Analysis
-
max time kernel
31s -
max time network
44s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
HorionInjector.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
HorionInjector.exe
Resource
win10v2004-20240709-en
General
-
Target
HorionInjector.exe
-
Size
147KB
-
MD5
6b5b6e625de774e5c285712b7c4a0da7
-
SHA1
317099aef530afbe3a0c5d6a2743d51e04805267
-
SHA256
2d79af8e1ff3465703e1dc73d3ef2182fd269ea2609c8afabdf1b80693405c1d
-
SHA512
104609adf666588af4e152ec7891cedafd89ad8d427063d03fb42a228babefc59428b0c8b1430cb3fc319a5014d2ee1083ff2b74fa585cab2d86cdad346e8b08
-
SSDEEP
3072:ckgHqUGSCoEslON/q178+oO3BAE4T/DvueX:cNHqUGSCPBh+7VST/Ke
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2990742725-2267136959-192470804-1000\{B7DFD8FF-8BC9-4341-AF36-9812A812066F} msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1920 msedge.exe 1920 msedge.exe 536 msedge.exe 536 msedge.exe 1204 identity_helper.exe 1204 identity_helper.exe 944 msedge.exe 944 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4800 HorionInjector.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4800 HorionInjector.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 536 wrote to memory of 4888 536 msedge.exe 89 PID 536 wrote to memory of 4888 536 msedge.exe 89 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 5000 536 msedge.exe 90 PID 536 wrote to memory of 1920 536 msedge.exe 91 PID 536 wrote to memory of 1920 536 msedge.exe 91 PID 536 wrote to memory of 1260 536 msedge.exe 92 PID 536 wrote to memory of 1260 536 msedge.exe 92 PID 536 wrote to memory of 1260 536 msedge.exe 92 PID 536 wrote to memory of 1260 536 msedge.exe 92 PID 536 wrote to memory of 1260 536 msedge.exe 92 PID 536 wrote to memory of 1260 536 msedge.exe 92 PID 536 wrote to memory of 1260 536 msedge.exe 92 PID 536 wrote to memory of 1260 536 msedge.exe 92 PID 536 wrote to memory of 1260 536 msedge.exe 92 PID 536 wrote to memory of 1260 536 msedge.exe 92 PID 536 wrote to memory of 1260 536 msedge.exe 92 PID 536 wrote to memory of 1260 536 msedge.exe 92 PID 536 wrote to memory of 1260 536 msedge.exe 92 PID 536 wrote to memory of 1260 536 msedge.exe 92 PID 536 wrote to memory of 1260 536 msedge.exe 92 PID 536 wrote to memory of 1260 536 msedge.exe 92 PID 536 wrote to memory of 1260 536 msedge.exe 92 PID 536 wrote to memory of 1260 536 msedge.exe 92 PID 536 wrote to memory of 1260 536 msedge.exe 92 PID 536 wrote to memory of 1260 536 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\HorionInjector.exe"C:\Users\Admin\AppData\Local\Temp\HorionInjector.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4800
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffba2b46f8,0x7fffba2b4708,0x7fffba2b47182⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,11734737191767023230,1564843900814867547,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1936 /prefetch:22⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,11734737191767023230,1564843900814867547,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,11734737191767023230,1564843900814867547,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,11734737191767023230,1564843900814867547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,11734737191767023230,1564843900814867547,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,11734737191767023230,1564843900814867547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4260 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,11734737191767023230,1564843900814867547,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,11734737191767023230,1564843900814867547,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,11734737191767023230,1564843900814867547,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,11734737191767023230,1564843900814867547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,11734737191767023230,1564843900814867547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2036,11734737191767023230,1564843900814867547,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=212 /prefetch:82⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2036,11734737191767023230,1564843900814867547,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5016 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,11734737191767023230,1564843900814867547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,11734737191767023230,1564843900814867547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,11734737191767023230,1564843900814867547,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:1088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
6KB
MD5a1bde96104a78e4aad4a2e6beea1e513
SHA177f7f33f84d894cec923ab3649f946e90d42aa2f
SHA25651d0541d677935924ee31d39e35f7f3202cad83aba6b1233c3cb3249c7a5e17b
SHA51296cc174c03d4942b92d2d81a4837bd756434097f728f0aa32f117ed355b1b5dd1523ea0f44c2b505eda4ee14c0b96321a480c6a00e77b9c7198e490b2d2764e3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\af946249-60c7-4272-b328-64cb1507e125.tmp
Filesize6KB
MD538536525d6546a1d99e19e726c755dfe
SHA1a22e6fd259bd438aedc7c6caf4dc998160ca0885
SHA256fef1f725170916ebbced9beec4a05ff3f3cf8a3e69b047463428367dd9c08e47
SHA512edeac62fa08360951c3d233821b2bc39b2ca1c28954b929a554ed1b370c5f25c8b87c0f5b3234258eb744ec2fc92c0d8c7c3c0f32e9d6e25410c7fd14fbf3a77
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5625d6385cf115cac72ef745760ded9f4
SHA159d7a9bcc25df0cf9f1ba9e48fefaef476399842
SHA25626924ecb4409dabc5e7e6d5e317ffb9f3bc5866e029501fc5f79aa2fb8c2d201
SHA5120d7a4b257948b732516a97bd3ca2186d4d0a3da325a25fa0d0dc003d5a5d98454ac44f8d19a8bb95d5f9ba89f6fa96ee7af3ace108ef580da767e5c563c89767