Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 17:32
Behavioral task
behavioral1
Sample
Horionexexecutor.exe
Resource
win7-20240903-en
General
-
Target
Horionexexecutor.exe
-
Size
468KB
-
MD5
59f30931892470045a237180c4df3566
-
SHA1
54cd26c02a62cb7af4756b74659bd275e3647fdc
-
SHA256
b9e7ce8956dcb00b56b550035d339beb309d227e907b0b2037ac1278b0711524
-
SHA512
091f00e46f8632591c43db97a5b32564fc5fee6a8267bb196209b8e7b914348bfe64c2333df8aba1b2f289882bb90db781fc1c8f55445c88899b572305e87799
-
SSDEEP
3072:mw+jq8yeF91UbTqLy5dUBoqcPvSqqw1QHgtUOJ/yDPjPVc2WLiK4XVfI2j:TW7yeF91UbHdXrSYiEnJ8b22Wo
Malware Config
Extracted
xenorat
127.0.0.1
horion executor
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
horion executor
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/2844-1-0x0000000000E60000-0x0000000000EDC000-memory.dmp family_xenorat behavioral2/files/0x0008000000023c62-6.dat family_xenorat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Horionexexecutor.exe -
Executes dropped EXE 1 IoCs
pid Process 1420 Horionexexecutor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Horionexexecutor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Horionexexecutor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1200 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2844 wrote to memory of 1420 2844 Horionexexecutor.exe 86 PID 2844 wrote to memory of 1420 2844 Horionexexecutor.exe 86 PID 2844 wrote to memory of 1420 2844 Horionexexecutor.exe 86 PID 1420 wrote to memory of 1200 1420 Horionexexecutor.exe 87 PID 1420 wrote to memory of 1200 1420 Horionexexecutor.exe 87 PID 1420 wrote to memory of 1200 1420 Horionexexecutor.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Horionexexecutor.exe"C:\Users\Admin\AppData\Local\Temp\Horionexexecutor.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Roaming\XenoManager\Horionexexecutor.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Horionexexecutor.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN " horion executor" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC5C1.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1200
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD52b6961948afd084b4497fbe1fc6b9682
SHA1d59815ecfa09dea11b8835fa1f61a40ca235dfca
SHA256059530ae3145c4f9e2fe745a0a904e56e8449693d53cda567d04e427156e62af
SHA512438fbaed6b7a8d4ac66d737c59f0f62dc6d3139527b2e0274840d1d29ff01a6aaf93cdaaa52785ca4a11eec712290621335dc46e221d077c024e28e0c9deddb7
-
Filesize
468KB
MD559f30931892470045a237180c4df3566
SHA154cd26c02a62cb7af4756b74659bd275e3647fdc
SHA256b9e7ce8956dcb00b56b550035d339beb309d227e907b0b2037ac1278b0711524
SHA512091f00e46f8632591c43db97a5b32564fc5fee6a8267bb196209b8e7b914348bfe64c2333df8aba1b2f289882bb90db781fc1c8f55445c88899b572305e87799