Malware Analysis Report

2025-05-06 04:20

Sample ID 241109-swgwcswlev
Target 4853f03224f1a361a613686f687c64fb96321818d4e64a3c81cdcb406a43cd8dN
SHA256 4853f03224f1a361a613686f687c64fb96321818d4e64a3c81cdcb406a43cd8d
Tags
upx discovery
score
5/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
5/10

SHA256

4853f03224f1a361a613686f687c64fb96321818d4e64a3c81cdcb406a43cd8d

Threat Level: Likely benign

The file 4853f03224f1a361a613686f687c64fb96321818d4e64a3c81cdcb406a43cd8dN was found to be: Likely benign.

Malicious Activity Summary

upx discovery

UPX packed file

Unsigned PE

System Location Discovery: System Language Discovery

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-09 15:28

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-09 15:28

Reported

2024-11-09 15:30

Platform

win7-20241010-en

Max time kernel

117s

Max time network

118s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4853f03224f1a361a613686f687c64fb96321818d4e64a3c81cdcb406a43cd8dN.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\4853f03224f1a361a613686f687c64fb96321818d4e64a3c81cdcb406a43cd8dN.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\4853f03224f1a361a613686f687c64fb96321818d4e64a3c81cdcb406a43cd8dN.exe

"C:\Users\Admin\AppData\Local\Temp\4853f03224f1a361a613686f687c64fb96321818d4e64a3c81cdcb406a43cd8dN.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 172.67.183.40:80 wecan.hasthe.technology tcp

Files

memory/2224-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2224-2-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2224-6-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-D6CXJmJszGNxzLav.exe

MD5 fe1ee42ed2720f337cd6429071e19701
SHA1 3a8318d335c6ef363d4deb04815a859c0263fe61
SHA256 bd159079649a96688288d24663b7084f3138c2eb3808c19f137fa8d8c77be8eb
SHA512 af49854393feda326a1db6ed1343edf9265880a9ec055f406ac097a5549a8ad8f1da2164d9574f2f07afdef099e015214512f7855b8d192ccac3355b2650407c

memory/2224-13-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2224-23-0x0000000000400000-0x000000000042A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-09 15:28

Reported

2024-11-09 15:30

Platform

win10v2004-20241007-en

Max time kernel

110s

Max time network

94s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4853f03224f1a361a613686f687c64fb96321818d4e64a3c81cdcb406a43cd8dN.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\4853f03224f1a361a613686f687c64fb96321818d4e64a3c81cdcb406a43cd8dN.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\4853f03224f1a361a613686f687c64fb96321818d4e64a3c81cdcb406a43cd8dN.exe

"C:\Users\Admin\AppData\Local\Temp\4853f03224f1a361a613686f687c64fb96321818d4e64a3c81cdcb406a43cd8dN.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 74.208.201.84.in-addr.arpa udp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 199.59.21.104.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp

Files

memory/652-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/652-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/652-4-0x0000000000400000-0x000000000042A000-memory.dmp

memory/652-8-0x0000000000400000-0x000000000042A000-memory.dmp

memory/652-11-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-OaWC39xvLoNNjaRO.exe

MD5 b685ee5093d8daefad5db9df5f5e7867
SHA1 32f8ae145e41c36caad678f7e34d5c00ab766227
SHA256 389c347a3eedabb66f70871882329e6d693680c1b748906fbe468a08174d9ac0
SHA512 ca4d9fa094f76fa6462799134cf10ca56c16f5f6d1e9ed3635779969cddb448bbc7c9e0ad735a9670f5569c4813825788f3d50e52b60ec4e4237df9e7f3082ff

memory/652-15-0x0000000000400000-0x000000000042A000-memory.dmp

memory/652-19-0x0000000000400000-0x000000000042A000-memory.dmp