| File name: | cefc8719f20f3fe626bb1b1ff1e16655561ddc0d1e1d2f0a8d54a9752a1419c4.exe |
| Full analysis: | https://app.any.run/tasks/fdc013a2-a1ab-44c4-82d4-77e042558c5d |
| Verdict: | Malicious activity |
| Threats: | HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses. |
| Analysis date: | March 05, 2026, 03:49:05 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 11 sections |
| MD5: | 0F3ED0AAC5872BAE70883214D93A4FA0 |
| SHA1: | 834E05A9CB95ED0B135BD1F8A31B40A44C3EA0A7 |
| SHA256: | CEFC8719F20F3FE626BB1B1FF1E16655561DDC0D1E1D2F0A8D54A9752A1419C4 |
| SSDEEP: | 98304:1rq3BdwpcPzv6Y//teZpwZsN5rDMT+sehfoV6b8EkFniSmzv9LOiprZ8Gd3JWYSP:n9tb1ta1D5cMH |
| .exe | | | Inno Setup installer (53.5) |
|---|---|---|
| .exe | | | InstallShield setup (21) |
| .exe | | | Win32 EXE PECompact compressed (generic) (20.2) |
| .exe | | | Win32 Executable (generic) (2.1) |
| .exe | | | Win16/32 Executable Delphi generic (1) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2024:07:12 07:26:53+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 685056 |
| InitializedDataSize: | 159744 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xa83bc |
| OSVersion: | 6.1 |
| ImageVersion: | - |
| SubsystemVersion: | 6.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 2.0.0.0 |
| ProductVersionNumber: | 2.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | This installation was built with Inno Setup. |
| CompanyName: | |
| FileDescription: | Holt Setup |
| FileVersion: | 2.0.0.0 |
| LegalCopyright: | |
| OriginalFileName: | |
| ProductName: | Holt |
| ProductVersion: | 4.6 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1044 | "C:\Users\admin\AppData\Local\Temp\is-14NF8.tmp\cefc8719f20f3fe626bb1b1ff1e16655561ddc0d1e1d2f0a8d54a9752a1419c4.tmp" /SL5="$903AE,7068991,845824,C:\Users\admin\Desktop\cefc8719f20f3fe626bb1b1ff1e16655561ddc0d1e1d2f0a8d54a9752a1419c4.exe" | C:\Users\admin\AppData\Local\Temp\is-14NF8.tmp\cefc8719f20f3fe626bb1b1ff1e16655561ddc0d1e1d2f0a8d54a9752a1419c4.tmp | cefc8719f20f3fe626bb1b1ff1e16655561ddc0d1e1d2f0a8d54a9752a1419c4.exe | ||||||||||||
User: admin Company: Integrity Level: MEDIUM Description: Setup/Uninstall Exit code: 1 Version: 51.1052.0.0 Modules
| |||||||||||||||
| 1956 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2292 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2340 | "C:\Users\admin\Desktop\cefc8719f20f3fe626bb1b1ff1e16655561ddc0d1e1d2f0a8d54a9752a1419c4.exe" | C:\Users\admin\Desktop\cefc8719f20f3fe626bb1b1ff1e16655561ddc0d1e1d2f0a8d54a9752a1419c4.exe | explorer.exe | ||||||||||||
User: admin Company: Integrity Level: MEDIUM Description: Holt Setup Exit code: 1 Version: 2.0.0.0 Modules
| |||||||||||||||
| 2428 | C:\Users\admin\AppData\Local\Temp\servicebrowserv5.exe | C:\Users\admin\AppData\Local\Temp\servicebrowserv5.exe | cmd.exe | ||||||||||||
User: admin Company: Caphyon Integrity Level: MEDIUM Description: updater 18.0 Version: 18.0 Modules
Tofsee(PID) Process(2428) servicebrowserv5.exe C2 (2)vanaheim.cn jotunheim.name Encrypted Strings (59)c:\Windows \system32\ ImagePath .exe SOFTWARE\Microsoft\Windows\CurrentVersion\Run SOFTWARE\Microsoft\Windows\CurrentVersion\Run MSConfig /r .exe cmd /C move /Y "%s" %s
sc config %s binPath= "%s%s /d\"%s\""
sc start %s svchost.exe SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ConsentPromptBehaviorAdmin PromptOnSecureDesktop MSConfig :.repos USERPROFILE \Local Settings:.repos USERPROFILE \Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.repos USERPROFILE \wincookie.repos TMP Config Control Panel\Buses Config SOFTWARE\Microsoft\Buses Config Control Panel\Buses Config SOFTWARE\Microsoft\Buses SYSTEM\CurrentControlSet\services ImagePath SYSTEM\CurrentControlSet\services SYSTEM\CurrentControlSet\services SOFTWARE\Microsoft\Windows\CurrentVersion\Run SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths SOFTWARE\Microsoft\Windows\CurrentVersion\Run SOFTWARE\Microsoft\Windows\CurrentVersion\Run .exe qazwsxed %s%i%i%i%i.bat @echo off
:next_try
del "%s">nul
if exist "%s" (
ping 127.0.0.1 >nul
goto next_try
)
del %%0 svchost.exe .exe /u USERPROFILE SOFTWARE\Microsoft\Windows\CurrentVersion\Run /d /e /d /e .exe "%s" /u"%s" USERPROFILE .exe USERPROFILE USERPROFILE ver=%d lid=%d
win=%X/%d sid=%s
rep=%s | |||||||||||||||
| 3952 | "C:\Users\admin\AppData\Roaming\controlupdateFe\Adobe QT32 Server.exe" | C:\Users\admin\AppData\Roaming\controlupdateFe\Adobe QT32 Server.exe | — | Adobe QT32 Server.exe | |||||||||||
User: admin Company: Adobe Systems Incorporated Integrity Level: MEDIUM Description: Adobe Media Core.0 Exit code: 1 Version: 8.0.0.0 Modules
| |||||||||||||||
| 6152 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7272 | C:\WINDOWS\SysWOW64\cmd.exe | C:\Windows\SysWOW64\cmd.exe | Adobe QT32 Server.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7420 | "C:\Users\admin\AppData\Local\Temp\is-EJ6N5.tmp\Adobe QT32 Server.exe" | C:\Users\admin\AppData\Local\Temp\is-EJ6N5.tmp\Adobe QT32 Server.exe | cefc8719f20f3fe626bb1b1ff1e16655561ddc0d1e1d2f0a8d54a9752a1419c4.tmp | ||||||||||||
User: admin Company: Adobe Systems Incorporated Integrity Level: MEDIUM Description: Adobe Media Core.0 Exit code: 0 Version: 8.0.0.0 Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2340 | cefc8719f20f3fe626bb1b1ff1e16655561ddc0d1e1d2f0a8d54a9752a1419c4.exe | C:\Users\admin\AppData\Local\Temp\is-14NF8.tmp\cefc8719f20f3fe626bb1b1ff1e16655561ddc0d1e1d2f0a8d54a9752a1419c4.tmp | executable | |
MD5:07C7C2FDE792EB5E1CCA2B470F54B989 | SHA256:B88972F6EF8B8BD3ED59988E612AF24F0A9F4062340DAD34B4C71F1BC66090A4 | |||
| 1044 | cefc8719f20f3fe626bb1b1ff1e16655561ddc0d1e1d2f0a8d54a9752a1419c4.tmp | C:\Users\admin\AppData\Local\Temp\is-EJ6N5.tmp\_isetup\_setup64.tmp | executable | |
MD5:E4211D6D009757C078A9FAC7FF4F03D4 | SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95 | |||
| 1044 | cefc8719f20f3fe626bb1b1ff1e16655561ddc0d1e1d2f0a8d54a9752a1419c4.tmp | C:\Users\admin\AppData\Local\Temp\is-EJ6N5.tmp\boost_date_time.dll | executable | |
MD5:E4862728552671212C86B50470710BEB | SHA256:83A6FF307C32692F8775302315295E6A814701D5A617621C25B935CF9660D50F | |||
| 1044 | cefc8719f20f3fe626bb1b1ff1e16655561ddc0d1e1d2f0a8d54a9752a1419c4.tmp | C:\Users\admin\AppData\Local\Temp\is-EJ6N5.tmp\Adobe QT32 Server.exe | executable | |
MD5:A5EE3594A2A4697E0D71A1C3E622BD1F | SHA256:FBEB72331182532C5FD95078450DF53B08A0FD405E3AAED3DEA7265F8466F2EC | |||
| 1044 | cefc8719f20f3fe626bb1b1ff1e16655561ddc0d1e1d2f0a8d54a9752a1419c4.tmp | C:\Users\admin\AppData\Local\Temp\is-EJ6N5.tmp\boost_threads.dll | executable | |
MD5:44D1D2711F5FF5C0D5A566BEEED1FBE2 | SHA256:882F809095A5A2B8BE3C5A26D5882632D99B0622DB904DCA3FFCB48FD093D91C | |||
| 1044 | cefc8719f20f3fe626bb1b1ff1e16655561ddc0d1e1d2f0a8d54a9752a1419c4.tmp | C:\Users\admin\AppData\Local\Temp\is-EJ6N5.tmp\boost_system.dll | executable | |
MD5:CEF0081A028FDA210C1AD6417865CC95 | SHA256:4F3A1C28B3A15E6FBB3EA635B2C43FEA7DE4A797543B5CF2142FE6B0240F2C5F | |||
| 1044 | cefc8719f20f3fe626bb1b1ff1e16655561ddc0d1e1d2f0a8d54a9752a1419c4.tmp | C:\Users\admin\AppData\Local\Temp\is-EJ6N5.tmp\ASLFoundation.dll | executable | |
MD5:87092962B52CDBA210625D0496579956 | SHA256:61209252CA938A4E11CB665A2C2E8D258484433A620DD3F9200A224AAF59618B | |||
| 1044 | cefc8719f20f3fe626bb1b1ff1e16655561ddc0d1e1d2f0a8d54a9752a1419c4.tmp | C:\Users\admin\AppData\Local\Temp\is-EJ6N5.tmp\ASLUnitTesting.dll | executable | |
MD5:1D03D84016D622F18C1A9CCAC5E5B2A2 | SHA256:E486BF68D27EFC72DE8DD43DC16297068B733AB83B8925A43854523DCE0EBEA9 | |||
| 1044 | cefc8719f20f3fe626bb1b1ff1e16655561ddc0d1e1d2f0a8d54a9752a1419c4.tmp | C:\Users\admin\AppData\Local\Temp\is-EJ6N5.tmp\ASLMessaging.dll | executable | |
MD5:0DAF9BB267ADA3C73831C64468F0B2E5 | SHA256:71C3E619E42F1BB56B879334358247C9BB24219E0A3CA12203CE720B765CC12F | |||
| 1044 | cefc8719f20f3fe626bb1b1ff1e16655561ddc0d1e1d2f0a8d54a9752a1419c4.tmp | C:\Users\admin\AppData\Local\Temp\is-EJ6N5.tmp\dvamediatypes.dll | executable | |
MD5:0641560E5ECD1702AA259AC8C48577E1 | SHA256:3FAA936558703316EDBFB0D57D697F0ED160149B1417F4D5D02D9EF3576FF779 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5780 | svchost.exe | GET | 200 | 2.16.164.120:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 2.16.164.120:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6768 | MoUsoCoreWorker.exe | GET | 200 | 2.16.164.120:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5780 | svchost.exe | GET | 200 | 72.246.29.11:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6768 | MoUsoCoreWorker.exe | GET | 200 | 72.246.29.11:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 72.246.29.11:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6084 | slui.exe | POST | 500 | 48.192.1.65:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | binary | 512 b | whitelisted |
— | — | POST | 500 | 48.192.1.65:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | binary | 512 b | whitelisted |
3292 | svchost.exe | GET | 200 | 72.246.29.11:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl | unknown | — | — | whitelisted |
3292 | svchost.exe | GET | 200 | 72.246.29.11:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
4 | System | 192.168.100.255:137 | — | Not routed | — | whitelisted |
— | — | 184.86.251.27:443 | www.bing.com | AKAMAI-ASN1 | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | Not routed | — | whitelisted |
5780 | svchost.exe | 2.16.164.120:80 | crl.microsoft.com | AKAMAI-ASN1 | NL | whitelisted |
— | — | 2.16.164.120:80 | crl.microsoft.com | AKAMAI-ASN1 | NL | whitelisted |
6768 | MoUsoCoreWorker.exe | 2.16.164.120:80 | crl.microsoft.com | AKAMAI-ASN1 | NL | whitelisted |
5780 | svchost.exe | 72.246.29.11:80 | www.microsoft.com | AKAMAI-AS | US | whitelisted |
— | — | 72.246.29.11:80 | www.microsoft.com | AKAMAI-AS | US | whitelisted |
6768 | MoUsoCoreWorker.exe | 72.246.29.11:80 | www.microsoft.com | AKAMAI-AS | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
microsoft.com |
| whitelisted |
microsoft-com.mail.protection.outlook.com |
| whitelisted |
vanaheim.cn |
| malicious |
activation-v2.sls.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 8 |