URL:

https://mega.nz/file/Mf0kWAhI#DEOJWLRNAb_-WeXAyWssn8JPJ3IY_ETx4pUaUsJ-uY4

Full analysis: https://app.any.run/tasks/f3612137-25c5-40cb-a162-842c587acef0
Verdict: Malicious activity
Threats:

HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses.

Analysis date: July 19, 2024, 17:04:05
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
hijackloader
loader
lumma
stealer
Indicators:
MD5:

CD802A3C037B9CF77BC251736AD720A7

SHA1:

63DF6C39D699DD9F122C5054EE393F17245FFC7D

SHA256:

F9E9C0F7C2D696A066B69EA3497090DC6D618CF94CF53CAF06B66C65D3E909D5

SSDEEP:

3:N8X/idk/3ypijTBMtloLb1woIpR:2IkaIyPgepR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • more.com (PID: 7100)
    • LUMMA has been detected (YARA)

      • more.com (PID: 7100)
      • qacyxoji.au3 (PID: 5024)
    • HIJACKLOADER has been detected (YARA)

      • more.com (PID: 7100)
      • qacyxoji.au3 (PID: 5024)
    • LUMMA has been detected (SURICATA)

      • qacyxoji.au3 (PID: 5024)
    • Stealers network behavior

      • qacyxoji.au3 (PID: 5024)
    • Actions looks like stealing of personal data

      • qacyxoji.au3 (PID: 5024)
  • SUSPICIOUS

    • Application launched itself

      • WinRAR.exe (PID: 7196)
      • Taskmgr.exe (PID: 4020)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 7196)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 2632)
    • Starts application with an unusual extension

      • Setup.exe (PID: 6288)
      • more.com (PID: 7100)
    • Executable content was dropped or overwritten

      • more.com (PID: 7100)
    • Searches for installed software

      • qacyxoji.au3 (PID: 5024)
  • INFO

    • The process uses the downloaded file

      • WinRAR.exe (PID: 7196)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 2632)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2632)
    • Reads security settings of Internet Explorer

      • Taskmgr.exe (PID: 7220)
      • Taskmgr.exe (PID: 4020)
    • Create files in a temporary directory

      • Setup.exe (PID: 6288)
      • more.com (PID: 7100)
    • Reads the computer name

      • more.com (PID: 7100)
      • Setup.exe (PID: 6288)
      • qacyxoji.au3 (PID: 5024)
    • Checks supported languages

      • Setup.exe (PID: 6288)
      • more.com (PID: 7100)
      • qacyxoji.au3 (PID: 5024)
    • Reads the software policy settings

      • qacyxoji.au3 (PID: 5024)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Lumma

(PID) Processunknown
C2 (9)upknittsoappz.shop
sicillyosopzv.shop
callosallsaospz.shop
outpointsozp.shop
shepherdlyopzc.shop
unseaffarignsk.shop
indexterityszcoxp.shop
liernessfornicsa.shop
lariatedzugspd.shop
(PID) Processunknown
C2 (9)upknittsoappz.shop
sicillyosopzv.shop
callosallsaospz.shop
outpointsozp.shop
shepherdlyopzc.shop
unseaffarignsk.shop
indexterityszcoxp.shop
liernessfornicsa.shop
lariatedzugspd.shop
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
163
Monitored processes
9
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
taskmgr.exe no specs winrar.exe taskmgr.exe #LUMMA qacyxoji.au3 setup.exe #LUMMA more.com winrar.exe no specs taskmgr.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1068"C:\WINDOWS\system32\taskmgr.exe" /4C:\Windows\System32\Taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Manager
Exit code:
3221226540
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
2632"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Rar$DIa7196.49618\use_2024_tо_оpen.rarC:\Program Files\WinRAR\WinRAR.exe
WinRAR.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4020"C:\WINDOWS\system32\taskmgr.exe" /4C:\Windows\System32\Taskmgr.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Manager
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
5024C:\Users\admin\AppData\Local\Temp\qacyxoji.au3C:\Users\admin\AppData\Local\Temp\qacyxoji.au3
more.com
User:
admin
Company:
AutoIt Team
Integrity Level:
HIGH
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 5
Modules
Images
c:\users\admin\appdata\local\temp\xcqjofsgqjqogx
c:\users\admin\appdata\local\temp\qacyxoji.au3
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\psapi.dll
6288"C:\Users\admin\Desktop\a\Setup.exe" C:\Users\admin\Desktop\a\Setup.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\desktop\a\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
7100C:\WINDOWS\SysWOW64\more.comC:\Windows\SysWOW64\more.com
Setup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
More Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\more.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7196"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\Classicfullvers_set-UP_01168-03.zip" C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7220"C:\WINDOWS\system32\taskmgr.exe" /1C:\Windows\System32\Taskmgr.exeTaskmgr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Manager
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
8140\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemore.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
15 992
Read events
15 917
Write events
67
Delete events
8

Modification events

(PID) Process:(7196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(7196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(7196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(7196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Downloads\Classicfullvers_set-UP_01168-03.zip
(PID) Process:(7196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(7196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
9
Suspicious files
1
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
7196WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa7196.49618\use_2024_tо_оpen.rar
MD5:
SHA256:
7100more.comC:\Users\admin\AppData\Local\Temp\xcqjofsgqjqogx
MD5:
SHA256:
2632WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2632.629\plugins\NvStWizexecutable
MD5:9E82E3B658393BED3F7E4F090DF1FBE7
SHA256:C2AD5BD189DF04B39BE18DEC5CD251CF79B066010706AD26D99DF7E49FD07762
4020Taskmgr.exeC:\Users\admin\AppData\Local\D3DSCache\3534848bb9f4cb71\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.locktext
MD5:F49655F856ACB8884CC0ACE29216F511
SHA256:7852FCE59C67DDF1D6B8B997EAA1ADFAC004A9F3A91C37295DE9223674011FBA
6288Setup.exeC:\Users\admin\AppData\Local\Temp\b3175f7fbinary
MD5:8E198B99AEE718122925A8A043D20C8E
SHA256:8C17A4686A5E4FC5490157A9C2CB2C7B9E2542719963D7397A48BD9C0CB36B81
2632WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2632.629\libvlc.dllexecutable
MD5:96214B94B796BFFC48D63289854AE5A2
SHA256:528C416CFB4813EE5F1DA52743EF4ADB20043171230098B27E25D1DD90E3F288
2632WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2632.629\plugins\lang-1058.dllexecutable
MD5:41C75E831A5571C3F72287794391A0E6
SHA256:B3AD99AFDAEE3B9365E7A3FFCC44C2761E22A4F92DFF5E5EFDC52F6B08EA0105
2632WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2632.629\Setup.exeexecutable
MD5:0D2FF13B2906B77339600254EDB31F0D
SHA256:FDAF718247FD123A912A6858B536DE2DB3A217A4845416719C195C74DBF4CFB5
2632WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2632.629\plugins\Microsoft.VisualStudio.VsWebProtocolexecutable
MD5:91ACF072FE60B3EF9867FAEC1A7A8CB0
SHA256:1F49ADC807A564E7C1ECF32F58074A1230A6FE4764E8F54CE7FFA8C2E880DCCA
2632WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2632.629\plugins\lang-1049.dllexecutable
MD5:0AC98A4BFC717523E344010A42C2F4BA
SHA256:68546336232AA2BE277711AFA7C1F08ECD5FCC92CC182F90459F0C61FB39507F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
24
TCP/UDP connections
92
DNS requests
102
Threats
19

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
POST
200
184.24.77.80:80
http://r11.o.lencr.org/
unknown
unknown
POST
200
184.24.77.47:80
http://r10.o.lencr.org/
unknown
unknown
POST
200
184.24.77.56:80
http://r3.o.lencr.org/
unknown
unknown
POST
200
184.24.77.47:80
http://r10.o.lencr.org/
unknown
unknown
POST
200
104.18.38.233:80
http://ocsp.sectigo.com/
unknown
unknown
POST
200
104.18.38.233:80
http://ocsp.sectigo.com/
unknown
unknown
POST
200
104.18.38.233:80
http://ocsp.sectigo.com/
unknown
unknown
POST
200
184.24.77.80:80
http://r11.o.lencr.org/
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
5620
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4716
svchost.exe
40.126.32.72:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
4.209.32.198:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
239.255.255.250:1900
whitelisted
40.113.110.67:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
31.216.144.5:443
mega.nz
Datacenter Luxembourg S.A.
LU
unknown
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
34.117.188.166:443
contile.services.mozilla.com
GOOGLE-CLOUD-PLATFORM
US
unknown
34.160.144.191:443
content-signature-2.cdn.mozilla.net
GOOGLE
US
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
whitelisted
login.live.com
  • 40.126.32.72
  • 40.126.32.76
  • 40.126.32.134
  • 20.190.160.14
  • 40.126.32.133
  • 40.126.32.74
  • 40.126.32.140
  • 40.126.32.136
whitelisted
google.com
  • 216.58.212.174
whitelisted
mega.nz
  • 31.216.144.5
  • 31.216.145.5
  • 2a0b:e46:1:144::5
  • 2a0b:e46:1:145::5
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
contile.services.mozilla.com
  • 34.117.188.166
whitelisted
example.org
  • 93.184.215.14
whitelisted
ipv4only.arpa
  • 192.0.0.171
  • 192.0.0.170
whitelisted
spocs.getpocket.com
  • 34.117.188.166
whitelisted

Threats

PID
Process
Class
Message
Misc activity
ET INFO File Sharing Related Domain in DNS Lookup (mega .nz)
Misc activity
ET INFO File Sharing Related Domain in DNS Lookup (mega .nz)
Misc activity
ET INFO File Sharing Domain Observed in TLS SNI (mega .nz)
Misc activity
ET INFO File Sharing Related Domain in DNS Lookup (mega .nz)
Misc activity
ET INFO File Sharing Domain Observed in TLS SNI (mega .nz)
Misc activity
ET INFO Observed DNS Query to Filesharing Service (mega .co .nz)
Misc activity
ET INFO Observed DNS Query to Filesharing Service (mega .co .nz)
Misc activity
ET INFO Observed DNS Query to Filesharing Service (mega .co .nz)
Misc activity
ET INFO Observed DNS Query to Filesharing Service (mega .co .nz)
Misc activity
ET INFO Observed DNS Query to Filesharing Service (mega .co .nz)
No debug info