Malware Analysis Report

2025-06-15 23:12

Sample ID 241109-ndaxwasnaw
Target bae2e89a25e4277c56d3787732ade09930c90936565a4086e84f166525a5dbc3N
SHA256 bae2e89a25e4277c56d3787732ade09930c90936565a4086e84f166525a5dbc3
Tags
upx discovery
score
5/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
5/10

SHA256

bae2e89a25e4277c56d3787732ade09930c90936565a4086e84f166525a5dbc3

Threat Level: Likely benign

The file bae2e89a25e4277c56d3787732ade09930c90936565a4086e84f166525a5dbc3N was found to be: Likely benign.

Malicious Activity Summary

upx discovery

UPX packed file

Unsigned PE

System Location Discovery: System Language Discovery

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-09 11:16

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-09 11:16

Reported

2024-11-09 11:18

Platform

win7-20240903-en

Max time kernel

91s

Max time network

92s

Command Line

"C:\Users\Admin\AppData\Local\Temp\bae2e89a25e4277c56d3787732ade09930c90936565a4086e84f166525a5dbc3N.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\bae2e89a25e4277c56d3787732ade09930c90936565a4086e84f166525a5dbc3N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\bae2e89a25e4277c56d3787732ade09930c90936565a4086e84f166525a5dbc3N.exe

"C:\Users\Admin\AppData\Local\Temp\bae2e89a25e4277c56d3787732ade09930c90936565a4086e84f166525a5dbc3N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp

Files

memory/3036-0-0x0000000000400000-0x000000000043B000-memory.dmp

memory/3036-1-0x0000000000400000-0x000000000043B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-dZArrIoU3ANnwHCH.exe

MD5 954bcb8692dc8226935b38f1d285b1c6
SHA1 f2d06c218a9c504f443d51263619446f84b1778c
SHA256 0379458f0591a0f20aa4ab011bc21c3aa23f7858724c443073bf071f187ba090
SHA512 b152e018b264a65b58f50e5e29ac7cd29f985be46a83fc3224f5c577ceff5d64d755d56a09c111dec790b23c7383b4c3c1c823e8a121d1dc05ef349e247afab9

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-09 11:16

Reported

2024-11-09 11:18

Platform

win10v2004-20241007-en

Max time kernel

93s

Max time network

94s

Command Line

"C:\Users\Admin\AppData\Local\Temp\bae2e89a25e4277c56d3787732ade09930c90936565a4086e84f166525a5dbc3N.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\bae2e89a25e4277c56d3787732ade09930c90936565a4086e84f166525a5dbc3N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\bae2e89a25e4277c56d3787732ade09930c90936565a4086e84f166525a5dbc3N.exe

"C:\Users\Admin\AppData\Local\Temp\bae2e89a25e4277c56d3787732ade09930c90936565a4086e84f166525a5dbc3N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 136.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 40.183.67.172.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 101.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp

Files

memory/3112-0-0x0000000000400000-0x000000000043B000-memory.dmp

memory/3112-1-0x0000000000400000-0x000000000043B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-LrU1rLfG3Y2WYdfz.exe

MD5 734d1a6439afcd44e9fa0851504c6c52
SHA1 5f14708771bf30de7a613c438873c7dc69541990
SHA256 80fac3a14022ac467940dde2804048528857e3a21aed48df99f209baa0ec841d
SHA512 11cf77a331896946bda75c55286114667752bd706b84e4d44a5649bfe1340e4fb6980dfd08fcbb984da6f1d6af17b5a32aa3529201491b9bd2e786d1506869a6