Analysis
-
max time kernel
76s -
max time network
51s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-07-2024 20:35
Behavioral task
behavioral1
Sample
HITMAN 3 v3.10 Plus 11 Trainer.exe
Resource
win11-20240508-en
General
-
Target
HITMAN 3 v3.10 Plus 11 Trainer.exe
-
Size
1.2MB
-
MD5
f257a0e7008656f9e2fa44a8a14f8d0d
-
SHA1
3469c35ce974b4c7f0531af5116266393779d903
-
SHA256
0e99e5e385e731404a25342a226633594e160f2081bbe4c84a756186ea08a9e8
-
SHA512
e9d9dbadd01ebfcf4ea40d49cbacaab4ac43faaa21c7c0a173032e1382eab52bcf18bc2d26c5618cdd4d7d3642581d5d08a48330551f51617e388ac88e5622ee
-
SSDEEP
24576:vqbohPJKzB1hZXTAZqAovlj6U7wbJ7yDStJQ:bJAXZXcZYvXwV7XJ
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
Processes:
UserOOBEBroker.exedescription ioc process File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe -
Modifies registry class 1 IoCs
Processes:
MiniSearchHost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1672260578-815027929-964132517-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid process 4560 OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
HITMAN 3 v3.10 Plus 11 Trainer.exeAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 1700 HITMAN 3 v3.10 Plus 11 Trainer.exe Token: 33 4964 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4964 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
OpenWith.exeOpenWith.exeMiniSearchHost.exepid process 1060 OpenWith.exe 4560 OpenWith.exe 1160 MiniSearchHost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HITMAN 3 v3.10 Plus 11 Trainer.exe"C:\Users\Admin\AppData\Local\Temp\HITMAN 3 v3.10 Plus 11 Trainer.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:2112
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:4276
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:2464
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D0 0x00000000000004C81⤵
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:4860
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1060
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4560
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3984
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1160
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706B
MD588188263159a4d9251367df1a0d96e18
SHA1394ec68c50bbeb248e9c00070a8832c4c896ba46
SHA256cf8f97909f87a1a47427746bcba4a38405ed66f1397a8f6ad219a7e4d42155d0
SHA512b998464c3e932ae99f7a43ab47e9b44134fc2d455677a922ffe2f787b5859944b61366dcb9fd0af1c5d3c9ef6c01cced1c290baeda8bdf3b021de8541f07becb
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5e9aa12ff0be6d995ed86f8cf88678158
SHA1e5ee38fc2ebef0fcbc3059dee29b39f7daf21931
SHA256f35cd8ef03ac924a59943c5dfffc31ab67a8b5aff272e9f47ff776aabc7ee561
SHA51295a67acd2a4784b87d73910c1f1f590937c9d9b901e98448556a37eb8137ae5f458f1c673d65a46cf7d6b90bee5fe6b102ce3eeac9e819062cd9c5c2418bcbfc