Malware Analysis Report

2025-06-15 23:12

Sample ID 241109-m8enwatbph
Target e43f853e716a008e5d3290bc580b1670561913a63340411d282c704b2fe4f2daN
SHA256 e43f853e716a008e5d3290bc580b1670561913a63340411d282c704b2fe4f2da
Tags
upx discovery
score
5/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
5/10

SHA256

e43f853e716a008e5d3290bc580b1670561913a63340411d282c704b2fe4f2da

Threat Level: Likely benign

The file e43f853e716a008e5d3290bc580b1670561913a63340411d282c704b2fe4f2daN was found to be: Likely benign.

Malicious Activity Summary

upx discovery

UPX packed file

Unsigned PE

System Location Discovery: System Language Discovery

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-09 11:07

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-09 11:07

Reported

2024-11-09 11:09

Platform

win7-20240903-en

Max time kernel

119s

Max time network

91s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e43f853e716a008e5d3290bc580b1670561913a63340411d282c704b2fe4f2daN.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\e43f853e716a008e5d3290bc580b1670561913a63340411d282c704b2fe4f2daN.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e43f853e716a008e5d3290bc580b1670561913a63340411d282c704b2fe4f2daN.exe

"C:\Users\Admin\AppData\Local\Temp\e43f853e716a008e5d3290bc580b1670561913a63340411d282c704b2fe4f2daN.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 wecan.hasthe.technology udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp

Files

memory/1992-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1992-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1992-7-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-kIRVPbS76phVPSkI.exe

MD5 f9994b1ebfa551c717a4a1ec8a296ec6
SHA1 a0a95075d7f0d518aedf3f48fda5ad3cbe77cc64
SHA256 765759a72b1edaa2045b832853e9b9ba716dda7bb4aa7cb1e6afc4ea9253de06
SHA512 975ff305d1e6d5cbf7ff5518185634479806c54ab9332cfdf06eb367f79b4e13b5e0398161e72971f6b281012920e05400f796df73fecc71462c7170a8f1c2dc

memory/1992-14-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1992-22-0x0000000000400000-0x000000000042A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-09 11:07

Reported

2024-11-09 11:09

Platform

win10v2004-20241007-en

Max time kernel

111s

Max time network

94s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e43f853e716a008e5d3290bc580b1670561913a63340411d282c704b2fe4f2daN.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\e43f853e716a008e5d3290bc580b1670561913a63340411d282c704b2fe4f2daN.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e43f853e716a008e5d3290bc580b1670561913a63340411d282c704b2fe4f2daN.exe

"C:\Users\Admin\AppData\Local\Temp\e43f853e716a008e5d3290bc580b1670561913a63340411d282c704b2fe4f2daN.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 40.183.67.172.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 249.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 210.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp

Files

memory/3092-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3092-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3092-4-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3092-8-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3092-11-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-vCzvmS8dVb8tViJF.exe

MD5 668a456a12e4fab360ac800026906273
SHA1 b96bd7423be529ae2ecf11233aae02a39d2827a1
SHA256 514d7d7df0754f0583ad4a67e16021575592e00f01271f84a4b5c265a3d182ce
SHA512 6ef1ac2ca1d8f2f393bb082a1a33228f70a67043362e7d1812a5f6b624e8cbebaf095f0e0b21b6355921872cf7bd908ba7c3be1799602b9d4d3e76c4b0697e57

memory/3092-15-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3092-18-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3092-22-0x0000000000400000-0x000000000042A000-memory.dmp