Analysis
-
max time kernel
47s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 17:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
horizon-v1.exe
Resource
win7-20240220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
horizon-v1.exe
Resource
win10v2004-20240508-en
9 signatures
150 seconds
General
-
Target
horizon-v1.exe
-
Size
995KB
-
MD5
7d2c633f40ac76b349778fabaaddc61d
-
SHA1
7e490607c571c9bddbd36445d52e55eb52e9cb98
-
SHA256
c66b69d8b18e6ce2f52e5cda45cdce3984bff35c477992960913050df6afb1f6
-
SHA512
d9d7ef1a1e47e8b1941cc6ab69c3e3fb09c3bce2f834d48f1b243cb451dc21bb3de3a8475b544c7becd3e49772f5ad7af72840ed3ab0c8f00ab77d6255a35e5a
-
SSDEEP
24576:fvwDbUzDn15DBzSbcoQQREEEikoU2ahQ09GswKt+q2x:XwDbuD15DBzc0xloUthQ0
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" horizon-v1.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2872 horizon-v1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2872 horizon-v1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2872 wrote to memory of 1920 2872 horizon-v1.exe 29 PID 2872 wrote to memory of 1920 2872 horizon-v1.exe 29 PID 2872 wrote to memory of 1920 2872 horizon-v1.exe 29 PID 2872 wrote to memory of 2704 2872 horizon-v1.exe 30 PID 2872 wrote to memory of 2704 2872 horizon-v1.exe 30 PID 2872 wrote to memory of 2704 2872 horizon-v1.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\horizon-v1.exe"C:\Users\Admin\AppData\Local\Temp\horizon-v1.exe"1⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color B2⤵PID:1920
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2872 -s 1122⤵PID:2704
-