Malware Analysis Report

2025-05-28 21:06

Sample ID 241109-q1ssbavhpb
Target 1312b29ac2b7377595391c10d0de801638c3d08adaf1495a614144dc031d5dedN
SHA256 1312b29ac2b7377595391c10d0de801638c3d08adaf1495a614144dc031d5ded
Tags
upx discovery
score
5/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
5/10

SHA256

1312b29ac2b7377595391c10d0de801638c3d08adaf1495a614144dc031d5ded

Threat Level: Likely benign

The file 1312b29ac2b7377595391c10d0de801638c3d08adaf1495a614144dc031d5dedN was found to be: Likely benign.

Malicious Activity Summary

upx discovery

UPX packed file

Unsigned PE

System Location Discovery: System Language Discovery

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-09 13:44

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-09 13:44

Reported

2024-11-09 13:46

Platform

win7-20240903-en

Max time kernel

118s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1312b29ac2b7377595391c10d0de801638c3d08adaf1495a614144dc031d5dedN.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1312b29ac2b7377595391c10d0de801638c3d08adaf1495a614144dc031d5dedN.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\1312b29ac2b7377595391c10d0de801638c3d08adaf1495a614144dc031d5dedN.exe

"C:\Users\Admin\AppData\Local\Temp\1312b29ac2b7377595391c10d0de801638c3d08adaf1495a614144dc031d5dedN.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp

Files

memory/2124-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2124-2-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2124-6-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-17SCm8iHH7m4okl8.exe

MD5 4f572c7c4b46602157030e230f1b9775
SHA1 f269902c0953f0ea7cd91c1c14d497c8e40742e3
SHA256 cc0e94bc91c049bfb1173ab4ca93967b425eeb37abb3258ef2e915d824c2d592
SHA512 2870950194568890d05948b4a36c51dd4b8926b88b33e68f0c3e9f59bfc5b38ebce3c95c31a1670b8bf25619c0bd3e6c22fec406c4778852599edf2a8b714c17

memory/2124-13-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2124-23-0x0000000000400000-0x000000000042A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-09 13:44

Reported

2024-11-09 13:46

Platform

win10v2004-20241007-en

Max time kernel

110s

Max time network

95s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1312b29ac2b7377595391c10d0de801638c3d08adaf1495a614144dc031d5dedN.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1312b29ac2b7377595391c10d0de801638c3d08adaf1495a614144dc031d5dedN.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\1312b29ac2b7377595391c10d0de801638c3d08adaf1495a614144dc031d5dedN.exe

"C:\Users\Admin\AppData\Local\Temp\1312b29ac2b7377595391c10d0de801638c3d08adaf1495a614144dc031d5dedN.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 136.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 199.59.21.104.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 98.117.19.2.in-addr.arpa udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp

Files

memory/2520-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2520-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2520-4-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2520-8-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-Ng1bFdKGObDoZzgQ.exe

MD5 c9eb7ced84d52ffaf359c505fe090091
SHA1 3e399f47aeeed861c3bcb969bcfb85cbba11ed30
SHA256 2e6317a25549385eb034edb6c8166c7ed9e47c193d28e15153b13f48f5351bf1
SHA512 d11b5321e157500421b9326ee6ceb760ba730db22b51e0e52eaa5d7d392f3dd9522cf800a111d8287307ad720a324464f01a5a1eae16f1f23c44076c4642a91f

memory/2520-15-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2520-22-0x0000000000400000-0x000000000042A000-memory.dmp