Malware Analysis Report

2025-05-06 04:20

Sample ID 241109-s2zy5axcna
Target e7d52e32023d523fb4d8d72958a2026950a230ed1ab4d44bec7cd5a7f8f8b0d5N
SHA256 e7d52e32023d523fb4d8d72958a2026950a230ed1ab4d44bec7cd5a7f8f8b0d5
Tags
upx discovery
score
5/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
5/10

SHA256

e7d52e32023d523fb4d8d72958a2026950a230ed1ab4d44bec7cd5a7f8f8b0d5

Threat Level: Likely benign

The file e7d52e32023d523fb4d8d72958a2026950a230ed1ab4d44bec7cd5a7f8f8b0d5N was found to be: Likely benign.

Malicious Activity Summary

upx discovery

UPX packed file

Unsigned PE

System Location Discovery: System Language Discovery

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-09 15:37

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-09 15:37

Reported

2024-11-09 15:40

Platform

win7-20241023-en

Max time kernel

110s

Max time network

92s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e7d52e32023d523fb4d8d72958a2026950a230ed1ab4d44bec7cd5a7f8f8b0d5N.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\e7d52e32023d523fb4d8d72958a2026950a230ed1ab4d44bec7cd5a7f8f8b0d5N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e7d52e32023d523fb4d8d72958a2026950a230ed1ab4d44bec7cd5a7f8f8b0d5N.exe

"C:\Users\Admin\AppData\Local\Temp\e7d52e32023d523fb4d8d72958a2026950a230ed1ab4d44bec7cd5a7f8f8b0d5N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 wecan.hasthe.technology udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 172.67.183.40:80 wecan.hasthe.technology tcp

Files

memory/2084-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2084-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2084-5-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-VyG69tug7G7UJRE8.exe

MD5 adf3ac89011cd4bef1401f5c793ae52d
SHA1 1cd0dd5bb32ad36348534beee341a954abf74b42
SHA256 687849e27755072529f6de9e5bd1744b5107a05fbaa36fadf9d71dcb5ddac7d7
SHA512 b018e7e87e13a4823abd19d16428079ab9912f393aa4867b4f0b243fb70356b50b7bc5575c378492ba2cc5bc7c37f514740a0e091f38f071e074db0966c046e8

memory/2084-12-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2084-22-0x0000000000400000-0x000000000042A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-09 15:37

Reported

2024-11-09 15:40

Platform

win10v2004-20241007-en

Max time kernel

120s

Max time network

93s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e7d52e32023d523fb4d8d72958a2026950a230ed1ab4d44bec7cd5a7f8f8b0d5N.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\e7d52e32023d523fb4d8d72958a2026950a230ed1ab4d44bec7cd5a7f8f8b0d5N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e7d52e32023d523fb4d8d72958a2026950a230ed1ab4d44bec7cd5a7f8f8b0d5N.exe

"C:\Users\Admin\AppData\Local\Temp\e7d52e32023d523fb4d8d72958a2026950a230ed1ab4d44bec7cd5a7f8f8b0d5N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 136.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 40.183.67.172.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 75.117.19.2.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp

Files

memory/3768-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3768-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3768-4-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3768-8-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-4u2LpnlKC3A6dbjF.exe

MD5 1ac0c16cee605f8adfb38293211c2666
SHA1 c686604dfd56a39e99baa2923bb0064d21415069
SHA256 75eca360864deac9e021708276e1838eea37ff46883dcb15419a19c013a4369a
SHA512 6833f6d3c3e7c4eb562f301a2141148ced9fc9aaffabe4239100e81fe8a75191c9ff744bbccb8f046226995c0cef56bce6026d7ed517691a215c27e309411323

memory/3768-15-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3768-22-0x0000000000400000-0x000000000042A000-memory.dmp