Malware Analysis Report

2025-04-03 19:51

Sample ID 241109-xlk79azenf
Target 3f9cd37c5b1f243d57694b9a696b18ddf5bfbaca5b8f07402087cbdeebcdf10eN
SHA256 3f9cd37c5b1f243d57694b9a696b18ddf5bfbaca5b8f07402087cbdeebcdf10e
Tags
upx discovery
score
5/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
5/10

SHA256

3f9cd37c5b1f243d57694b9a696b18ddf5bfbaca5b8f07402087cbdeebcdf10e

Threat Level: Likely benign

The file 3f9cd37c5b1f243d57694b9a696b18ddf5bfbaca5b8f07402087cbdeebcdf10eN was found to be: Likely benign.

Malicious Activity Summary

upx discovery

UPX packed file

Unsigned PE

System Location Discovery: System Language Discovery

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-09 18:56

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-09 18:56

Reported

2024-11-09 18:58

Platform

win7-20241023-en

Max time kernel

110s

Max time network

92s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3f9cd37c5b1f243d57694b9a696b18ddf5bfbaca5b8f07402087cbdeebcdf10eN.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\3f9cd37c5b1f243d57694b9a696b18ddf5bfbaca5b8f07402087cbdeebcdf10eN.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\3f9cd37c5b1f243d57694b9a696b18ddf5bfbaca5b8f07402087cbdeebcdf10eN.exe

"C:\Users\Admin\AppData\Local\Temp\3f9cd37c5b1f243d57694b9a696b18ddf5bfbaca5b8f07402087cbdeebcdf10eN.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp

Files

memory/2580-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2580-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2580-5-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-TILrTvCvxZhBknFl.exe

MD5 edef7442b5fae040cc7c8a1af8daadbc
SHA1 c412d2a075a549f907597ea3860b5970b24d8e3b
SHA256 36a287657a6fddf6367cf2d1d777b4e50a4765d1c620ae8629a9f4c3f5e84075
SHA512 1e69c6563d79f36479478bbde988d76cd61f7a71eda2753462db193e32e81ef811b962424d31724579ed61f2da9b73d9f72baff2c1ca0f2e00bc5636b5acd671

memory/2580-12-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2580-22-0x0000000000400000-0x000000000042A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-09 18:56

Reported

2024-11-09 18:58

Platform

win10v2004-20241007-en

Max time kernel

111s

Max time network

94s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3f9cd37c5b1f243d57694b9a696b18ddf5bfbaca5b8f07402087cbdeebcdf10eN.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\3f9cd37c5b1f243d57694b9a696b18ddf5bfbaca5b8f07402087cbdeebcdf10eN.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\3f9cd37c5b1f243d57694b9a696b18ddf5bfbaca5b8f07402087cbdeebcdf10eN.exe

"C:\Users\Admin\AppData\Local\Temp\3f9cd37c5b1f243d57694b9a696b18ddf5bfbaca5b8f07402087cbdeebcdf10eN.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 199.59.21.104.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp

Files

memory/4928-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/4928-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/4928-5-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-0Wx3TBml0ItPYlAX.exe

MD5 6e6491220a0aadfcbe802f820e9f2cab
SHA1 d6ce4ce2d58a88f726528143bcede7c3c48d6f6a
SHA256 b3b458f10b9efa54cdffd4e0608be429ccdd5d491f6d9fa2012a528f2def4c84
SHA512 affb715a42c01247c007d875bc2f93ffbf6e029166a9ab1c21c010334e1b5ccaf261084adae2ee732baf87c26705892d203fad555426a35777ccc6dc2db8eb37

memory/4928-13-0x0000000000400000-0x000000000042A000-memory.dmp

memory/4928-21-0x0000000000400000-0x000000000042A000-memory.dmp