Analysis

  • max time kernel
    127s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2023, 14:25

General

  • Target

    Hornynite-0.14-win/lib/python3.9/_bootsubprocess.pyc

  • Size

    2KB

  • MD5

    958bb5841c613ea6ff96441c33af098a

  • SHA1

    7bf353ae2ec210031544c61083b102b4ffc99afd

  • SHA256

    e13eb991a60901ff4ea4e2eede6f38fcd0fa129446bdd267d5baabe7f3ec288d

  • SHA512

    97aa0dc3bd985d48bf19e32924e6a2d91abcec59542c62dbef3d46d602155dddcaad16b71937b022926467360174ceb1cd7abd7df3bcb67d4ced231f82097891

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Hornynite-0.14-win\lib\python3.9\_bootsubprocess.pyc
    1⤵
    • Modifies registry class
    PID:1508
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:4388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads