Malware Analysis Report

2024-11-13 13:40

Sample ID 240614-bzcmdazenh
Target 46d50a1820188bfbd7939e884def2740.bin
SHA256 191ab5a4a1b7354b7a7e8a12fb0cbb4c57d26f831d6a3d6fcb7ff8d8bf395f73
Tags
upx
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

191ab5a4a1b7354b7a7e8a12fb0cbb4c57d26f831d6a3d6fcb7ff8d8bf395f73

Threat Level: Shows suspicious behavior

The file 46d50a1820188bfbd7939e884def2740.bin was found to be: Shows suspicious behavior.

Malicious Activity Summary

upx

UPX packed file

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-14 01:34

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 01:34

Reported

2024-06-14 01:37

Platform

win7-20240221-en

Max time kernel

140s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\46d50a1820188bfbd7939e884def2740.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\46d50a1820188bfbd7939e884def2740.exe

"C:\Users\Admin\AppData\Local\Temp\46d50a1820188bfbd7939e884def2740.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp

Files

memory/1288-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1288-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1288-7-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-3kCuyuBCOu2HIwx2.exe

MD5 dcea8ee765ba9a6539a333e88517dbcc
SHA1 fbaf9ea69e3f1ebfd87374f8b7396ddb69664ec7
SHA256 4559316e3d3629d44f672aefda2098601711451cdaa08a5a53671f9177f4e485
SHA512 f50fa22bdc87e1988a69e50badca7e0d03109559a38a0759396b878eb0f1b5e87d2d2278d03441f5f1a109cf95ebc48dde4ea0d4cf0710c77ca4a02d662ba30f

memory/1288-14-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1288-21-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1288-28-0x0000000000400000-0x000000000042A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 01:34

Reported

2024-06-14 01:37

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\46d50a1820188bfbd7939e884def2740.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\46d50a1820188bfbd7939e884def2740.exe

"C:\Users\Admin\AppData\Local\Temp\46d50a1820188bfbd7939e884def2740.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 wecan.hasthe.technology udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 8.8.8.8:53 wecan.hasthe.technology udp

Files

memory/1208-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1208-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1208-4-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1208-10-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1208-15-0x0000000000400000-0x000000000042A000-memory.dmp