Analysis Overview
SHA256
b91b1936af5be1fcc772db1557679e7b9e4724f35155f854babdfe4f01fe56f4
Threat Level: Likely benign
The file b91b1936af5be1fcc772db1557679e7b9e4724f35155f854babdfe4f01fe56f4N was found to be: Likely benign.
Malicious Activity Summary
UPX packed file
Unsigned PE
System Location Discovery: System Language Discovery
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-09 15:27
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-09 15:27
Reported
2024-11-09 15:30
Platform
win7-20241010-en
Max time kernel
111s
Max time network
96s
Command Line
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\b91b1936af5be1fcc772db1557679e7b9e4724f35155f854babdfe4f01fe56f4N.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\b91b1936af5be1fcc772db1557679e7b9e4724f35155f854babdfe4f01fe56f4N.exe
"C:\Users\Admin\AppData\Local\Temp\b91b1936af5be1fcc772db1557679e7b9e4724f35155f854babdfe4f01fe56f4N.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | wecan.hasthe.technology | udp |
| US | 172.67.183.40:80 | wecan.hasthe.technology | tcp |
| US | 8.8.8.8:53 | wecan.hasthe.technology | udp |
| US | 104.21.59.199:80 | wecan.hasthe.technology | tcp |
| US | 104.21.59.199:80 | wecan.hasthe.technology | tcp |
Files
memory/3036-0-0x0000000000400000-0x000000000042A000-memory.dmp
memory/3036-1-0x0000000000400000-0x000000000042A000-memory.dmp
memory/3036-5-0x0000000000400000-0x000000000042A000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\rifaien2-3jEUqnTzN4D10Wsi.exe
| MD5 | d32c5dfb6c424041ec2900613f1aa0c9 |
| SHA1 | 218bdbb5a1cf2a21373805ad06b9e589d0078d3e |
| SHA256 | 4c268e7029fd52ab7408bda5382753e47196f9c60344ba1b40cc82b39cd9da6e |
| SHA512 | 0ddef2a519827fe803cc1819d148b6eb714ff0180acc3126ac8bc7b426e039ed1d6feb4b62eb73521769b8961152ad155449ab4653b47b30d3939b346d00b8ff |
memory/3036-12-0x0000000000400000-0x000000000042A000-memory.dmp
memory/3036-22-0x0000000000400000-0x000000000042A000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-09 15:27
Reported
2024-11-09 15:30
Platform
win10v2004-20241007-en
Max time kernel
110s
Max time network
96s
Command Line
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\b91b1936af5be1fcc772db1557679e7b9e4724f35155f854babdfe4f01fe56f4N.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\b91b1936af5be1fcc772db1557679e7b9e4724f35155f854babdfe4f01fe56f4N.exe
"C:\Users\Admin\AppData\Local\Temp\b91b1936af5be1fcc772db1557679e7b9e4724f35155f854babdfe4f01fe56f4N.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 17.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | wecan.hasthe.technology | udp |
| US | 172.67.183.40:80 | wecan.hasthe.technology | tcp |
| US | 8.8.8.8:53 | 197.87.175.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 40.183.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.117.19.2.in-addr.arpa | udp |
| US | 172.67.183.40:80 | wecan.hasthe.technology | tcp |
| US | 172.67.183.40:80 | wecan.hasthe.technology | tcp |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 31.243.111.52.in-addr.arpa | udp |
Files
memory/1912-0-0x0000000000400000-0x000000000042A000-memory.dmp
memory/1912-1-0x0000000000400000-0x000000000042A000-memory.dmp
memory/1912-4-0x0000000000400000-0x000000000042A000-memory.dmp
memory/1912-8-0x0000000000400000-0x000000000042A000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\rifaien2-YIgfgLsIgHMctTSL.exe
| MD5 | 6ef9793b6702f6b18fb5cf4399032927 |
| SHA1 | e6254e89311fef5aaa16e642f99b00f9090ee4e0 |
| SHA256 | eab4c73dd43009eb77e176fff093a6d7de17ee4fd59f88848ada1df2d8491969 |
| SHA512 | 45aabef6f8010333d07b31fa4e358722658cf55e4c9e230c8a36f68b3e9d75dd40eb9938bd8c3970a38eec8432a9eccda85cfb633d9dad8f6d067df85a9e513a |
memory/1912-15-0x0000000000400000-0x000000000042A000-memory.dmp
memory/1912-22-0x0000000000400000-0x000000000042A000-memory.dmp