Overview
overview
3Static
static
3Hornynite-...ws.zip
windows7-x64
1Hornynite-...ws.zip
windows10-2004-x64
1Hornynite-...47.dll
windows7-x64
1Hornynite-...47.dll
windows10-2004-x64
1Hornynite-...GL.dll
windows7-x64
1Hornynite-...GL.dll
windows10-2004-x64
1Hornynite-...v2.dll
windows7-x64
1Hornynite-...v2.dll
windows10-2004-x64
1Hornynite-....9.dll
windows7-x64
1Hornynite-....9.dll
windows10-2004-x64
1Hornynite-...on.dll
windows7-x64
1Hornynite-...on.dll
windows10-2004-x64
1Hornynite-...rs.dll
windows7-x64
1Hornynite-...rs.dll
windows10-2004-x64
1Hornynite-...on.exe
windows7-x64
1Hornynite-...on.exe
windows10-2004-x64
1Hornynite-...nw.exe
windows7-x64
1Hornynite-...nw.exe
windows10-2004-x64
1Hornynite-...ay.vbs
windows7-x64
1Hornynite-...ay.vbs
windows10-2004-x64
1Hornynite-...nc.exe
windows7-x64
1Hornynite-...nc.exe
windows10-2004-x64
1Hornynite-...ke.exe
windows7-x64
1Hornynite-...ke.exe
windows10-2004-x64
1Hornynite-...__.pyc
windows7-x64
3Hornynite-...__.pyc
windows10-2004-x64
3Hornynite-...le.pyc
windows7-x64
3Hornynite-...le.pyc
windows10-2004-x64
3Hornynite-...ss.pyc
windows7-x64
3Hornynite-...ss.pyc
windows10-2004-x64
3Hornynite-...bc.pyc
windows7-x64
3Hornynite-...bc.pyc
windows10-2004-x64
3Analysis
-
max time kernel
156s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
19/09/2023, 14:25
Static task
static1
Behavioral task
behavioral1
Sample
Hornynite-0.14-Windows.zip
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Hornynite-0.14-Windows.zip
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/d3dcompiler_47.dll
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/d3dcompiler_47.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/libEGL.dll
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/libEGL.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/libGLESv2.dll
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/libGLESv2.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/libpython3.9.dll
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/libpython3.9.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/librenpython.dll
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/librenpython.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/nvdrs.dll
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/nvdrs.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/python.exe
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/python.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/pythonw.exe
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/pythonw.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/say.vbs
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/say.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/zsync.exe
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/zsync.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/zsyncmake.exe
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
Hornynite-0.14-win/lib/py3-windows-x86_64/zsyncmake.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
Hornynite-0.14-win/lib/python3.9/__future__.pyc
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
Hornynite-0.14-win/lib/python3.9/__future__.pyc
Resource
win10v2004-20230915-en
Behavioral task
behavioral27
Sample
Hornynite-0.14-win/lib/python3.9/_bootlocale.pyc
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
Hornynite-0.14-win/lib/python3.9/_bootlocale.pyc
Resource
win10v2004-20230915-en
Behavioral task
behavioral29
Sample
Hornynite-0.14-win/lib/python3.9/_bootsubprocess.pyc
Resource
win7-20230831-en
Behavioral task
behavioral30
Sample
Hornynite-0.14-win/lib/python3.9/_bootsubprocess.pyc
Resource
win10v2004-20230915-en
Behavioral task
behavioral31
Sample
Hornynite-0.14-win/lib/python3.9/_collections_abc.pyc
Resource
win7-20230831-en
Behavioral task
behavioral32
Sample
Hornynite-0.14-win/lib/python3.9/_collections_abc.pyc
Resource
win10v2004-20230915-en
General
-
Target
Hornynite-0.14-win/lib/python3.9/_bootsubprocess.pyc
-
Size
2KB
-
MD5
958bb5841c613ea6ff96441c33af098a
-
SHA1
7bf353ae2ec210031544c61083b102b4ffc99afd
-
SHA256
e13eb991a60901ff4ea4e2eede6f38fcd0fa129446bdd267d5baabe7f3ec288d
-
SHA512
97aa0dc3bd985d48bf19e32924e6a2d91abcec59542c62dbef3d46d602155dddcaad16b71937b022926467360174ceb1cd7abd7df3bcb67d4ced231f82097891
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2664 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2664 AcroRd32.exe 2664 AcroRd32.exe 2664 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2144 1968 cmd.exe 29 PID 1968 wrote to memory of 2144 1968 cmd.exe 29 PID 1968 wrote to memory of 2144 1968 cmd.exe 29 PID 2144 wrote to memory of 2664 2144 rundll32.exe 30 PID 2144 wrote to memory of 2664 2144 rundll32.exe 30 PID 2144 wrote to memory of 2664 2144 rundll32.exe 30 PID 2144 wrote to memory of 2664 2144 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Hornynite-0.14-win\lib\python3.9\_bootsubprocess.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Hornynite-0.14-win\lib\python3.9\_bootsubprocess.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Hornynite-0.14-win\lib\python3.9\_bootsubprocess.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a3291e2f41b36bd76a3e792e2d7f25cd
SHA1b7eb95bcf6a03a0b4b665269cc9223de2058e7ec
SHA25659151be8f37ae6170a7f0ab74467c6ca92223698f202329af377c09ba0eb48b9
SHA51275e3b4cac4d0dc56d52c0bfcfaa9e503ae3d60f80ce318fa04015cd326fc070af2570f147fd501da0e71712476f7c6ed34ca85ec1587f878ae2546b881074a1f