Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02/07/2024, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
HorionInjector.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
HorionInjector.exe
Resource
win10v2004-20240508-en
General
-
Target
HorionInjector.exe
-
Size
147KB
-
MD5
6b5b6e625de774e5c285712b7c4a0da7
-
SHA1
317099aef530afbe3a0c5d6a2743d51e04805267
-
SHA256
2d79af8e1ff3465703e1dc73d3ef2182fd269ea2609c8afabdf1b80693405c1d
-
SHA512
104609adf666588af4e152ec7891cedafd89ad8d427063d03fb42a228babefc59428b0c8b1430cb3fc319a5014d2ee1083ff2b74fa585cab2d86cdad346e8b08
-
SSDEEP
3072:ckgHqUGSCoEslON/q178+oO3BAE4T/DvueX:cNHqUGSCPBh+7VST/Ke
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133643535210652325" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1152 chrome.exe 1152 chrome.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 672 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 4408 HorionInjector.exe Token: SeShutdownPrivilege 1152 chrome.exe Token: SeCreatePagefilePrivilege 1152 chrome.exe Token: SeShutdownPrivilege 1152 chrome.exe Token: SeCreatePagefilePrivilege 1152 chrome.exe Token: SeShutdownPrivilege 1152 chrome.exe Token: SeCreatePagefilePrivilege 1152 chrome.exe Token: SeShutdownPrivilege 1152 chrome.exe Token: SeCreatePagefilePrivilege 1152 chrome.exe Token: SeShutdownPrivilege 1152 chrome.exe Token: SeCreatePagefilePrivilege 1152 chrome.exe Token: SeShutdownPrivilege 1152 chrome.exe Token: SeCreatePagefilePrivilege 1152 chrome.exe Token: SeShutdownPrivilege 1152 chrome.exe Token: SeCreatePagefilePrivilege 1152 chrome.exe Token: SeShutdownPrivilege 1152 chrome.exe Token: SeCreatePagefilePrivilege 1152 chrome.exe Token: SeShutdownPrivilege 1152 chrome.exe Token: SeCreatePagefilePrivilege 1152 chrome.exe Token: SeShutdownPrivilege 1152 chrome.exe Token: SeCreatePagefilePrivilege 1152 chrome.exe Token: SeShutdownPrivilege 1152 chrome.exe Token: SeCreatePagefilePrivilege 1152 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe 1152 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1152 wrote to memory of 964 1152 chrome.exe 94 PID 1152 wrote to memory of 964 1152 chrome.exe 94 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 2060 1152 chrome.exe 95 PID 1152 wrote to memory of 1408 1152 chrome.exe 96 PID 1152 wrote to memory of 1408 1152 chrome.exe 96 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97 PID 1152 wrote to memory of 1540 1152 chrome.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\HorionInjector.exe"C:\Users\Admin\AppData\Local\Temp\HorionInjector.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1800
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ff85104ab58,0x7ff85104ab68,0x7ff85104ab782⤵PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1976,i,4216791313072864505,11646218650073047082,131072 /prefetch:22⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 --field-trial-handle=1976,i,4216791313072864505,11646218650073047082,131072 /prefetch:82⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2312 --field-trial-handle=1976,i,4216791313072864505,11646218650073047082,131072 /prefetch:82⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3004 --field-trial-handle=1976,i,4216791313072864505,11646218650073047082,131072 /prefetch:12⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1976,i,4216791313072864505,11646218650073047082,131072 /prefetch:12⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4340 --field-trial-handle=1976,i,4216791313072864505,11646218650073047082,131072 /prefetch:12⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4116 --field-trial-handle=1976,i,4216791313072864505,11646218650073047082,131072 /prefetch:12⤵PID:648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1976,i,4216791313072864505,11646218650073047082,131072 /prefetch:82⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 --field-trial-handle=1976,i,4216791313072864505,11646218650073047082,131072 /prefetch:82⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:3008
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0x7ff6a83aae48,0x7ff6a83aae58,0x7ff6a83aae683⤵PID:2028
-
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
810B
MD5ad867396463e6b327744930bac94b6aa
SHA10f68baf2a983097814456922e5ade6fd83f6694d
SHA2568ccd0b4213955b67b5722326bf68bf74e6a7602dbf77b19344af195ceb280803
SHA512e8c932f03d3a02facd4f4b2ced36d5673e3fe8c34eed947f871ddd01d2cb4dd2a5786aa289207931d3d4c5815c938901178b2587cf49c7cf29837d3478f4621b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5ba53f30c9ca1203192a448ed6b9215d9
SHA1f1939ea1dda49c39a574c7a2ba86aaa80734a682
SHA2563eeee808dc276dc5930793ed66980d3125c929fc5a728a7ac4770cf8c2c7577a
SHA512afc14c015277e6ddbf47788eea0b6b4721a31d3a9f8f826d03582d9c9abcce6eefe026a8199e858063a20e280e779b3acfcdae84548b7f28c69770d83f178ea8
-
Filesize
257KB
MD5ee77a63c084240a56ac8ee288ade7408
SHA15acff10524ec6e9b42189fc72cb7e0ed7c4e8857
SHA2560a29117d61ac4219c9c2562ec27b2ae885f25bf66fa806b9d934952cc862f6a4
SHA512e406ac7d7c7a4c4474b0d506f2ebd0677366c1529574707875d1430cc8bd89322da2cdaab5b182cb73521b2b20df7ecd6528a0445a892f22f6bb60a1c5253e62
-
Filesize
257KB
MD5e237701fa4b10f652c633f03a947d5dc
SHA1f38d0cd952c323a720bd3fb3db0e5fa623b27c14
SHA2569382eae78adaef8c686f21a753da548afaa7c9bb3ad5ca62b7f19d75044582ed
SHA51287a2f51588d32530455d02d777f9b41f20cb6528aff0ea23d01b938656eaabdf6bbc62585dbbb5fd210a2cf2c0eb3a357c81a2cb90ab96baf1ffec07f8475501
-
Filesize
257KB
MD5e4381f02976b806df0d8f4d941794ef2
SHA1c7cefe38d37a30fcd59577c9cbc8f6d6e81a522a
SHA256d49140b7e0d3b8734c14903e1c41d86602735deebe405cd8f6d4aee7f70ea9e6
SHA51256633ac2c6207cd95adde5ee6772e5aff57eb37827fa2fe4278e99d500a09cba2c86161cb8a05a0e5e01f4b2db873c371b65b60b2ae5e41c7e54d5d5d292db28
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58