File name:

hmpalert3 pre-patched.exe

Full analysis: https://app.any.run/tasks/96211b3f-005a-446c-8b8c-3338d1481216
Verdict: Malicious activity
Analysis date: March 13, 2022, 20:01:51
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

0487C0E38D35B692CD3D377DEDB095BC

SHA1:

6285BBCCED4775544ECC872DC40C70703D59CE82

SHA256:

429CCA7D807F941601E9E2A37F5E3E2B9B0BC7FA911605391D8811F8A9885B22

SSDEEP:

98304:0MNhUAwMxbAL4mJNvEdE74MlBAz9sIHW1/Q9SsOY4OWe1LX:ZN6tT+o4ZzrW1qSsOROWeR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • hmpalert3 pre-patched.exe (PID: 1884)
    • Loads dropped or rewritten executable

      • hmpalert.exe (PID: 3864)
  • SUSPICIOUS

    • Reads the computer name

      • hmpalert3 pre-patched.exe (PID: 1884)
      • hmpalert.exe (PID: 3864)
      • hmpalert3 pre-patched.exe (PID: 3752)
      • hmpalert.exe (PID: 2068)
    • Creates a software uninstall entry

      • hmpalert3 pre-patched.exe (PID: 1884)
      • hmpalert.exe (PID: 3864)
    • Drops a file that was compiled in debug mode

      • hmpalert3 pre-patched.exe (PID: 1884)
    • Creates files in the driver directory

      • hmpalert3 pre-patched.exe (PID: 1884)
    • Checks supported languages

      • hmpalert.exe (PID: 3864)
      • hmpalert3 pre-patched.exe (PID: 1884)
      • hmpalert3 pre-patched.exe (PID: 3752)
      • hmpalert.exe (PID: 2068)
    • Creates or modifies windows services

      • hmpalert3 pre-patched.exe (PID: 1884)
    • Creates/Modifies COM task schedule object

      • hmpalert3 pre-patched.exe (PID: 1884)
    • Creates a directory in Program Files

      • hmpalert3 pre-patched.exe (PID: 1884)
    • Executable content was dropped or overwritten

      • hmpalert3 pre-patched.exe (PID: 1884)
    • Creates files in the program directory

      • hmpalert3 pre-patched.exe (PID: 1884)
      • hmpalert.exe (PID: 3864)
    • Searches for installed software

      • hmpalert.exe (PID: 2068)
      • hmpalert3 pre-patched.exe (PID: 1884)
      • hmpalert.exe (PID: 3864)
    • Creates files in the Windows directory

      • hmpalert3 pre-patched.exe (PID: 1884)
    • Application launched itself

      • hmpalert3 pre-patched.exe (PID: 3752)
      • hmpalert.exe (PID: 3864)
    • Executed as Windows Service

      • hmpalert.exe (PID: 3864)
  • INFO

    • Checks Windows Trust Settings

      • hmpalert.exe (PID: 3864)
    • Reads settings of System Certificates

      • hmpalert.exe (PID: 3864)
      • hmpalert.exe (PID: 2068)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (18)
.exe | Win32 Executable (generic) (2.9)
.exe | Generic Win/DOS Executable (1.3)
.exe | DOS Executable Generic (1.3)

EXIF

EXE

Comments: Incorporates Threatstar Exploit Mitigation Platform (EMP)
ProductVersion: 3.8.19.923
ProductName: HitmanPro.Alert
OriginalFileName: hmpalert.exe
LegalCopyright: © 2013-2021 SurfRight A Sophos Company
InternalName: hmpalert.exe
FileVersion: 3.8.19.923
FileDescription: HitmanPro.Alert
CompanyName: SurfRight B.V.
CharacterSet: Unicode
LanguageCode: Process default
FileSubtype: -
ObjectFileType: Executable application
FileOS: Windows NT 32-bit
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 3.8.19.923
FileVersionNumber: 3.8.19.923
Subsystem: Windows GUI
SubsystemVersion: 5.1
ImageVersion: -
OSVersion: 5.1
EntryPoint: 0x2174b0
UninitializedDataSize: -
InitializedDataSize: 2607616
CodeSize: 2544128
LinkerVersion: 14.16
PEType: PE32
TimeStamp: 2021:11:26 12:31:16+01:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 26-Nov-2021 11:31:16
Detected languages:
  • English - United States
  • Process Default Language
TLS Callbacks: 2 callback(s) detected.
Debug artifacts:
  • C:\Surfright\Products\Alert\branch-8xx\bin\Release\hmpalert.pdb
CompanyName: SurfRight B.V.
FileDescription: HitmanPro.Alert
FileVersion: 3.8.19.923
InternalName: hmpalert.exe
LegalCopyright: © 2013-2021 SurfRight A Sophos Company
OriginalFilename: hmpalert.exe
ProductName: HitmanPro.Alert
ProductVersion: 3.8.19.923
Comments: Incorporates Threatstar Exploit Mitigation Platform (EMP)

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000120

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 6
Time date stamp: 26-Nov-2021 11:31:16
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x0026D1DA
0x0026D200
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.63552
.rdata
0x0026F000
0x00072CF4
0x00072E00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.43789
.data
0x002E2000
0x00013634
0x0000E600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
6.30857
.didat
0x002F6000
0x000003EC
0x00000400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.46543
.rsrc
0x002F7000
0x001DE000
0x001DD200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.93059
.reloc
0x004D5000
0x0001DF60
0x0001E000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.68671

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.18199
1977
Latin 1 / Western European
English - United States
RT_MANIFEST
2
3.61657
21640
Latin 1 / Western European
UNKNOWN
RT_ICON
3
3.52408
16936
Latin 1 / Western European
UNKNOWN
RT_ICON
4
3.67269
9640
Latin 1 / Western European
UNKNOWN
RT_ICON
5
4.15253
4264
Latin 1 / Western European
UNKNOWN
RT_ICON
6
4.6746
2440
Latin 1 / Western European
UNKNOWN
RT_ICON
7
5.35762
1128
Latin 1 / Western European
UNKNOWN
RT_ICON
8
4.98141
4264
Latin 1 / Western European
UNKNOWN
RT_ICON
9
5.84095
1128
Latin 1 / Western European
UNKNOWN
RT_ICON
10
0.913491
4264
Latin 1 / Western European
UNKNOWN
RT_ICON

Imports

FLTLIB.DLL
GDI32.dll (delay-loaded)
KERNEL32.dll
MPR.dll
NETAPI32.dll
USER32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start hmpalert3 pre-patched.exe no specs hmpalert3 pre-patched.exe hmpalert.exe hmpalert.exe

Process information

PID
CMD
Path
Indicators
Parent process
1884"C:\Users\admin\AppData\Local\Temp\hmpalert3 pre-patched.exe" /elevatedC:\Users\admin\AppData\Local\Temp\hmpalert3 pre-patched.exe
hmpalert3 pre-patched.exe
User:
admin
Company:
SurfRight B.V.
Integrity Level:
HIGH
Description:
HitmanPro.Alert
Exit code:
0
Version:
3.8.19.923
Modules
Images
c:\users\admin\appdata\local\temp\hmpalert3 pre-patched.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\fltlib.dll
2068"C:\Program Files\HitmanPro.Alert\hmpalert.exe" /trayC:\Program Files\HitmanPro.Alert\hmpalert.exe
hmpalert.exe
User:
admin
Company:
SurfRight B.V.
Integrity Level:
MEDIUM
Description:
HitmanPro.Alert
Exit code:
0
Version:
3.8.19.923
3752"C:\Users\admin\AppData\Local\Temp\hmpalert3 pre-patched.exe" C:\Users\admin\AppData\Local\Temp\hmpalert3 pre-patched.exeExplorer.EXE
User:
admin
Company:
SurfRight B.V.
Integrity Level:
MEDIUM
Description:
HitmanPro.Alert
Exit code:
1
Version:
3.8.19.923
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\appdata\local\temp\hmpalert3 pre-patched.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\fltlib.dll
3864"C:\Program Files\HitmanPro.Alert\hmpalert.exe" /serviceC:\Program Files\HitmanPro.Alert\hmpalert.exe
services.exe
User:
SYSTEM
Company:
SurfRight B.V.
Integrity Level:
SYSTEM
Description:
HitmanPro.Alert
Exit code:
0
Version:
3.8.19.923
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\hitmanpro.alert\hmpalert.exe
c:\windows\system32\hmpalert.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
Total events
1 774
Read events
1 385
Write events
389
Delete events
0

Modification events

(PID) Process:(3752) hmpalert3 pre-patched.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3752) hmpalert3 pre-patched.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3752) hmpalert3 pre-patched.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3752) hmpalert3 pre-patched.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1884) hmpalert3 pre-patched.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\eventlog\Application\HitmanPro.Alert
Operation:writeName:EventMessageFile
Value:
C:\Users\admin\AppData\Local\Temp\hmpalert3 pre-patched.exe
(PID) Process:(1884) hmpalert3 pre-patched.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\eventlog\Application\HitmanPro.Alert
Operation:writeName:TypesSupported
Value:
7
(PID) Process:(1884) hmpalert3 pre-patched.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\eventlog\Application\HitmanPro.Alert
Operation:writeName:CategoryMessageFile
Value:
C:\Users\admin\AppData\Local\Temp\hmpalert3 pre-patched.exe
(PID) Process:(1884) hmpalert3 pre-patched.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\eventlog\Application\HitmanPro.Alert
Operation:writeName:CategoryCount
Value:
9
(PID) Process:(1884) hmpalert3 pre-patched.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\HitmanPro.Alert
Operation:writeName:DisplayName
Value:
HitmanPro.Alert 3
(PID) Process:(1884) hmpalert3 pre-patched.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\HitmanPro.Alert
Operation:writeName:DisplayVersion
Value:
3.8.19.923
Executable files
4
Suspicious files
0
Text files
1
Unknown types
1

Dropped files

PID
Process
Filename
Type
1884hmpalert3 pre-patched.exeC:\Windows\system32\hmpalert.dllexecutable
MD5:
SHA256:
1884hmpalert3 pre-patched.exeC:\ProgramData\Microsoft\Event Viewer\Views\hmpalert.xmltext
MD5:866D5C1AF8E4D3B5B517BBBC3896588B
SHA256:4437FED2DD4C5CC1A88711DF343D263BCE08C1601FD4B711AEAF1524C1E1529D
1884hmpalert3 pre-patched.exeC:\ProgramData\Microsoft\Windows\Start Menu\Programs\HitmanPro.Alert\HitmanPro.Alert.lnklnk
MD5:
SHA256:
1884hmpalert3 pre-patched.exeC:\Windows\system32\drivers\hmpalert.sysexecutable
MD5:
SHA256:
1884hmpalert3 pre-patched.exeC:\Windows\system32\hmpshell.dllexecutable
MD5:
SHA256:
1884hmpalert3 pre-patched.exeC:\Program Files\HitmanPro.Alert\hmpalert.exeexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2068
hmpalert.exe
23.97.160.56:443
alert.hitmanpro.com
Microsoft Corporation
NL
whitelisted

DNS requests

Domain
IP
Reputation
alert.hitmanpro.com
  • 23.97.160.56
suspicious

Threats

No threats detected
Process
Message
hmpalert.exe
Service: starting
hmpalert.exe
Service: mode 1
hmpalert.exe
LoadCompressed() failed with error 2
hmpalert.exe
FalsePositiveManager: not initialized
hmpalert.exe
Antivirus: startup
hmpalert.exe
Antivirus: initialize
hmpalert.exe
Antivirus: creating C:\ProgramData\HitmanPro\localcache.db
hmpalert.exe
Antivirus: created (result 0)
hmpalert.exe
Antivirus: opening (result 0) C:\ProgramData\HitmanPro\localcache.db
hmpalert.exe
Antivirus: read 0 hashes from store