Malware Analysis Report

2024-11-13 18:00

Sample ID 241110-by65lawhnh
Target c8124149e888e94ef07eb6a877ee4ab7d4ab2efc6bc50e3fd9e51512217f1976N
SHA256 c8124149e888e94ef07eb6a877ee4ab7d4ab2efc6bc50e3fd9e51512217f1976
Tags
discovery upx
score
5/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
5/10

SHA256

c8124149e888e94ef07eb6a877ee4ab7d4ab2efc6bc50e3fd9e51512217f1976

Threat Level: Likely benign

The file c8124149e888e94ef07eb6a877ee4ab7d4ab2efc6bc50e3fd9e51512217f1976N was found to be: Likely benign.

Malicious Activity Summary

discovery upx

UPX packed file

Unsigned PE

System Location Discovery: System Language Discovery

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-10 01:34

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-10 01:34

Reported

2024-11-10 01:36

Platform

win7-20241023-en

Max time kernel

110s

Max time network

92s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c8124149e888e94ef07eb6a877ee4ab7d4ab2efc6bc50e3fd9e51512217f1976N.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\c8124149e888e94ef07eb6a877ee4ab7d4ab2efc6bc50e3fd9e51512217f1976N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\c8124149e888e94ef07eb6a877ee4ab7d4ab2efc6bc50e3fd9e51512217f1976N.exe

"C:\Users\Admin\AppData\Local\Temp\c8124149e888e94ef07eb6a877ee4ab7d4ab2efc6bc50e3fd9e51512217f1976N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 wecan.hasthe.technology udp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp
US 104.21.59.199:80 wecan.hasthe.technology tcp

Files

memory/2824-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2824-2-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2824-6-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-Nt9QAwopMmyVJNuy.exe

MD5 163b2a2e8a583fa1e0bec1d7874b1e69
SHA1 6da2d988cba027d0cacff966f95a148cd9718826
SHA256 592311a759203fc0eb919c66150d5f15e188aeee6971821e037504bd76d83c05
SHA512 29db68c5b4140050a4b98a3cdea9958abb8c1082588f4f8128e0288c3919c50c412761b0eed9d17e473afde96a4a3edf9029fac650ee235d010d727d32cfd2de

memory/2824-13-0x0000000000400000-0x000000000042A000-memory.dmp

memory/2824-23-0x0000000000400000-0x000000000042A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-10 01:34

Reported

2024-11-10 01:36

Platform

win10v2004-20241007-en

Max time kernel

111s

Max time network

94s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c8124149e888e94ef07eb6a877ee4ab7d4ab2efc6bc50e3fd9e51512217f1976N.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\c8124149e888e94ef07eb6a877ee4ab7d4ab2efc6bc50e3fd9e51512217f1976N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\c8124149e888e94ef07eb6a877ee4ab7d4ab2efc6bc50e3fd9e51512217f1976N.exe

"C:\Users\Admin\AppData\Local\Temp\c8124149e888e94ef07eb6a877ee4ab7d4ab2efc6bc50e3fd9e51512217f1976N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 172.67.183.40:80 wecan.hasthe.technology tcp

Files

memory/3068-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3068-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3068-4-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3068-8-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-3G9o5EZhX9ifLlwZ.exe

MD5 93393ac0bd6f11fd64bd882fdf076ac0
SHA1 4ca4957d856bc8cc586bad1d8bcc4665e1b983bd
SHA256 677a55d496f0a98b4c178f6294807112afc32267df172843dc8f28da3589fa99
SHA512 60ba0b9dddd39b6b8b01fea88566dee6c9d9579fd2ebc4b25be1d7838ea1e5fb070033f650a4399b3cf44c70cfca62abec71abf2a7bc0bfb036689bc7d079067

memory/3068-13-0x0000000000400000-0x000000000042A000-memory.dmp

memory/3068-21-0x0000000000400000-0x000000000042A000-memory.dmp