Malware Analysis Report

2025-05-06 04:20

Sample ID 241109-s8bvwaxelp
Target b3d8411470d3965f2e48345c4f21b9b70e7f099f0373147903ac867d35122e23N
SHA256 b3d8411470d3965f2e48345c4f21b9b70e7f099f0373147903ac867d35122e23
Tags
discovery upx
score
5/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
5/10

SHA256

b3d8411470d3965f2e48345c4f21b9b70e7f099f0373147903ac867d35122e23

Threat Level: Likely benign

The file b3d8411470d3965f2e48345c4f21b9b70e7f099f0373147903ac867d35122e23N was found to be: Likely benign.

Malicious Activity Summary

discovery upx

UPX packed file

System Location Discovery: System Language Discovery

Unsigned PE

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-09 15:47

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-09 15:47

Reported

2024-11-09 15:49

Platform

win7-20241010-en

Max time kernel

119s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b3d8411470d3965f2e48345c4f21b9b70e7f099f0373147903ac867d35122e23N.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\b3d8411470d3965f2e48345c4f21b9b70e7f099f0373147903ac867d35122e23N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\b3d8411470d3965f2e48345c4f21b9b70e7f099f0373147903ac867d35122e23N.exe

"C:\Users\Admin\AppData\Local\Temp\b3d8411470d3965f2e48345c4f21b9b70e7f099f0373147903ac867d35122e23N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp

Files

memory/2128-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2128-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2128-5-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-gLkvYlIIrDNTr4w8.exe

MD5 7da7aafd26438dc24dfaf26b82452d69
SHA1 c7b360c07bd834134fa4e962a63bda84c139b419
SHA256 db80369c27bcfa4f33976bf0a2e9ec928ba6b4ee365970b3606f86d36fd47b25
SHA512 5565056bc66d85831f099445a94e255d526924dd7717a3afa8ab47302dc94c148299ae05d874bcd394e4c835b1e51bdec078c63ef79b03b64f1e67e0d0df7f61

memory/2128-12-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2128-22-0x0000000000400000-0x000000000042A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-09 15:47

Reported

2024-11-09 15:49

Platform

win10v2004-20241007-en

Max time kernel

110s

Max time network

96s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b3d8411470d3965f2e48345c4f21b9b70e7f099f0373147903ac867d35122e23N.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\b3d8411470d3965f2e48345c4f21b9b70e7f099f0373147903ac867d35122e23N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\b3d8411470d3965f2e48345c4f21b9b70e7f099f0373147903ac867d35122e23N.exe

"C:\Users\Admin\AppData\Local\Temp\b3d8411470d3965f2e48345c4f21b9b70e7f099f0373147903ac867d35122e23N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 199.59.21.104.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp

Files

memory/3196-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3196-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3196-4-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3196-8-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-J8oVR12ThtckvZaC.exe

MD5 fa196c5f4f47166a35c57a875dd792f8
SHA1 c1c84f29315012d2bb3db2f7d8f6d84311e6ecaf
SHA256 ed81dda7c7c4f9ddac2f36cf1a67e6bfaf5e1e648cb1a5969a0a7416098a4e6a
SHA512 8e40d57d64d89a43f98c531330a764606e34ba9e20417c57b5bc9b6e802176ad43fa4099bf94eeaddbfd79f8425ddfcaf2670870610f97b06c6b45e59e9627ab

memory/3196-12-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3196-20-0x0000000000400000-0x000000000042A000-memory.dmp