Analysis
-
max time kernel
23s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
31-01-2025 02:48
Static task
static1
Behavioral task
behavioral1
Sample
HORNETrat_launcher.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
HORNETrat_launcher.rar
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
HORNETrat_launcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
HORNETrat_launcher.exe
Resource
win10v2004-20250129-en
General
-
Target
HORNETrat_launcher.rar
-
Size
2.3MB
-
MD5
776114b72b7c339849cbf07f832bd89e
-
SHA1
4c03288ef3f0b22a5dbef1aaae1fdc7b54112d7d
-
SHA256
a239175d724d2caf4b4de497e819e32c8575fc1f93ddfbc7ec510cbc63b6bbac
-
SHA512
d24271e877d3a72fa7d6724fe38bbb5bad77efb5eed2ee484fa4b12774de4649463f335505260fde95388fc54e6d232ea6b46a35b04d097db9f7e24b4428c90b
-
SSDEEP
49152:iM8yBzoWDoF6Cl/BzH9S0AWVqURg+DyWeu70+ZUIQxeb6GRrwDR:98mzorZzHs0AWVqsD770+78bt
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation HORNETrat_launcher.com -
Executes dropped EXE 1 IoCs
pid Process 4508 HORNETrat_launcher.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HORNETrat_launcher.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000_Classes\Local Settings HORNETrat_launcher.com -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 684 7zFM.exe 684 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 684 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 684 7zFM.exe Token: 35 684 7zFM.exe Token: SeSecurityPrivilege 684 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 684 7zFM.exe 684 7zFM.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 684 wrote to memory of 4508 684 7zFM.exe 87 PID 684 wrote to memory of 4508 684 7zFM.exe 87 PID 684 wrote to memory of 4508 684 7zFM.exe 87 PID 4508 wrote to memory of 3016 4508 HORNETrat_launcher.com 89 PID 4508 wrote to memory of 3016 4508 HORNETrat_launcher.com 89 PID 4508 wrote to memory of 3016 4508 HORNETrat_launcher.com 89
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\HORNETrat_launcher.rar"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\7zOCA29AAC7\HORNETrat_launcher.com"C:\Users\Admin\AppData\Local\Temp\7zOCA29AAC7\HORNETrat_launcher.com"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\mshyperblock\7CVEgcv.vbe"3⤵
- System Location Discovery: System Language Discovery
PID:3016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5f07b8eea2d8c8ee368b680254ad0fee5
SHA11c75b5bcabedf0e31c76df0ff6ee23ab389bae3b
SHA25634947ad997759cb6aaf571df44c0996dae57e04cf4510ef4136b8b7ca16eea4e
SHA5129c01412cb8aa51419f74f8b614f88383f41ce2e2698b373b7d59519d23b875e0660b6fe4a947afa0b79878223afacb8cb8b8a3164b0a44d20f8f58521ff9d21e
-
Filesize
225B
MD5b7a9d7bc751980e5d28b50643805b2b0
SHA1dd4e0de7003f4dfc9a4cc52bfbf542e335a700f3
SHA256417517292e016853942d2072a55cb914a1e9c552af7d4fce9e9497d32d42ae2f
SHA512965e0ecc6c2535d46c7cc27ca7917f5ff20e07b881bf4ab15f26fd25807ad756fed4eca03f8315b68d1e72db1b97f9344ce111955b4c7368f40c5d2f8afec8a0