Malware Analysis Report

2025-08-05 10:35

Sample ID 241107-svxv7atqfw
Target 3aa0d1bab7f1b677d7973f345063327a7b0d54a59aea46ab1b8de0fac950ebabN
SHA256 3aa0d1bab7f1b677d7973f345063327a7b0d54a59aea46ab1b8de0fac950ebab
Tags
upx discovery
score
5/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
5/10

SHA256

3aa0d1bab7f1b677d7973f345063327a7b0d54a59aea46ab1b8de0fac950ebab

Threat Level: Likely benign

The file 3aa0d1bab7f1b677d7973f345063327a7b0d54a59aea46ab1b8de0fac950ebabN was found to be: Likely benign.

Malicious Activity Summary

upx discovery

UPX packed file

Unsigned PE

System Location Discovery: System Language Discovery

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-07 15:27

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-07 15:27

Reported

2024-11-07 15:29

Platform

win7-20240729-en

Max time kernel

110s

Max time network

100s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3aa0d1bab7f1b677d7973f345063327a7b0d54a59aea46ab1b8de0fac950ebabN.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\3aa0d1bab7f1b677d7973f345063327a7b0d54a59aea46ab1b8de0fac950ebabN.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\3aa0d1bab7f1b677d7973f345063327a7b0d54a59aea46ab1b8de0fac950ebabN.exe

"C:\Users\Admin\AppData\Local\Temp\3aa0d1bab7f1b677d7973f345063327a7b0d54a59aea46ab1b8de0fac950ebabN.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 wecan.hasthe.technology udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp

Files

memory/2652-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2652-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2652-5-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-t0loJ1MXXjQmnjSo.exe

MD5 ebacba1f808b568393143408332bbc31
SHA1 6f2367406e6c7b2023ba999f3fa82a1ea13f2d0c
SHA256 64417273ffae7d8e89bd5b951bd7ce9edafbcf6fc3d87bef4f0302fd1d09c9ad
SHA512 28f54e87d0323f95f38aec1efbbe9b2b4c418ef666c45111c6c2057a22a7cf67ba3354488875655ed054a7bd22ce96863fcfd24b137e2d509fde42c059f2c3f1

memory/2652-15-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2652-22-0x0000000000400000-0x000000000042A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-07 15:27

Reported

2024-11-07 15:29

Platform

win10v2004-20241007-en

Max time kernel

120s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3aa0d1bab7f1b677d7973f345063327a7b0d54a59aea46ab1b8de0fac950ebabN.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\3aa0d1bab7f1b677d7973f345063327a7b0d54a59aea46ab1b8de0fac950ebabN.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\3aa0d1bab7f1b677d7973f345063327a7b0d54a59aea46ab1b8de0fac950ebabN.exe

"C:\Users\Admin\AppData\Local\Temp\3aa0d1bab7f1b677d7973f345063327a7b0d54a59aea46ab1b8de0fac950ebabN.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 106.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 199.59.21.104.in-addr.arpa udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 72.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp
US 104.21.59.199:80 wecan.hasthe.technology tcp

Files

memory/3680-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3680-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3680-4-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3680-7-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-OwjXxkW1LTyo4vgJ.exe

MD5 920f20d33d8aa8643d754ac7bed5debe
SHA1 b622ecf3c9e7833aaf25bd20f4a16f048f1ecd36
SHA256 68ea57d9366dbb8e89441644560cf0370a2f713b4f333b72bfcb9690abb07eac
SHA512 2b791a39e3cc1a68a03e22e84a14126b9c79cb77dc132605f6f27f67966f0df2a95b2902fb7d18b3c08bc86cc0281e74b926bf927662f3fe2405d24396a2dea0

memory/3680-16-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3680-21-0x0000000000400000-0x000000000042A000-memory.dmp