Analysis
-
max time kernel
300s -
max time network
294s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
25-02-2021 14:26
Static task
static1
URLScan task
urlscan1
Sample
http://5.61.33.200/henos.exe
Behavioral task
behavioral1
Sample
http://5.61.33.200/henos.exe
Resource
win10v20201028
General
-
Target
http://5.61.33.200/henos.exe
-
Sample
210225-1m7dl96gn2
Malware Config
Extracted
raccoon
21caed469b59526d75348692eec1d8ae289ec69c
-
url4cnc
https://telete.in/j90maninblack
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process target process PID 2836 created 4964 2836 WerFault.exe henos.exe PID 3848 created 4168 3848 WerFault.exe henos.exe -
Executes dropped EXE 2 IoCs
Processes:
henos.exehenos.exepid process 4964 henos.exe 4168 henos.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2836 4964 WerFault.exe henos.exe 3848 4168 WerFault.exe henos.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings firefox.exe -
NTFS ADS 1 IoCs
Processes:
firefox.exedescription ioc process File created C:\Users\Admin\Downloads\henos.exe:Zone.Identifier firefox.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
WerFault.exeWerFault.exepid process 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 3848 WerFault.exe 3848 WerFault.exe 3848 WerFault.exe 3848 WerFault.exe 3848 WerFault.exe 3848 WerFault.exe 3848 WerFault.exe 3848 WerFault.exe 3848 WerFault.exe 3848 WerFault.exe 3848 WerFault.exe 3848 WerFault.exe 3848 WerFault.exe 3848 WerFault.exe 3848 WerFault.exe 3848 WerFault.exe 3848 WerFault.exe 3848 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
firefox.exeWerFault.exeWerFault.exedescription pid process Token: SeDebugPrivilege 3980 firefox.exe Token: SeDebugPrivilege 3980 firefox.exe Token: SeRestorePrivilege 2836 WerFault.exe Token: SeBackupPrivilege 2836 WerFault.exe Token: SeDebugPrivilege 2836 WerFault.exe Token: SeDebugPrivilege 3848 WerFault.exe Token: SeDebugPrivilege 3980 firefox.exe Token: SeDebugPrivilege 3980 firefox.exe Token: SeDebugPrivilege 3980 firefox.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
firefox.exepid process 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe -
Suspicious use of SendNotifyMessage 11 IoCs
Processes:
firefox.exepid process 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe -
Suspicious use of SetWindowsHookEx 25 IoCs
Processes:
firefox.exepid process 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe 3980 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
firefox.exefirefox.exedescription pid process target process PID 1144 wrote to memory of 3980 1144 firefox.exe firefox.exe PID 1144 wrote to memory of 3980 1144 firefox.exe firefox.exe PID 1144 wrote to memory of 3980 1144 firefox.exe firefox.exe PID 1144 wrote to memory of 3980 1144 firefox.exe firefox.exe PID 1144 wrote to memory of 3980 1144 firefox.exe firefox.exe PID 1144 wrote to memory of 3980 1144 firefox.exe firefox.exe PID 1144 wrote to memory of 3980 1144 firefox.exe firefox.exe PID 1144 wrote to memory of 3980 1144 firefox.exe firefox.exe PID 1144 wrote to memory of 3980 1144 firefox.exe firefox.exe PID 3980 wrote to memory of 360 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 360 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1204 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1768 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1768 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1768 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1768 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1768 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1768 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1768 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1768 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1768 3980 firefox.exe firefox.exe PID 3980 wrote to memory of 1768 3980 firefox.exe firefox.exe
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" http://5.61.33.200/henos.exe1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" http://5.61.33.200/henos.exe2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3980.0.1515205750\1389800827" -parentBuildID 20200403170909 -prefsHandle 1548 -prefMapHandle 1540 -prefsLen 1 -prefMapSize 219511 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3980 "\\.\pipe\gecko-crash-server-pipe.3980" 1632 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3980.3.981386905\2082739148" -childID 1 -isForBrowser -prefsHandle 2296 -prefMapHandle 2292 -prefsLen 156 -prefMapSize 219511 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3980 "\\.\pipe\gecko-crash-server-pipe.3980" 2308 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3980.13.2127610964\1383672278" -childID 2 -isForBrowser -prefsHandle 3200 -prefMapHandle 3196 -prefsLen 7013 -prefMapSize 219511 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3980 "\\.\pipe\gecko-crash-server-pipe.3980" 3212 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3980.20.1394844916\1555071412" -childID 3 -isForBrowser -prefsHandle 4216 -prefMapHandle 1404 -prefsLen 7969 -prefMapSize 219511 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3980 "\\.\pipe\gecko-crash-server-pipe.3980" 4112 tab3⤵
-
C:\Users\Admin\Downloads\henos.exe"C:\Users\Admin\Downloads\henos.exe"1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 6602⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\Downloads\henos.exe"C:\Users\Admin\Downloads\henos.exe"1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 11082⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Downloads\henos.exeMD5
bfbc5c7fdfdaf8147dbf6d1e4ea3e4f0
SHA1318923e7cb849bee7f09fe18ea79e506311fb100
SHA2567dca5264c8f0417686482b9f17571a60ac0e399180340deca165fe7fe2a9eb81
SHA51224a9d67c7760fc867368be65b8a607f4ff364941d820f5cae38ec06aff1ccb299449e18ac70335bf7bd732ce92f80d752f3c6cc695073c8b0ade3e8017b8e2c6
-
C:\Users\Admin\Downloads\henos.exeMD5
bfbc5c7fdfdaf8147dbf6d1e4ea3e4f0
SHA1318923e7cb849bee7f09fe18ea79e506311fb100
SHA2567dca5264c8f0417686482b9f17571a60ac0e399180340deca165fe7fe2a9eb81
SHA51224a9d67c7760fc867368be65b8a607f4ff364941d820f5cae38ec06aff1ccb299449e18ac70335bf7bd732ce92f80d752f3c6cc695073c8b0ade3e8017b8e2c6
-
C:\Users\Admin\Downloads\henos.exeMD5
bfbc5c7fdfdaf8147dbf6d1e4ea3e4f0
SHA1318923e7cb849bee7f09fe18ea79e506311fb100
SHA2567dca5264c8f0417686482b9f17571a60ac0e399180340deca165fe7fe2a9eb81
SHA51224a9d67c7760fc867368be65b8a607f4ff364941d820f5cae38ec06aff1ccb299449e18ac70335bf7bd732ce92f80d752f3c6cc695073c8b0ade3e8017b8e2c6
-
memory/360-3-0x0000000000000000-mapping.dmp
-
memory/1204-4-0x0000000000000000-mapping.dmp
-
memory/1768-5-0x0000000000000000-mapping.dmp
-
memory/2836-16-0x0000000004570000-0x0000000004571000-memory.dmpFilesize
4KB
-
memory/2836-17-0x0000000004570000-0x0000000004571000-memory.dmpFilesize
4KB
-
memory/3848-23-0x00000000041E0000-0x00000000041E1000-memory.dmpFilesize
4KB
-
memory/3980-2-0x0000000000000000-mapping.dmp
-
memory/4168-22-0x0000000000400000-0x0000000000494000-memory.dmpFilesize
592KB
-
memory/4168-20-0x0000000004050000-0x0000000004051000-memory.dmpFilesize
4KB
-
memory/4352-6-0x0000000000000000-mapping.dmp
-
memory/4964-10-0x0000000004000000-0x0000000004092000-memory.dmpFilesize
584KB
-
memory/4964-11-0x0000000000400000-0x0000000000494000-memory.dmpFilesize
592KB
-
memory/4964-9-0x00000000041E0000-0x00000000041E1000-memory.dmpFilesize
4KB