Analysis
-
max time kernel
61s -
max time network
61s -
platform
windows7_x64 -
resource
win7 -
submitted
13-07-2020 11:09
Static task
static1
Behavioral task
behavioral1
Sample
goon 2.bin.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
goon 2.bin.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
goon 2.bin.exe
-
Size
297KB
-
MD5
29cee2290c1cbd12d5ad969f8a35ddea
-
SHA1
d17e526c5e231e5c9131709fe8268ab67301e486
-
SHA256
e3c833ce78bd7077017d190abce8c27f00cfb8a2f30fe71adc1ab1f59d7426a7
-
SHA512
3474bfb20b7978acfecd919df5819cf4572f80e3150125f4b641da53e3e5b2088d37a8c05de46ea9cb90e8bbf6f9abbd5bc1caeea182fc3d27996150ffd9cb8f
Score
7/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1196 goon 2.bin.exe 1196 goon 2.bin.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1196 goon 2.bin.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1196 goon 2.bin.exe