Malware Analysis Report

2025-04-03 19:54

Sample ID 241109-x2ds4szhna
Target ed7ac491eee91facccac8cc79186f86ac9bd1e370b99b2c3728afd68db046e14N
SHA256 ed7ac491eee91facccac8cc79186f86ac9bd1e370b99b2c3728afd68db046e14
Tags
upx discovery
score
5/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
5/10

SHA256

ed7ac491eee91facccac8cc79186f86ac9bd1e370b99b2c3728afd68db046e14

Threat Level: Likely benign

The file ed7ac491eee91facccac8cc79186f86ac9bd1e370b99b2c3728afd68db046e14N was found to be: Likely benign.

Malicious Activity Summary

upx discovery

UPX packed file

Unsigned PE

System Location Discovery: System Language Discovery

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-09 19:20

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-09 19:20

Reported

2024-11-09 19:22

Platform

win7-20240903-en

Max time kernel

120s

Max time network

127s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ed7ac491eee91facccac8cc79186f86ac9bd1e370b99b2c3728afd68db046e14N.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\ed7ac491eee91facccac8cc79186f86ac9bd1e370b99b2c3728afd68db046e14N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\ed7ac491eee91facccac8cc79186f86ac9bd1e370b99b2c3728afd68db046e14N.exe

"C:\Users\Admin\AppData\Local\Temp\ed7ac491eee91facccac8cc79186f86ac9bd1e370b99b2c3728afd68db046e14N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp

Files

memory/1832-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1832-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1832-7-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-FpFDBlH0KqLc9VBi.exe

MD5 84df3fca8b920bd62f58e6043c694a9e
SHA1 59fbec15e63892a7e10d18eb40af555c4467b7d1
SHA256 7f0dee356d7702a470dbc9b9b7145e8278048c548b43c24f79b8f76862f678f8
SHA512 9c182d2a44974ec3e0d987a802bc7bfcb1ccb8d600e027f3263fb1bef498b178235d61e9236020de35a95c0e2787b983c330a7a26329d0b5d6cfbd83766aa4b7

memory/1832-14-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1832-22-0x0000000000400000-0x000000000042A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-09 19:20

Reported

2024-11-09 19:22

Platform

win10v2004-20241007-en

Max time kernel

120s

Max time network

101s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ed7ac491eee91facccac8cc79186f86ac9bd1e370b99b2c3728afd68db046e14N.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\ed7ac491eee91facccac8cc79186f86ac9bd1e370b99b2c3728afd68db046e14N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\ed7ac491eee91facccac8cc79186f86ac9bd1e370b99b2c3728afd68db046e14N.exe

"C:\Users\Admin\AppData\Local\Temp\ed7ac491eee91facccac8cc79186f86ac9bd1e370b99b2c3728afd68db046e14N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 199.59.21.104.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 75.117.19.2.in-addr.arpa udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 101.210.23.2.in-addr.arpa udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp

Files

memory/1300-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1300-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1300-4-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-7AtMqX1GUBQ3ZPUz.exe

MD5 024dfd8e44c892f5d1829d2f4f386a03
SHA1 ae22b945af3704588a43924d0935cee5060f186e
SHA256 f9b79fdeaad374cb065ec25824231c1119ea709cc865871026c2a35a3139c33e
SHA512 dd6171e6dc7418f186a99d577276a4aa30afd50454eb44ffb25f38a024e080215f732415041edb4847a376eb2781f71d067eff838a6bd351088b90864ac4139b

memory/1300-13-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1300-21-0x0000000000400000-0x000000000042A000-memory.dmp