Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 17:32
Behavioral task
behavioral1
Sample
Horionexexecutor.exe
Resource
win7-20240903-en
General
-
Target
Horionexexecutor.exe
-
Size
468KB
-
MD5
59f30931892470045a237180c4df3566
-
SHA1
54cd26c02a62cb7af4756b74659bd275e3647fdc
-
SHA256
b9e7ce8956dcb00b56b550035d339beb309d227e907b0b2037ac1278b0711524
-
SHA512
091f00e46f8632591c43db97a5b32564fc5fee6a8267bb196209b8e7b914348bfe64c2333df8aba1b2f289882bb90db781fc1c8f55445c88899b572305e87799
-
SSDEEP
3072:mw+jq8yeF91UbTqLy5dUBoqcPvSqqw1QHgtUOJ/yDPjPVc2WLiK4XVfI2j:TW7yeF91UbHdXrSYiEnJ8b22Wo
Malware Config
Extracted
xenorat
127.0.0.1
horion executor
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
horion executor
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2540-1-0x0000000001330000-0x00000000013AC000-memory.dmp family_xenorat behavioral1/files/0x0008000000016d0e-7.dat family_xenorat behavioral1/memory/1976-9-0x0000000001010000-0x000000000108C000-memory.dmp family_xenorat -
Executes dropped EXE 1 IoCs
pid Process 1976 Horionexexecutor.exe -
Loads dropped DLL 1 IoCs
pid Process 2540 Horionexexecutor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Horionexexecutor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Horionexexecutor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2520 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1976 2540 Horionexexecutor.exe 30 PID 2540 wrote to memory of 1976 2540 Horionexexecutor.exe 30 PID 2540 wrote to memory of 1976 2540 Horionexexecutor.exe 30 PID 2540 wrote to memory of 1976 2540 Horionexexecutor.exe 30 PID 1976 wrote to memory of 2520 1976 Horionexexecutor.exe 31 PID 1976 wrote to memory of 2520 1976 Horionexexecutor.exe 31 PID 1976 wrote to memory of 2520 1976 Horionexexecutor.exe 31 PID 1976 wrote to memory of 2520 1976 Horionexexecutor.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Horionexexecutor.exe"C:\Users\Admin\AppData\Local\Temp\Horionexexecutor.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Roaming\XenoManager\Horionexexecutor.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Horionexexecutor.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN " horion executor" /XML "C:\Users\Admin\AppData\Local\Temp\tmp950F.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2520
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52b6961948afd084b4497fbe1fc6b9682
SHA1d59815ecfa09dea11b8835fa1f61a40ca235dfca
SHA256059530ae3145c4f9e2fe745a0a904e56e8449693d53cda567d04e427156e62af
SHA512438fbaed6b7a8d4ac66d737c59f0f62dc6d3139527b2e0274840d1d29ff01a6aaf93cdaaa52785ca4a11eec712290621335dc46e221d077c024e28e0c9deddb7
-
Filesize
468KB
MD559f30931892470045a237180c4df3566
SHA154cd26c02a62cb7af4756b74659bd275e3647fdc
SHA256b9e7ce8956dcb00b56b550035d339beb309d227e907b0b2037ac1278b0711524
SHA512091f00e46f8632591c43db97a5b32564fc5fee6a8267bb196209b8e7b914348bfe64c2333df8aba1b2f289882bb90db781fc1c8f55445c88899b572305e87799