Malware Analysis Report

2025-08-05 10:33

Sample ID 241107-tbee6svjgz
Target 578adcf20ee5125e82a4944a220739e5830914e077a44d67fc69133023703b1eN
SHA256 578adcf20ee5125e82a4944a220739e5830914e077a44d67fc69133023703b1e
Tags
upx discovery
score
5/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
5/10

SHA256

578adcf20ee5125e82a4944a220739e5830914e077a44d67fc69133023703b1e

Threat Level: Likely benign

The file 578adcf20ee5125e82a4944a220739e5830914e077a44d67fc69133023703b1eN was found to be: Likely benign.

Malicious Activity Summary

upx discovery

UPX packed file

Unsigned PE

System Location Discovery: System Language Discovery

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-07 15:52

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-07 15:52

Reported

2024-11-07 15:54

Platform

win7-20241010-en

Max time kernel

120s

Max time network

96s

Command Line

"C:\Users\Admin\AppData\Local\Temp\578adcf20ee5125e82a4944a220739e5830914e077a44d67fc69133023703b1eN.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\578adcf20ee5125e82a4944a220739e5830914e077a44d67fc69133023703b1eN.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\578adcf20ee5125e82a4944a220739e5830914e077a44d67fc69133023703b1eN.exe

"C:\Users\Admin\AppData\Local\Temp\578adcf20ee5125e82a4944a220739e5830914e077a44d67fc69133023703b1eN.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp

Files

memory/2188-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2188-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2188-5-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-WdNLEtOZp7823sxn.exe

MD5 c0d0b632010bf3f82b666fda3fdf410f
SHA1 271592510c7755d5bd3f8c678a6e96f608e3c28c
SHA256 5e3e88c30f3c54e5d99dde4e853ed272c5e512ea8d14d9cea2827cc39ef03941
SHA512 dc5a962392f50dcb538afa8d9d34a8230826da1fe58e7baf574c95753f864bab00851e85603d651748976c58e9b728e13c52abaa3f0f75144c9761f1329dc34e

memory/2188-12-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2188-22-0x0000000000400000-0x000000000042A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-07 15:52

Reported

2024-11-07 15:54

Platform

win10v2004-20241007-en

Max time kernel

110s

Max time network

95s

Command Line

"C:\Users\Admin\AppData\Local\Temp\578adcf20ee5125e82a4944a220739e5830914e077a44d67fc69133023703b1eN.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\578adcf20ee5125e82a4944a220739e5830914e077a44d67fc69133023703b1eN.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\578adcf20ee5125e82a4944a220739e5830914e077a44d67fc69133023703b1eN.exe

"C:\Users\Admin\AppData\Local\Temp\578adcf20ee5125e82a4944a220739e5830914e077a44d67fc69133023703b1eN.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 136.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 40.183.67.172.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
US 8.8.8.8:53 75.117.19.2.in-addr.arpa udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 106.209.201.84.in-addr.arpa udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp

Files

memory/4944-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/4944-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/4944-5-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-WsdlqkTw8htO6iIe.exe

MD5 4fb82258356864bef180ff5c5e092ed4
SHA1 4a2050835b445905f435aa1eb2bd89649499543b
SHA256 26b54cfcfba62471e8f6d790d0b565785147692ab4ff67c6b4698763bdd61cfe
SHA512 1798bba3c76d5fab1b478f08eeba1ff2cd076a3cfe8f261ccc587d5ebd5e01625fa8fa4ac448c64f551fe1ee100ef479303fb61c2a027d6409013a23de07e9a9

memory/4944-14-0x0000000000400000-0x000000000042A000-memory.dmp

memory/4944-21-0x0000000000400000-0x000000000042A000-memory.dmp