Malware Analysis Report

2025-08-10 13:40

Sample ID 241107-mgejsszlhs
Target 63af664c37c96b01c8b41a160f6abd03ea3095f99bd8d4d7c84818bbaafdede1N
SHA256 63af664c37c96b01c8b41a160f6abd03ea3095f99bd8d4d7c84818bbaafdede1
Tags
upx discovery
score
5/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
5/10

SHA256

63af664c37c96b01c8b41a160f6abd03ea3095f99bd8d4d7c84818bbaafdede1

Threat Level: Likely benign

The file 63af664c37c96b01c8b41a160f6abd03ea3095f99bd8d4d7c84818bbaafdede1N was found to be: Likely benign.

Malicious Activity Summary

upx discovery

UPX packed file

Unsigned PE

System Location Discovery: System Language Discovery

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-07 10:25

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-07 10:25

Reported

2024-11-07 10:27

Platform

win7-20241010-en

Max time kernel

110s

Max time network

96s

Command Line

"C:\Users\Admin\AppData\Local\Temp\63af664c37c96b01c8b41a160f6abd03ea3095f99bd8d4d7c84818bbaafdede1N.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\63af664c37c96b01c8b41a160f6abd03ea3095f99bd8d4d7c84818bbaafdede1N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\63af664c37c96b01c8b41a160f6abd03ea3095f99bd8d4d7c84818bbaafdede1N.exe

"C:\Users\Admin\AppData\Local\Temp\63af664c37c96b01c8b41a160f6abd03ea3095f99bd8d4d7c84818bbaafdede1N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp

Files

memory/2328-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2328-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2328-5-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-1RCjekKFfc46Uovd.exe

MD5 575ac30a25bfd8574e48704e754bdc9c
SHA1 c2e978cf4ddf458faadec82b25ef954c50ae2b38
SHA256 29db19244d394fa24e245da37659b2701faa0b748e2b3c68bc5d713579f007f4
SHA512 3de3366e4096f42b7f56305968a8181af6439fe98515917a41f359b8a602d2896f8704844946132c7fd2cad53a6ecb0f1659864f04d5f63adba8e105fef57900

memory/2328-12-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2328-22-0x0000000000400000-0x000000000042A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-07 10:25

Reported

2024-11-07 10:27

Platform

win10v2004-20241007-en

Max time kernel

110s

Max time network

95s

Command Line

"C:\Users\Admin\AppData\Local\Temp\63af664c37c96b01c8b41a160f6abd03ea3095f99bd8d4d7c84818bbaafdede1N.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\63af664c37c96b01c8b41a160f6abd03ea3095f99bd8d4d7c84818bbaafdede1N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\63af664c37c96b01c8b41a160f6abd03ea3095f99bd8d4d7c84818bbaafdede1N.exe

"C:\Users\Admin\AppData\Local\Temp\63af664c37c96b01c8b41a160f6abd03ea3095f99bd8d4d7c84818bbaafdede1N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 199.59.21.104.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 105.210.23.2.in-addr.arpa udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp

Files

memory/4784-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/4784-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/4784-4-0x0000000000400000-0x000000000042A000-memory.dmp

memory/4784-8-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-jKHGxqFzzpO9OifC.exe

MD5 ac228b710262587f5c33a3faa5a0ca44
SHA1 06e860f03f5a2b65b73065a865457a880e7ce51f
SHA256 31f4a398c4e45f0e18e809c8c52cb39f4f12160d6e8811a8e817cc2e9caae94d
SHA512 13003d6f458928199c3787f8f5a7cc9469fd3fa45b67ef0bc086eb5746ee395556050cbf2d6eed4c51299cdefce5cb4150db326797e8fb672e43389fe8f5a6e7

memory/4784-12-0x0000000000400000-0x000000000042A000-memory.dmp

memory/4784-19-0x0000000000400000-0x000000000042A000-memory.dmp