Analysis
-
max time kernel
457s -
max time network
492s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/05/2024, 03:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
horizon-v1.exe
Resource
win11-20240426-en
4 signatures
600 seconds
General
-
Target
horizon-v1.exe
-
Size
1003KB
-
MD5
dc267f2b3ec4adc76458610e58542c94
-
SHA1
28d34090c51acb4887acc2ccd9d3759f3b67efed
-
SHA256
482ff0a56e294b684deb2ad2651b4a0f58505a5239f1a1a426588f5b9986d428
-
SHA512
f817a494fadbd08647919d32026bdc071542b2cd189d69a2665f82898c2b857c3f157587eaccb158b14ed245781900ba0fdeb79768c2aca367b53739ddf8ff35
-
SSDEEP
24576:Z+h1TYGg4vEQ2MQO4Du/SNltCOoUpH0T0E2h6ZKt7CBw:4h1TXZEQ2M7lSTtCOoUV0T0E2h6wCO
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" horizon-v1.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4896 horizon-v1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 4896 horizon-v1.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4896 wrote to memory of 2324 4896 horizon-v1.exe 80 PID 4896 wrote to memory of 2324 4896 horizon-v1.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\horizon-v1.exe"C:\Users\Admin\AppData\Local\Temp\horizon-v1.exe"1⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color B2⤵PID:2324
-