Malware Analysis Report

2025-08-10 13:40

Sample ID 241107-m3ndts1cqf
Target ffbc301e53ce605f9732967393320d119bc9482a4d70ca7fb01ae648e992b5afN
SHA256 ffbc301e53ce605f9732967393320d119bc9482a4d70ca7fb01ae648e992b5af
Tags
upx discovery
score
5/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
5/10

SHA256

ffbc301e53ce605f9732967393320d119bc9482a4d70ca7fb01ae648e992b5af

Threat Level: Likely benign

The file ffbc301e53ce605f9732967393320d119bc9482a4d70ca7fb01ae648e992b5afN was found to be: Likely benign.

Malicious Activity Summary

upx discovery

UPX packed file

Unsigned PE

System Location Discovery: System Language Discovery

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-07 10:59

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-07 10:59

Reported

2024-11-07 11:01

Platform

win7-20240903-en

Max time kernel

110s

Max time network

91s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ffbc301e53ce605f9732967393320d119bc9482a4d70ca7fb01ae648e992b5afN.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\ffbc301e53ce605f9732967393320d119bc9482a4d70ca7fb01ae648e992b5afN.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\ffbc301e53ce605f9732967393320d119bc9482a4d70ca7fb01ae648e992b5afN.exe

"C:\Users\Admin\AppData\Local\Temp\ffbc301e53ce605f9732967393320d119bc9482a4d70ca7fb01ae648e992b5afN.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp

Files

memory/2904-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2904-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2904-7-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-OB6a5vY0BNnCCjQp.exe

MD5 cb70b3fdd5b0c36a6b82700c098bbc71
SHA1 bb69b05359a720390bc36d442a685063a0229dba
SHA256 b53e82c2a7adbd64bc8263a26c76f97913b86e7955571da67370288aa3ea1634
SHA512 50cee708ca986ad73754ca4407c134adac50cf171d83de188e5ba1df63b748259c2beeb91eedecb618bd456456a18c77772785e322d846a79f664d3b85a0d924

memory/2904-14-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2904-22-0x0000000000400000-0x000000000042A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-07 10:59

Reported

2024-11-07 11:01

Platform

win10v2004-20241007-en

Max time kernel

111s

Max time network

95s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ffbc301e53ce605f9732967393320d119bc9482a4d70ca7fb01ae648e992b5afN.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\ffbc301e53ce605f9732967393320d119bc9482a4d70ca7fb01ae648e992b5afN.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\ffbc301e53ce605f9732967393320d119bc9482a4d70ca7fb01ae648e992b5afN.exe

"C:\Users\Admin\AppData\Local\Temp\ffbc301e53ce605f9732967393320d119bc9482a4d70ca7fb01ae648e992b5afN.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 199.59.21.104.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 75.117.19.2.in-addr.arpa udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp

Files

memory/4628-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/4628-2-0x0000000000400000-0x000000000042A000-memory.dmp

memory/4628-5-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-GlHgYxvEhfS9RLCS.exe

MD5 cf893844ef2e615f42167791072bf61c
SHA1 5c7e015315fe7f0a24a0c8448c2eb2e7ac4f8f83
SHA256 ffce94c710852f9b5912837f37bc99b12c8566c30f54bc35b6bd93628bc7e00d
SHA512 61590f983d844c62c5a1bff018993801524f6c2776d46c22618bb304e03e54ed4c332732ba3ddf51e7d2e0a1cb71ef9633807b3f844c31c724d5584d345b6e6f

memory/4628-16-0x0000000000400000-0x000000000042A000-memory.dmp

memory/4628-23-0x0000000000400000-0x000000000042A000-memory.dmp