Overview
overview
3Static
static
3Horizon.rar
windows10-2004-x64
3DevCompone...r2.dll
windows10-2004-x64
1Horizon.dll
windows10-2004-x64
1Horizon.exe
windows10-2004-x64
3ICSharpCod...ib.dll
windows10-2004-x64
1Ionic.Zlib.CF.dll
windows10-2004-x64
1License.rtf
windows10-2004-x64
1System.Dat...te.dll
windows10-2004-x64
class3.dll
windows10-2004-x64
3lzo.dll
windows10-2004-x64
1msvcp100.dll
windows10-2004-x64
3msvcp80.dll
windows10-2004-x64
1msvcr100.dll
windows10-2004-x64
3msvcr80.dll
windows10-2004-x64
1Analysis
-
max time kernel
46s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2023 05:22
Static task
static1
Behavioral task
behavioral1
Sample
Horizon.rar
Resource
win10v2004-20230703-en
Behavioral task
behavioral2
Sample
DevComponents.DotNetBar2.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
Horizon.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
Horizon.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
ICSharpCode.SharpZipLib.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
Ionic.Zlib.CF.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
License.rtf
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
System.Data.SQLite.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
class3.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
lzo.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
msvcp100.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
msvcp80.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
msvcr100.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
msvcr80.dll
Resource
win10v2004-20230703-en
General
-
Target
Horizon.rar
-
Size
11.4MB
-
MD5
61aed6b7c5c9ca7a52afe632d1213d9e
-
SHA1
97c1376722b47bb3520a3f3f045cc7bf04d53bbf
-
SHA256
194d2bcf5594e4d2d9cbd85e619209b08ba219776edaa9a3f39e3436e9172934
-
SHA512
e424cb1c44a7948d0cae31a79707a3842ee9d706325690271ae94a1fec770863129873c60f7085d2e8ce16bac291000e9ab1decf82cdc90f705d972e797f02c0
-
SSDEEP
196608:lp20jSSrAig16dM40beDXCSHyLt67EqqY7BydGieDhnMGNkrnIrsFSKJsI:HeSy1aD0bQtHyLtbYlcDeDhBaLWoSEsI
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7zFM.exedescription pid Process Token: SeRestorePrivilege 1668 7zFM.exe Token: 35 1668 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7zFM.exepid Process 1668 7zFM.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
Processes:
OpenWith.exepid Process 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Horizon.rar1⤵
- Modifies registry class
PID:2812
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1008
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1668
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3928