Analysis
-
max time kernel
55s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
HitmanPro_x64.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
HitmanPro_x64.exe
Resource
win10v2004-20240802-en
General
-
Target
HitmanPro_x64.exe
-
Size
13.6MB
-
MD5
57ae72bca137c9ec15470087d2a4c378
-
SHA1
e4dd10c770a7ec7993ed47a37d1f7182e907e3ed
-
SHA256
cfeea4ea5121d1e6b1edbd5ca6e575830a0a4cbaf63120bc36639c44e1b89781
-
SHA512
f80d6732e86a8d38db1ff43c0c5058013bd456c4b86b87018166ca073bc84fb8e7676b55371ae9cec668a77d198e1e7f6854a9a93581ed21a32167e3b9533f6e
-
SSDEEP
393216:qPwSxE5xi6RP25MJFjrTuSne6Jz7N/S3:TxP2ufjrCq
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\HitmanPro\HitmanPro.exe HitmanPro_x64.exe File opened for modification C:\Program Files\HitmanPro\HitmanPro.exe HitmanPro_x64.exe File created C:\Program Files\HitmanPro\hmpsched.exe HitmanPro_x64.exe -
Executes dropped EXE 1 IoCs
pid Process 2280 hmpsched.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133677067397597291" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2444 HitmanPro_x64.exe 2444 HitmanPro_x64.exe 2444 HitmanPro_x64.exe 2444 HitmanPro_x64.exe 2444 HitmanPro_x64.exe 2444 HitmanPro_x64.exe 2444 HitmanPro_x64.exe 2444 HitmanPro_x64.exe 1700 chrome.exe 1700 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 1700 chrome.exe Token: SeCreatePagefilePrivilege 1700 chrome.exe Token: SeShutdownPrivilege 1700 chrome.exe Token: SeCreatePagefilePrivilege 1700 chrome.exe Token: SeShutdownPrivilege 1700 chrome.exe Token: SeCreatePagefilePrivilege 1700 chrome.exe Token: SeShutdownPrivilege 1700 chrome.exe Token: SeCreatePagefilePrivilege 1700 chrome.exe Token: SeShutdownPrivilege 1700 chrome.exe Token: SeCreatePagefilePrivilege 1700 chrome.exe Token: SeShutdownPrivilege 1700 chrome.exe Token: SeCreatePagefilePrivilege 1700 chrome.exe Token: SeShutdownPrivilege 1700 chrome.exe Token: SeCreatePagefilePrivilege 1700 chrome.exe Token: SeShutdownPrivilege 1700 chrome.exe Token: SeCreatePagefilePrivilege 1700 chrome.exe Token: SeShutdownPrivilege 1700 chrome.exe Token: SeCreatePagefilePrivilege 1700 chrome.exe Token: SeShutdownPrivilege 1700 chrome.exe Token: SeCreatePagefilePrivilege 1700 chrome.exe Token: SeShutdownPrivilege 1700 chrome.exe Token: SeCreatePagefilePrivilege 1700 chrome.exe Token: SeShutdownPrivilege 1700 chrome.exe Token: SeCreatePagefilePrivilege 1700 chrome.exe Token: SeShutdownPrivilege 1700 chrome.exe Token: SeCreatePagefilePrivilege 1700 chrome.exe Token: SeShutdownPrivilege 1700 chrome.exe Token: SeCreatePagefilePrivilege 1700 chrome.exe Token: SeShutdownPrivilege 1700 chrome.exe Token: SeCreatePagefilePrivilege 1700 chrome.exe Token: SeShutdownPrivilege 1700 chrome.exe Token: SeCreatePagefilePrivilege 1700 chrome.exe Token: SeShutdownPrivilege 1700 chrome.exe Token: SeCreatePagefilePrivilege 1700 chrome.exe Token: SeShutdownPrivilege 1700 chrome.exe Token: SeCreatePagefilePrivilege 1700 chrome.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2444 HitmanPro_x64.exe 2444 HitmanPro_x64.exe 2444 HitmanPro_x64.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 2444 HitmanPro_x64.exe 2444 HitmanPro_x64.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe 1700 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2444 wrote to memory of 880 2444 HitmanPro_x64.exe 97 PID 2444 wrote to memory of 880 2444 HitmanPro_x64.exe 97 PID 1700 wrote to memory of 2788 1700 chrome.exe 103 PID 1700 wrote to memory of 2788 1700 chrome.exe 103 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 1360 1700 chrome.exe 104 PID 1700 wrote to memory of 3912 1700 chrome.exe 105 PID 1700 wrote to memory of 3912 1700 chrome.exe 105 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 PID 1700 wrote to memory of 4872 1700 chrome.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\HitmanPro_x64.exe"C:\Users\Admin\AppData\Local\Temp\HitmanPro_x64.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\HitmanPro_x64.exe"C:\Users\Admin\AppData\Local\Temp\HitmanPro_x64.exe" /update:"C:\Users\Admin\AppData\Local\Temp\HitmanPro_x64.exe"2⤵PID:880
-
-
C:\Program Files\HitmanPro\hmpsched.exe"C:\Program Files\HitmanPro\hmpsched.exe"1⤵
- Executes dropped EXE
PID:2280
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffe5007cc40,0x7ffe5007cc4c,0x7ffe5007cc582⤵PID:2788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1836,i,17220379964666794842,1946232188163803660,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1832 /prefetch:22⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1980,i,17220379964666794842,1946232188163803660,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2104 /prefetch:32⤵PID:3912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,17220379964666794842,1946232188163803660,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2284 /prefetch:82⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,17220379964666794842,1946232188163803660,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3344,i,17220379964666794842,1946232188163803660,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4568,i,17220379964666794842,1946232188163803660,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4616 /prefetch:12⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4452,i,17220379964666794842,1946232188163803660,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4436 /prefetch:82⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5012,i,17220379964666794842,1946232188163803660,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5024 /prefetch:82⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4760,i,17220379964666794842,1946232188163803660,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.6MB
MD557ae72bca137c9ec15470087d2a4c378
SHA1e4dd10c770a7ec7993ed47a37d1f7182e907e3ed
SHA256cfeea4ea5121d1e6b1edbd5ca6e575830a0a4cbaf63120bc36639c44e1b89781
SHA512f80d6732e86a8d38db1ff43c0c5058013bd456c4b86b87018166ca073bc84fb8e7676b55371ae9cec668a77d198e1e7f6854a9a93581ed21a32167e3b9533f6e
-
Filesize
151KB
MD537c82e90529078c1dffc65c59050f4cd
SHA1697495fba0dfa323e11fe73c0bc64ae44b2033fa
SHA256e37128b0a2599fc950263d9c2e800a41ffbdc9b63eb74f3c48f44e8213817a0c
SHA512154df1633c7011c96fbd96728912fda15e0848ce39a1348704a1a83132b220e8f40834fd54771b723ce066e720915d2decb50c923906014e446d8c3c6a01dd90
-
Filesize
649B
MD53a02fb6b2c5caa88cf59711dfe6ea0a4
SHA11dacb8830f9a445ebd25e22955704d88a0921f2e
SHA256a7cd7001f812891959d252019d8cc3132c0b4ac3f3da3dfeb7a4a38d8c79860b
SHA512936f83c6508dfcd8940d4f7ad2f33b0763373934fe85a8116d3e1cf656b9dda8d58a73c857b54bd89a6b506f46f3e3bbaf6f26fee56466740987e1b2070f3cb2
-
Filesize
210KB
MD548d2860dd3168b6f06a4f27c6791bcaa
SHA1f5f803efed91cd45a36c3d6acdffaaf0e863bf8c
SHA25604d7bf7a6586ef00516bdb3f7b96c65e0b9c6b940f4b145121ed00f6116bbb77
SHA512172da615b5b97a0c17f80ddd8d7406e278cd26afd1eb45a052cde0cb55b92febe49773b1e02cf9e9adca2f34abbaa6d7b83eaad4e08c828ef4bf26f23b95584e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD548d59585f0f8fcfe537d2cf0ea09e5b2
SHA10fd3137ea0b34205c2dbf5d986420a5313188b60
SHA25621127bd72156d23cd589a24b8319098e9f3cb931eceb00f4bb829ecc5103c4cb
SHA512f673fad1c9b59d78dfef1d554c9384ddc37d382621a7dc095a85f24f5a073db8bc76bfd7db8ca28b13dee9f7254266bc1d7e38575489614a1ef685db341a75e0
-
Filesize
9KB
MD5089424ddc62f8846d27070629970dfd7
SHA1ac493061bf691a6c55bb86eab64c204e3c971495
SHA256f06a71678b7f39ce0b2f983bf6da3fda697105d13001a7e64a588651a1179582
SHA5123c39b2af93c4b85a2b8f8718fb6cec40b98f62f0ba8c20019372e2bdbd4fd9014f2328a80688523ffffe8aaf95938859e0174a71c7f52a1637a738183341bd46
-
Filesize
15KB
MD5cb615d07791daf7c4a9bd07f8ef2cb32
SHA1e497b383cd0c266e68b937ee75bd6d42df938862
SHA256e737fbc068ceb395cdc793d3e5c1436cf46fc0f95be755841d8a6fb95be77fa6
SHA51215d110579272d888f76d9397913603518b18cf2f7fe303ce08f42c5560cbe597046d1d1d7af7eaee2be21722d44083a482280f3453b9bd17c1a68b39f6b505b6
-
Filesize
194KB
MD5ae21354dddae3096fd548f86410e6dcf
SHA16914fb73f3f64d3eef707593622d0a59aac42f49
SHA25629f03a23b1a075dba4a3af49dc30c8c212b85087ed79ea9c30b94cdc6b850434
SHA512076f33b37b2d815ed0eb2f6d89dd3dd31ff1090a7e118417685a51e025c5d16587c847ebc82922a80f8e2c86e6a8e4630f240a805f61322d49c13ad94492deb4