Analysis Overview
SHA256
ad23b50e23490b6b75e65e5ffb8bf27ee384d9ebb4ee9230ed4a1a2be70d96c0
Threat Level: Likely benign
The file ad23b50e23490b6b75e65e5ffb8bf27ee384d9ebb4ee9230ed4a1a2be70d96c0 was found to be: Likely benign.
Malicious Activity Summary
Unsigned PE
System Location Discovery: System Language Discovery
Suspicious behavior: RenamesItself
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-10 01:37
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-10 01:37
Reported
2024-11-10 01:40
Platform
win7-20240708-en
Max time kernel
149s
Max time network
123s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\ad23b50e23490b6b75e65e5ffb8bf27ee384d9ebb4ee9230ed4a1a2be70d96c0.exe | N/A |
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ad23b50e23490b6b75e65e5ffb8bf27ee384d9ebb4ee9230ed4a1a2be70d96c0.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\ad23b50e23490b6b75e65e5ffb8bf27ee384d9ebb4ee9230ed4a1a2be70d96c0.exe
"C:\Users\Admin\AppData\Local\Temp\ad23b50e23490b6b75e65e5ffb8bf27ee384d9ebb4ee9230ed4a1a2be70d96c0.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | hi.baidu.com | udp |
| US | 104.193.88.126:80 | hi.baidu.com | tcp |
| US | 8.8.8.8:53 | infoflow.baidu.com | udp |
| US | 104.193.88.126:443 | infoflow.baidu.com | tcp |
| US | 8.8.8.8:53 | crl.microsoft.com | udp |
| GB | 2.19.117.18:80 | crl.microsoft.com | tcp |
| US | 8.8.8.8:53 | www.microsoft.com | udp |
| GB | 92.123.241.137:80 | www.microsoft.com | tcp |
Files
memory/1700-0-0x0000000000400000-0x0000000000520000-memory.dmp
memory/1700-4-0x0000000000401000-0x0000000000402000-memory.dmp
memory/1700-3-0x00000000002B0000-0x00000000002B2000-memory.dmp
memory/1700-7-0x0000000000400000-0x0000000000520000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-10 01:37
Reported
2024-11-10 01:40
Platform
win10v2004-20241007-en
Max time kernel
149s
Max time network
149s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\ad23b50e23490b6b75e65e5ffb8bf27ee384d9ebb4ee9230ed4a1a2be70d96c0.exe | N/A |
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ad23b50e23490b6b75e65e5ffb8bf27ee384d9ebb4ee9230ed4a1a2be70d96c0.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\ad23b50e23490b6b75e65e5ffb8bf27ee384d9ebb4ee9230ed4a1a2be70d96c0.exe
"C:\Users\Admin\AppData\Local\Temp\ad23b50e23490b6b75e65e5ffb8bf27ee384d9ebb4ee9230ed4a1a2be70d96c0.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | hi.baidu.com | udp |
| US | 104.193.88.126:80 | hi.baidu.com | tcp |
| US | 8.8.8.8:53 | infoflow.baidu.com | udp |
| US | 8.8.8.8:53 | 68.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 126.88.193.104.in-addr.arpa | udp |
| US | 104.193.88.126:443 | infoflow.baidu.com | tcp |
| US | 8.8.8.8:53 | 226.21.18.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 226.20.18.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
Files
memory/3404-0-0x0000000000400000-0x0000000000520000-memory.dmp
memory/3404-1-0x0000000000640000-0x0000000000642000-memory.dmp
memory/3404-4-0x0000000000401000-0x0000000000402000-memory.dmp
memory/3404-5-0x00000000023B0000-0x00000000023B2000-memory.dmp
memory/3404-7-0x0000000000400000-0x0000000000520000-memory.dmp