Analysis
-
max time kernel
34s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
04/04/2024, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
HorionInjector.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
HorionInjector.exe
Resource
win10v2004-20240226-en
General
-
Target
HorionInjector.exe
-
Size
147KB
-
MD5
6b5b6e625de774e5c285712b7c4a0da7
-
SHA1
317099aef530afbe3a0c5d6a2743d51e04805267
-
SHA256
2d79af8e1ff3465703e1dc73d3ef2182fd269ea2609c8afabdf1b80693405c1d
-
SHA512
104609adf666588af4e152ec7891cedafd89ad8d427063d03fb42a228babefc59428b0c8b1430cb3fc319a5014d2ee1083ff2b74fa585cab2d86cdad346e8b08
-
SSDEEP
3072:ckgHqUGSCoEslON/q178+oO3BAE4T/DvueX:cNHqUGSCPBh+7VST/Ke
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2540 chrome.exe 2540 chrome.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 2144 HorionInjector.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2716 2540 chrome.exe 29 PID 2540 wrote to memory of 2716 2540 chrome.exe 29 PID 2540 wrote to memory of 2716 2540 chrome.exe 29 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2456 2540 chrome.exe 31 PID 2540 wrote to memory of 2508 2540 chrome.exe 32 PID 2540 wrote to memory of 2508 2540 chrome.exe 32 PID 2540 wrote to memory of 2508 2540 chrome.exe 32 PID 2540 wrote to memory of 2996 2540 chrome.exe 33 PID 2540 wrote to memory of 2996 2540 chrome.exe 33 PID 2540 wrote to memory of 2996 2540 chrome.exe 33 PID 2540 wrote to memory of 2996 2540 chrome.exe 33 PID 2540 wrote to memory of 2996 2540 chrome.exe 33 PID 2540 wrote to memory of 2996 2540 chrome.exe 33 PID 2540 wrote to memory of 2996 2540 chrome.exe 33 PID 2540 wrote to memory of 2996 2540 chrome.exe 33 PID 2540 wrote to memory of 2996 2540 chrome.exe 33 PID 2540 wrote to memory of 2996 2540 chrome.exe 33 PID 2540 wrote to memory of 2996 2540 chrome.exe 33 PID 2540 wrote to memory of 2996 2540 chrome.exe 33 PID 2540 wrote to memory of 2996 2540 chrome.exe 33 PID 2540 wrote to memory of 2996 2540 chrome.exe 33 PID 2540 wrote to memory of 2996 2540 chrome.exe 33 PID 2540 wrote to memory of 2996 2540 chrome.exe 33 PID 2540 wrote to memory of 2996 2540 chrome.exe 33 PID 2540 wrote to memory of 2996 2540 chrome.exe 33 PID 2540 wrote to memory of 2996 2540 chrome.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\HorionInjector.exe"C:\Users\Admin\AppData\Local\Temp\HorionInjector.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef0039758,0x7fef0039768,0x7fef00397782⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1104 --field-trial-handle=1380,i,14282107990928893993,10943507316260072680,131072 /prefetch:22⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1380,i,14282107990928893993,10943507316260072680,131072 /prefetch:82⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1380,i,14282107990928893993,10943507316260072680,131072 /prefetch:82⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2268 --field-trial-handle=1380,i,14282107990928893993,10943507316260072680,131072 /prefetch:12⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2276 --field-trial-handle=1380,i,14282107990928893993,10943507316260072680,131072 /prefetch:12⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1128 --field-trial-handle=1380,i,14282107990928893993,10943507316260072680,131072 /prefetch:22⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3064 --field-trial-handle=1380,i,14282107990928893993,10943507316260072680,131072 /prefetch:12⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3664 --field-trial-handle=1380,i,14282107990928893993,10943507316260072680,131072 /prefetch:82⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3744 --field-trial-handle=1380,i,14282107990928893993,10943507316260072680,131072 /prefetch:12⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=1252 --field-trial-handle=1380,i,14282107990928893993,10943507316260072680,131072 /prefetch:12⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3220 --field-trial-handle=1380,i,14282107990928893993,10943507316260072680,131072 /prefetch:82⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD5319e0c36436ee0bf24476acbcc83565c
SHA1fb2658d5791fe5b37424119557ab8cee30acdc54
SHA256f6562ea52e056b979d6f52932ae57b7afb04486b10b0ebde22c5b51f502c69d1
SHA512ad902b9a010cf99bdedba405cad0387890a9ff90a9c91f6a3220cdceec1b08ecb97a326aef01b28d8d0aacb5f2a16f02f673e196bdb69fc68b3f636139059902
-
Filesize
24KB
MD5b82ca47ee5d42100e589bdd94e57936e
SHA10dad0cd7d0472248b9b409b02122d13bab513b4c
SHA256d3c59060e591b3839ec59cad150c0a38a2a2a6ba4cc4dc5530f68be54f14ef1d
SHA51258840a773a3a6cb0913e6a542934daecaef9c0eeab626446a29a70cd6d063fdb012229ff2ccfa283e3c05bc2a91a7cac331293965264715bdb9020f162dc7383
-
Filesize
192B
MD515d0ed7986a6e7a966ecfc46843117fb
SHA14e5a14b0a7db77f2c2e0bc99199ab8131d8dcd83
SHA256f3f305e180e0b248aaf374fa3982c91945021a468d1d4f66ccf60869b7dc4d57
SHA512d5f733cc839c4c888b5475d86fdb3bd9173de329617e4af617f3503a7eae9a1646f8cd7580d51ff8a75519eb8b355b949aaa1514a614c4184c6abe48e18701b7
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
361B
MD5073d0abd08c490f2541630af8d1eaf7a
SHA19d6656d9f0b9e21e9d0d50f37912403fef89d728
SHA256094e8e6f7dc35fb2af4796539f6469f707f47ad47e39d1c75d28e6f87ce04c7a
SHA512cc8c935a8beb004dcd95ef198af9b992ce74ca8e1ba391819f08544bd22f8738d05d6d95f2a81c969d69162f561b1692aadb8e9580f2a844ee69d1732d13848f
-
Filesize
361B
MD55399626555d92c66054b39857628e378
SHA16d977f00f08c8021c9ce24b2367db2bb384979be
SHA25667bf8fb23ee22bc4f4eb1a1206b8bce8f58286df9076523679c2489da1d3d7d2
SHA512d11f02c5d43da42fcd9ac414efcbcac4c466d010b5583ce8d2aab4d1de95f71873c54e67365c75f00b2936dd6a220079e0a1444facd52b0c1b14d9d611aa2e36
-
Filesize
361B
MD5be381c9c2788db824a202e62f83521fd
SHA131a4a225b8cd7af9eaafac4f48f927b04c00c242
SHA2561cb355f8ed7cfd4e3edb7ef0a2e35b20f176ace9bc2543d424f82563a4a0455e
SHA5120b328562327f791cd0da48bcea2f3bf8d8ab749bf06c06708bcd2b7c9ad6f7562771d8e8932e2105fb2ed0ca3b05540caf106ca6802efb09026c18a33b6c4814
-
Filesize
5KB
MD51852a61fbe32596f8968f14002ce79f9
SHA1318e6f012eeb688fdcf993d77bd5be5ef42a04f7
SHA256b18c1d9def1d4f31286dd94c19583521f32412acfbec82d1ab086db42033c4bb
SHA512631a05795d224fa086d8070892b4b1f1954f08da341ae9ab87df91abc1dda6721894375e6b7cf781d3b8710d4d859a096811f85db991ce105e03f2431a072fae
-
Filesize
4KB
MD5be85dac03176f9257a07a23c7863bf4d
SHA15e2fdab6a8aeb27e0ff7b06562c9b667d1062f0d
SHA2563ca7325b261b1ff1cc60f583a5a62d5d4ab7d71a6201552859747f925c58f017
SHA512d41a53ce0cd58317f2c18d9fe6264c70481464e0780d0110a2d22072e215fd0dc08b7c5161b2c6bac10356e754d51af3123ff882f5e337abaa739f2ff9ce84cb
-
Filesize
4KB
MD5064e692fc6e83847a658cb7215ee348a
SHA14d2c51b2715fdece736fec3a41bd53ad66a0bafa
SHA256d508fe8056786677ca17fca70256bf317d122100c2e7c5cf60cb305075a68424
SHA512225b091311a0fba6552c9c686dd48dc136042d77b1fb00cee98396f6b56ddbfcf9ec235545d086a112011f97ed059f8b438ed7186eeeeeedd14bf1968f77396b
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2