Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 03:26

General

  • Target

    horizon-v1.exe

  • Size

    1007KB

  • MD5

    c49e93ae7a60cfe00be724f44052922d

  • SHA1

    f37dcdd76db4f6bd839ea1db713edf13c8c26b4b

  • SHA256

    e75a34fa8049671c2d45b0957d8234847f0e7458829a14d22af776c1dfef9f72

  • SHA512

    0d9fbbc186a4a699e618645bfdfbd1e9cd04de39b546ea0ad6dffbfea94c208a908f63653e410b1faf75b61cdde704321b7a9163ed699546b2ec50898bd96412

  • SSDEEP

    24576:AssZ31JJ14gw87Qjc6OWmwiFBhUXZtNoUCi8e0fKtKP:3sZ3XH4gwkQjcDWehEZLoUZ8e0hP

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\horizon-v1.exe
    "C:\Users\Admin\AppData\Local\Temp\horizon-v1.exe"
    1⤵
    • Sets service image path in registry
    • Suspicious behavior: LoadsDriver
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:848
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c color B
      2⤵
        PID:2100
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 848 -s 112
        2⤵
          PID:2264

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/848-1-0x0000000140000000-0x00000001405E8000-memory.dmp

        Filesize

        5.9MB