Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 23:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
horizon-v1.exe
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
horizon-v1.exe
Resource
win10v2004-20240226-en
10 signatures
150 seconds
General
-
Target
horizon-v1.exe
-
Size
1002KB
-
MD5
2f20787b72bc0d5ea0a7403ff86fc3d5
-
SHA1
77791e89018386d76b10ca8c1fbf7ae1bd9666d0
-
SHA256
1bde000aa8fdc11c86e8982e2f67b4774ff12aa69deff8c78d6ee7c83569ee74
-
SHA512
3a35595c7cab41ce61a62277e6ed46faaee36bd83adebb970f92954dafdd3507b800c1d3577be78d44198496806e67566a953f8522d86385d0fd9dbc47a079d5
-
SSDEEP
24576:GelBI4sOMaSUx5K9D6S7xfPDeSoUeC4onvKm5RE:NBIz/LUx5K9DxqSoU14onG
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" horizon-v1.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 836 horizon-v1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 836 horizon-v1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 836 wrote to memory of 2312 836 horizon-v1.exe 29 PID 836 wrote to memory of 2312 836 horizon-v1.exe 29 PID 836 wrote to memory of 2312 836 horizon-v1.exe 29 PID 836 wrote to memory of 1244 836 horizon-v1.exe 30 PID 836 wrote to memory of 1244 836 horizon-v1.exe 30 PID 836 wrote to memory of 1244 836 horizon-v1.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\horizon-v1.exe"C:\Users\Admin\AppData\Local\Temp\horizon-v1.exe"1⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color B2⤵PID:2312
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 836 -s 1122⤵PID:1244
-