Analysis
-
max time kernel
17s -
max time network
20s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-08-2024 18:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
HorionInjector_1.exe
Resource
win11-20240802-en
windows11-21h2-x64
7 signatures
150 seconds
General
-
Target
HorionInjector_1.exe
-
Size
147KB
-
MD5
6b5b6e625de774e5c285712b7c4a0da7
-
SHA1
317099aef530afbe3a0c5d6a2743d51e04805267
-
SHA256
2d79af8e1ff3465703e1dc73d3ef2182fd269ea2609c8afabdf1b80693405c1d
-
SHA512
104609adf666588af4e152ec7891cedafd89ad8d427063d03fb42a228babefc59428b0c8b1430cb3fc319a5014d2ee1083ff2b74fa585cab2d86cdad346e8b08
-
SSDEEP
3072:ckgHqUGSCoEslON/q178+oO3BAE4T/DvueX:cNHqUGSCPBh+7VST/Ke
Score
1/10
Malware Config
Signatures
-
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies registry class 18 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
explorer.exepid process 4940 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
HorionInjector_1.exepid process 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe 3640 HorionInjector_1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
HorionInjector_1.exedescription pid process Token: SeDebugPrivilege 3640 HorionInjector_1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
explorer.exepid process 4940 explorer.exe 4940 explorer.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
HorionInjector_1.exedescription pid process target process PID 3640 wrote to memory of 3436 3640 HorionInjector_1.exe explorer.exe PID 3640 wrote to memory of 3436 3640 HorionInjector_1.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HorionInjector_1.exe"C:\Users\Admin\AppData\Local\Temp\HorionInjector_1.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\explorer.exeexplorer.exe shell:appsFolder\Microsoft.MinecraftUWP_8wekyb3d8bbwe!App2⤵PID:3436
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4940