Malware Analysis Report

2025-05-06 04:19

Sample ID 241109-s91kmaznhl
Target a95af4e1de377a73c6fd7b3b1fba0cb03006e3b8418ff3d368cb3b740a215dfcN
SHA256 a95af4e1de377a73c6fd7b3b1fba0cb03006e3b8418ff3d368cb3b740a215dfc
Tags
upx discovery
score
5/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
5/10

SHA256

a95af4e1de377a73c6fd7b3b1fba0cb03006e3b8418ff3d368cb3b740a215dfc

Threat Level: Likely benign

The file a95af4e1de377a73c6fd7b3b1fba0cb03006e3b8418ff3d368cb3b740a215dfcN was found to be: Likely benign.

Malicious Activity Summary

upx discovery

UPX packed file

Unsigned PE

System Location Discovery: System Language Discovery

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-09 15:50

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-09 15:50

Reported

2024-11-09 15:52

Platform

win7-20240729-en

Max time kernel

110s

Max time network

92s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a95af4e1de377a73c6fd7b3b1fba0cb03006e3b8418ff3d368cb3b740a215dfcN.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\a95af4e1de377a73c6fd7b3b1fba0cb03006e3b8418ff3d368cb3b740a215dfcN.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a95af4e1de377a73c6fd7b3b1fba0cb03006e3b8418ff3d368cb3b740a215dfcN.exe

"C:\Users\Admin\AppData\Local\Temp\a95af4e1de377a73c6fd7b3b1fba0cb03006e3b8418ff3d368cb3b740a215dfcN.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp

Files

memory/2592-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2592-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2592-7-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-D3V4rNgW4tRGEMRK.exe

MD5 d5ddbe7c0d01157511b3d9a7a774e9fc
SHA1 9709d9b89e1fa4f5cf3ed00f79f48e0c13e8c33a
SHA256 c458b3403f435b8a1612a321fd83537b4da147f85715ecc66f7a9a1a4a40153c
SHA512 9fec9ac6f6edaea37ec7cfa33bfb5accae76b52bcfc33730478c190d4cd52f53e67990a85b9a000e96f0386144b1e423e0953cc5ba851c6cf16680715d1a4373

memory/2592-14-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2592-22-0x0000000000400000-0x000000000042A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-09 15:50

Reported

2024-11-09 15:52

Platform

win10v2004-20241007-en

Max time kernel

111s

Max time network

96s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a95af4e1de377a73c6fd7b3b1fba0cb03006e3b8418ff3d368cb3b740a215dfcN.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\a95af4e1de377a73c6fd7b3b1fba0cb03006e3b8418ff3d368cb3b740a215dfcN.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a95af4e1de377a73c6fd7b3b1fba0cb03006e3b8418ff3d368cb3b740a215dfcN.exe

"C:\Users\Admin\AppData\Local\Temp\a95af4e1de377a73c6fd7b3b1fba0cb03006e3b8418ff3d368cb3b740a215dfcN.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 199.59.21.104.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 100.208.201.84.in-addr.arpa udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp

Files

memory/208-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/208-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/208-4-0x0000000000400000-0x000000000042A000-memory.dmp

memory/208-8-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-Iq4RbDdbrQvrsah2.exe

MD5 54943ed294a47c31e748c63a8d158cbe
SHA1 156883b8a7ff8335c9a1c330a395b1a89249afdf
SHA256 bacad7be81b76c418b36ec24a1fbea4bfe2bcea9f7811ddb0f8fe4ba270fee19
SHA512 8406a205d0f07ce99167ddff3083aa79db62cf3bfbc3869ee33767b47ed30394cb2d7be3bde711615631ed848166f5258538978a0c8f3d22d2c21a57de0d0fcb

memory/208-15-0x0000000000400000-0x000000000042A000-memory.dmp

memory/208-22-0x0000000000400000-0x000000000042A000-memory.dmp