Malware Analysis Report

2025-06-15 23:12

Sample ID 241109-m7sjcatbnh
Target 31d4e850366a415c394f28c11863a641d8e435b5f322a731bd30fb951d10dd73N
SHA256 31d4e850366a415c394f28c11863a641d8e435b5f322a731bd30fb951d10dd73
Tags
discovery upx
score
5/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
5/10

SHA256

31d4e850366a415c394f28c11863a641d8e435b5f322a731bd30fb951d10dd73

Threat Level: Likely benign

The file 31d4e850366a415c394f28c11863a641d8e435b5f322a731bd30fb951d10dd73N was found to be: Likely benign.

Malicious Activity Summary

discovery upx

UPX packed file

System Location Discovery: System Language Discovery

Unsigned PE

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-09 11:06

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-09 11:06

Reported

2024-11-09 11:08

Platform

win7-20240903-en

Max time kernel

110s

Max time network

92s

Command Line

"C:\Users\Admin\AppData\Local\Temp\31d4e850366a415c394f28c11863a641d8e435b5f322a731bd30fb951d10dd73N.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\31d4e850366a415c394f28c11863a641d8e435b5f322a731bd30fb951d10dd73N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\31d4e850366a415c394f28c11863a641d8e435b5f322a731bd30fb951d10dd73N.exe

"C:\Users\Admin\AppData\Local\Temp\31d4e850366a415c394f28c11863a641d8e435b5f322a731bd30fb951d10dd73N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp

Files

memory/2844-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2844-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2844-5-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-k4k2uu3slkcOD8FM.exe

MD5 dfb0d7bb4ff0f4beba6ffc3dc60447ef
SHA1 476a22098a5dbe42aa165c18be85c147fd06654e
SHA256 fdeadf18d1b12a78ec050b6d1595ff1a6a7d7b374103243695d5f9a3c4cf0c17
SHA512 92fe1c8fd0314e31cbf90436a1fdf41fdd40f509e2d5fa45637c37d8a0e978cd1b2ce85a3a287f9ae98e16c627f5e7f7a27fc73b919a0f4505fed84ee72cb00f

memory/2844-12-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2844-22-0x0000000000400000-0x000000000042A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-09 11:06

Reported

2024-11-09 11:08

Platform

win10v2004-20241007-en

Max time kernel

111s

Max time network

96s

Command Line

"C:\Users\Admin\AppData\Local\Temp\31d4e850366a415c394f28c11863a641d8e435b5f322a731bd30fb951d10dd73N.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\31d4e850366a415c394f28c11863a641d8e435b5f322a731bd30fb951d10dd73N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\31d4e850366a415c394f28c11863a641d8e435b5f322a731bd30fb951d10dd73N.exe

"C:\Users\Admin\AppData\Local\Temp\31d4e850366a415c394f28c11863a641d8e435b5f322a731bd30fb951d10dd73N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 73.82.67.80.in-addr.arpa udp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 199.59.21.104.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp

Files

memory/1312-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1312-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1312-8-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-VeBymWoE4OwZEdsg.exe

MD5 436a29e12db9117f66e6f221ce74d17b
SHA1 e7b236c40c50a4058604293935cd089d2814379d
SHA256 e29478f2c5383c5cdf6fa3dc25cf3d5e289170b82204c78a7dbb9971828ea039
SHA512 cf878fc202c84cd91d80ebd2ab9df014f06009f1104307da4fa28a20028f102bf59e0edd3285dc328d90bbc60c3bcb811640376cf78920ecc8cdd05208d518f7

memory/1312-15-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1312-19-0x0000000000400000-0x000000000042A000-memory.dmp