no specs conhost.exe no specs slui.exe no specs slui.exe no specs vlc.exe no specs #REMCOS explorer.exe winrar.exe rundll32.exe no specs cmd.exe no specs conhost.exe no specs setup.exe no specs cmd.exe no specs conhost.exe no specs explorer.exe no specs openwith.exe no specs setup.exe no specs #HIJACKLOADER cmd.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1020C:\WINDOWS\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
1032"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\crowdstrike-hotfix.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1144\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1960C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
2104"C:\Windows\System32\cmd.exe" C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\wldp.dll
2728C:\WINDOWS\system32\OpenWith.exe -EmbeddingC:\Windows\System32\OpenWith.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
3624Setup.exeC:\Users\admin\Desktop\crowdstrike-hotfix\Setup.execmd.exe
User:
admin
Company:
iTop Inc.
Integrity Level:
MEDIUM
Description:
iTop Data Recovery Backup
Exit code:
1
Version:
1.0.0.418
Modules
Images
c:\users\admin\desktop\crowdstrike-hotfix\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
4156\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5156"C:\Users\admin\Desktop\crowdstrike-hotfix\Setup.exe" C:\Users\admin\Desktop\crowdstrike-hotfix\Setup.exeexplorer.exe
User:
admin
Company:
iTop Inc.
Integrity Level:
MEDIUM
Description:
iTop Data Recovery Backup
Exit code:
1
Version:
1.0.0.418
Modules
Images
c:\users\admin\desktop\crowdstrike-hotfix\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
5492"C:\Users\admin\AppData\Local\Temp\Rar$EXa1032.49701\Setup.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa1032.49701\Setup.exe
WinRAR.exe
User:
admin
Company:
iTop Inc.
Integrity Level:
MEDIUM
Description:
iTop Data Recovery Backup
Exit code:
1
Version:
1.0.0.418
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa1032.49701\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
Total events
22 119
Read events
22 074
Write events
45
Delete events
0

Modification events

(PID) Process:(1032) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1032) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1032) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(1032) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\crowdstrike-hotfix.zip
(PID) Process:(1032) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1032) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1032) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1032) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1032) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1032) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
23
Suspicious files
15
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
1032WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1032.49701\vcl120.bplbinary
MD5:849070EBD34CBAEDC525599D6C3F8914
SHA256:B6F321A48812DC922B26953020C9A60949EC429A921033CFAF1E9F7D088EE628
1032WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1032.49701\battuta.flvbinary
MD5:8274785D42B79444767FB0261746FE91
SHA256:BE074196291CCF74B3C4C8BD292F92DA99EC37A25DC8AF651BD0BA3F0D020349
1032WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1032.49701\datastate.dllexecutable
MD5:28F0CCF746F952F94FF434CA989B7814
SHA256:6010E2147A0F51A7BFA2F942A5A9EAAD9A294F463F717963B486ED3F53D305C2
1032WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1032.49701\maddisAsm_.bplexecutable
MD5:84BC072F8EA30746F0982AFBDA3C638F
SHA256:52019F47F96CA868FA4E747C3B99CBA1B7AA57317BF8EBF9FCBF09AA576FE006
1032WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1032.49701\instrucciones.txttext
MD5:11D67598BAFFEE39CB3827251F2A255E
SHA256:4F450ABAA4DAF72D974A830B16F91DEED77BA62412804DCA41A6D42A7D8B6FD0
1032WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1032.49701\madbasic_.bplexecutable
MD5:DA03EBD2A8448F53D1BD9E16FC903168
SHA256:D6D5FF8E9DC6D2B195A6715280C2F1BA471048A7CE68D256040672B801FDA0EA
1032WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1032.49701\madexcept_.bplexecutable
MD5:21068DFD733435C866312D35B9432733
SHA256:835F1141ECE59C36B18E76927572D229136AEB12EFF44CB4BA98D7808257C299
1032WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1032.49701\maidenhair.cfgbinary
MD5:451049D3AC526F1ABDD704C3B1FED580
SHA256:931308CFE733376E19D6CD2401E27F8B2945CEC0B9C696AEBE7029EA76D45BF6
5492Setup.exeC:\Users\admin\AppData\Local\controlfm\madbasic_.bplexecutable
MD5:DA03EBD2A8448F53D1BD9E16FC903168
SHA256:D6D5FF8E9DC6D2B195A6715280C2F1BA471048A7CE68D256040672B801FDA0EA
5936cmd.exeC:\Users\admin\AppData\Local\Temp\mxgfdcohhdeuwr
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
35
DNS requests
14
Threats
2

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4716
svchost.exe
40.126.32.74:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
4032
svchost.exe
239.255.255.250:1900
whitelisted
7856
svchost.exe
4.209.32.67:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
5620
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2760
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7972
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7856
svchost.exe
4.208.221.206:443
licensing.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4716
svchost.exe
40.126.32.72:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown

DNS requests

Domain
IP
Reputation
login.live.com
  • 40.126.32.74
  • 40.126.32.72
  • 20.190.160.17
  • 40.126.32.76
  • 40.126.32.136
  • 20.190.160.22
  • 40.126.32.133
  • 20.190.160.14
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 142.250.186.46
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
licensing.mp.microsoft.com
  • 4.208.221.206
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
www.bing.com
  • 2.23.209.188
  • 2.23.209.182
  • 2.23.209.178
  • 2.23.209.189
  • 2.23.209.179
  • 2.23.209.191
  • 2.23.209.183
  • 2.23.209.186
  • 2.23.209.187
whitelisted
fd.api.iris.microsoft.com
  • 20.223.36.55
whitelisted
slscr.update.microsoft.com
  • 40.127.169.103
whitelisted

Threats

PID
Process
Class
Message
8004
explorer.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash
8004
explorer.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
No debug info