Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 06:20
Static task
static1
Behavioral task
behavioral1
Sample
HorionInjector (1).exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
HorionInjector (1).exe
Resource
win10v2004-20240412-en
General
-
Target
HorionInjector (1).exe
-
Size
147KB
-
MD5
6b5b6e625de774e5c285712b7c4a0da7
-
SHA1
317099aef530afbe3a0c5d6a2743d51e04805267
-
SHA256
2d79af8e1ff3465703e1dc73d3ef2182fd269ea2609c8afabdf1b80693405c1d
-
SHA512
104609adf666588af4e152ec7891cedafd89ad8d427063d03fb42a228babefc59428b0c8b1430cb3fc319a5014d2ee1083ff2b74fa585cab2d86cdad346e8b08
-
SSDEEP
3072:ckgHqUGSCoEslON/q178+oO3BAE4T/DvueX:cNHqUGSCPBh+7VST/Ke
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1772 HorionInjector (1).exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HorionInjector (1).exe"C:\Users\Admin\AppData\Local\Temp\HorionInjector (1).exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2632
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe"1⤵PID:2760
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD586c97835b1c81ab53dd0fcbe3aa5fffc
SHA18eaecac4b7745028c7ac5c5f18ae73c7ec57dc30
SHA25611a61886d6a6d491feae11ad753aca834ffec392ed30cfba33eb08ac2edd3d8d
SHA512bab7313d31a8f4bf33741cb795432840aa497c342fdda5e46b50a6a11e36d7938d7ab108e6d38f7e4f77e7f975ae415f94cfa608a2bdcec188f94b567eb6a5b6
-
Filesize
591KB
MD572055dedf9d9a69e5ffc96a7e3c1e6f3
SHA1b872ced57c472b323cb29b44ea23d0387cd3904b
SHA256e1b8bc26a84a70ce525ab15ee44ac7a1ad09077f9de4348145305bafb4a1f446
SHA512bbf5b40ab5928fea18724e213aab6a61bb85331b12ec5c0d7eee27d6c38cbdbd983b03d5f0a52a58a9b0dc3eabea7826b7a21bffe0fda5819e29cfaccde253a3