Malware Analysis Report

2025-08-11 07:05

Sample ID 241107-md26pasrgj
Target 3c60be65e5e827cf503b96827a768938af0a84d725fe3d6e839fef264a60ca86N
SHA256 3c60be65e5e827cf503b96827a768938af0a84d725fe3d6e839fef264a60ca86
Tags
discovery upx
score
5/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
5/10

SHA256

3c60be65e5e827cf503b96827a768938af0a84d725fe3d6e839fef264a60ca86

Threat Level: Likely benign

The file 3c60be65e5e827cf503b96827a768938af0a84d725fe3d6e839fef264a60ca86N was found to be: Likely benign.

Malicious Activity Summary

discovery upx

UPX packed file

System Location Discovery: System Language Discovery

Unsigned PE

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-07 10:21

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-07 10:21

Reported

2024-11-07 10:23

Platform

win7-20240903-en

Max time kernel

117s

Max time network

118s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3c60be65e5e827cf503b96827a768938af0a84d725fe3d6e839fef264a60ca86N.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\3c60be65e5e827cf503b96827a768938af0a84d725fe3d6e839fef264a60ca86N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\3c60be65e5e827cf503b96827a768938af0a84d725fe3d6e839fef264a60ca86N.exe

"C:\Users\Admin\AppData\Local\Temp\3c60be65e5e827cf503b96827a768938af0a84d725fe3d6e839fef264a60ca86N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 wecan.hasthe.technology udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 172.67.183.40:80 wecan.hasthe.technology tcp

Files

memory/812-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/812-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/812-7-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-uaGiyggIVmOdvUEB.exe

MD5 0b331ad50f96b3a47a3a7c608bd8e64e
SHA1 37ea64dae66fbf6319f441740a4e72583e760c36
SHA256 79161bb4b3a9c1971510b483c7890f74c477e7251669340d84f7334e913ba1e6
SHA512 31c4fcf70e76068eff5691fa054828a79987b16e084201de7c29a7ba897b2f36ae530ae702e2dad2e6201b4bdfad8108656c0280a9f1b983569061463249a786

memory/812-14-0x0000000000400000-0x000000000042A000-memory.dmp

memory/812-22-0x0000000000400000-0x000000000042A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-07 10:21

Reported

2024-11-07 10:23

Platform

win10v2004-20241007-en

Max time kernel

111s

Max time network

95s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3c60be65e5e827cf503b96827a768938af0a84d725fe3d6e839fef264a60ca86N.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\3c60be65e5e827cf503b96827a768938af0a84d725fe3d6e839fef264a60ca86N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\3c60be65e5e827cf503b96827a768938af0a84d725fe3d6e839fef264a60ca86N.exe

"C:\Users\Admin\AppData\Local\Temp\3c60be65e5e827cf503b96827a768938af0a84d725fe3d6e839fef264a60ca86N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 40.183.67.172.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 98.117.19.2.in-addr.arpa udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp

Files

memory/5044-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/5044-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/5044-4-0x0000000000400000-0x000000000042A000-memory.dmp

memory/5044-8-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-EmCacle7gzi1qFkK.exe

MD5 728a90c82e1c789e95749ad9edfbc8ed
SHA1 02bba34e67080a5ec4a0e9400564257d4ce4fe83
SHA256 6fb9ad59ef54ca66355c826cd49fcd7b33e09aec7c1570c45cbedf842843ac5b
SHA512 90eeeb05002a8c92f9a3a89bcd78d17fee0a05b69db5e17e48984eec71f70122d3647b15100d76864653fa391c7ec4b9058cf686ab3dd8920d250de8658050ba

memory/5044-12-0x0000000000400000-0x000000000042A000-memory.dmp

memory/5044-20-0x0000000000400000-0x000000000042A000-memory.dmp