Malware Analysis Report

2025-05-06 04:20

Sample ID 241109-s8mmdaxemj
Target 4cc6bb4f889936641cc45c13cdf2347060ccce62e5f2f1f3e5df0681c1c82903N
SHA256 4cc6bb4f889936641cc45c13cdf2347060ccce62e5f2f1f3e5df0681c1c82903
Tags
upx discovery
score
5/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
5/10

SHA256

4cc6bb4f889936641cc45c13cdf2347060ccce62e5f2f1f3e5df0681c1c82903

Threat Level: Likely benign

The file 4cc6bb4f889936641cc45c13cdf2347060ccce62e5f2f1f3e5df0681c1c82903N was found to be: Likely benign.

Malicious Activity Summary

upx discovery

UPX packed file

Unsigned PE

System Location Discovery: System Language Discovery

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-09 15:47

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-09 15:47

Reported

2024-11-09 15:49

Platform

win7-20240729-en

Max time kernel

119s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4cc6bb4f889936641cc45c13cdf2347060ccce62e5f2f1f3e5df0681c1c82903N.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\4cc6bb4f889936641cc45c13cdf2347060ccce62e5f2f1f3e5df0681c1c82903N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\4cc6bb4f889936641cc45c13cdf2347060ccce62e5f2f1f3e5df0681c1c82903N.exe

"C:\Users\Admin\AppData\Local\Temp\4cc6bb4f889936641cc45c13cdf2347060ccce62e5f2f1f3e5df0681c1c82903N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 wecan.hasthe.technology udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 172.67.183.40:80 wecan.hasthe.technology tcp

Files

memory/2088-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2088-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2088-7-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-YhQYwAa7jkyiHEqy.exe

MD5 9032fa6240c224d2b86cd3993686af63
SHA1 ee23347caa6fbc762350b6bc3c3bafc0194e87ad
SHA256 c6fde723718b5abd790263258ba45267c0d90389f07848f4fbe869203ae2814f
SHA512 9c0635bc903ae833b22ba042915b4ddefe5e70e14c48c414921d7a7984b8d7eff056967a1ab60b338a41cf95b7220faaa39e8c93df90c2d6488190b0d60d489b

memory/2088-14-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2088-22-0x0000000000400000-0x000000000042A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-09 15:47

Reported

2024-11-09 15:49

Platform

win10v2004-20241007-en

Max time kernel

111s

Max time network

95s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4cc6bb4f889936641cc45c13cdf2347060ccce62e5f2f1f3e5df0681c1c82903N.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\4cc6bb4f889936641cc45c13cdf2347060ccce62e5f2f1f3e5df0681c1c82903N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\4cc6bb4f889936641cc45c13cdf2347060ccce62e5f2f1f3e5df0681c1c82903N.exe

"C:\Users\Admin\AppData\Local\Temp\4cc6bb4f889936641cc45c13cdf2347060ccce62e5f2f1f3e5df0681c1c82903N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 136.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 199.59.21.104.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 75.117.19.2.in-addr.arpa udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 67.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp

Files

memory/4828-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/4828-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/4828-4-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-MsREF9ZDyvMG7NKh.exe

MD5 aa2041aba27b17abe8e14704a6c8fbb1
SHA1 0eb3c1adf78360b93e8893e7a0804111f0062a59
SHA256 b805da041ed405c7d26a678b716f6cc9dd6e0f1d2b9e6b06d30f59ec98e5fa0b
SHA512 57ba464056661257ac948757dce6d8cdb9a0f5f463e8c1e19e68cfe1b90866ad427e76451a3910d9fc8b5fa3cbaeaae7a350719156d6799b03bdbb16e40496a7

memory/4828-13-0x0000000000400000-0x000000000042A000-memory.dmp

memory/4828-21-0x0000000000400000-0x000000000042A000-memory.dmp