Analysis

  • max time kernel
    61s
  • max time network
    61s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    13-07-2020 11:09

General

  • Target

    goon 2.bin.exe

  • Size

    297KB

  • MD5

    29cee2290c1cbd12d5ad969f8a35ddea

  • SHA1

    d17e526c5e231e5c9131709fe8268ab67301e486

  • SHA256

    e3c833ce78bd7077017d190abce8c27f00cfb8a2f30fe71adc1ab1f59d7426a7

  • SHA512

    3474bfb20b7978acfecd919df5819cf4572f80e3150125f4b641da53e3e5b2088d37a8c05de46ea9cb90e8bbf6f9abbd5bc1caeea182fc3d27996150ffd9cb8f

Score
7/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\goon 2.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\goon 2.bin.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of AdjustPrivilegeToken
    PID:1196

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads