Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
horizon-v1.exe
Resource
win7-20240508-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
horizon-v1.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
12 signatures
150 seconds
General
-
Target
horizon-v1.exe
-
Size
1007KB
-
MD5
c49e93ae7a60cfe00be724f44052922d
-
SHA1
f37dcdd76db4f6bd839ea1db713edf13c8c26b4b
-
SHA256
e75a34fa8049671c2d45b0957d8234847f0e7458829a14d22af776c1dfef9f72
-
SHA512
0d9fbbc186a4a699e618645bfdfbd1e9cd04de39b546ea0ad6dffbfea94c208a908f63653e410b1faf75b61cdde704321b7a9163ed699546b2ec50898bd96412
-
SSDEEP
24576:AssZ31JJ14gw87Qjc6OWmwiFBhUXZtNoUCi8e0fKtKP:3sZ3XH4gwkQjcDWehEZLoUZ8e0hP
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
horizon-v1.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" horizon-v1.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
horizon-v1.exepid process 848 horizon-v1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
horizon-v1.exedescription pid process Token: SeLoadDriverPrivilege 848 horizon-v1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
horizon-v1.exedescription pid process target process PID 848 wrote to memory of 2100 848 horizon-v1.exe cmd.exe PID 848 wrote to memory of 2100 848 horizon-v1.exe cmd.exe PID 848 wrote to memory of 2100 848 horizon-v1.exe cmd.exe PID 848 wrote to memory of 2264 848 horizon-v1.exe WerFault.exe PID 848 wrote to memory of 2264 848 horizon-v1.exe WerFault.exe PID 848 wrote to memory of 2264 848 horizon-v1.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\horizon-v1.exe"C:\Users\Admin\AppData\Local\Temp\horizon-v1.exe"1⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color B2⤵PID:2100
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 848 -s 1122⤵PID:2264