Malware Analysis Report

2025-04-03 19:54

Sample ID 241109-x2afpazhrl
Target dbe986733e73a5997fb9c0ba7b64f0111bec26a385c074fa8dc992d1417f3c03N
SHA256 dbe986733e73a5997fb9c0ba7b64f0111bec26a385c074fa8dc992d1417f3c03
Tags
upx discovery
score
5/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
5/10

SHA256

dbe986733e73a5997fb9c0ba7b64f0111bec26a385c074fa8dc992d1417f3c03

Threat Level: Likely benign

The file dbe986733e73a5997fb9c0ba7b64f0111bec26a385c074fa8dc992d1417f3c03N was found to be: Likely benign.

Malicious Activity Summary

upx discovery

UPX packed file

Unsigned PE

System Location Discovery: System Language Discovery

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-09 19:20

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-09 19:20

Reported

2024-11-09 19:22

Platform

win7-20241023-en

Max time kernel

110s

Max time network

94s

Command Line

"C:\Users\Admin\AppData\Local\Temp\dbe986733e73a5997fb9c0ba7b64f0111bec26a385c074fa8dc992d1417f3c03N.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\dbe986733e73a5997fb9c0ba7b64f0111bec26a385c074fa8dc992d1417f3c03N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\dbe986733e73a5997fb9c0ba7b64f0111bec26a385c074fa8dc992d1417f3c03N.exe

"C:\Users\Admin\AppData\Local\Temp\dbe986733e73a5997fb9c0ba7b64f0111bec26a385c074fa8dc992d1417f3c03N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp

Files

memory/1720-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1720-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1720-5-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-CjZb8Dpc6G0quBDd.exe

MD5 bc1a9e8b2b054f681e29a3701d4fdba7
SHA1 c10c9139fa7169feab0c9abce0ce904386cd1ae5
SHA256 3b4a1835a80a92250537caf7f98bc830fdb6a00abfad1c0dcfee2324addd96a5
SHA512 dbf0e0577117421a467a282e29d4c1aacaeada258240119f9a6b860cdc8c83e1c905cb5cd8d82cad010321464d1a5daf84d9a2c1a9c45508b3912478a1bd270a

memory/1720-15-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1720-22-0x0000000000400000-0x000000000042A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-09 19:20

Reported

2024-11-09 19:22

Platform

win10v2004-20241007-en

Max time kernel

120s

Max time network

93s

Command Line

"C:\Users\Admin\AppData\Local\Temp\dbe986733e73a5997fb9c0ba7b64f0111bec26a385c074fa8dc992d1417f3c03N.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\dbe986733e73a5997fb9c0ba7b64f0111bec26a385c074fa8dc992d1417f3c03N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\dbe986733e73a5997fb9c0ba7b64f0111bec26a385c074fa8dc992d1417f3c03N.exe

"C:\Users\Admin\AppData\Local\Temp\dbe986733e73a5997fb9c0ba7b64f0111bec26a385c074fa8dc992d1417f3c03N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 40.183.67.172.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 172.67.183.40:80 wecan.hasthe.technology tcp

Files

memory/4088-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/4088-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/4088-4-0x0000000000400000-0x000000000042A000-memory.dmp

memory/4088-8-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-L527QMXMcBcKhcwH.exe

MD5 7f32bab47a2c2815a7d9ac2c5158d382
SHA1 c42ab4093996301ac03e783e82dcb19e10ec7bc0
SHA256 bf7a0f5bc4c334f20148156e2267a2ceea572a07737fc855128bd60cb0ede338
SHA512 3014fe1a9ac89031991d2414499cb565ef3989f25f06ad7ec63c0d564b9192b02a91246a269dc27e2b8a426c98a08c40252f02aa665a1d72bcb79368e923885e

memory/4088-15-0x0000000000400000-0x000000000042A000-memory.dmp

memory/4088-22-0x0000000000400000-0x000000000042A000-memory.dmp