Malware Analysis Report

2024-11-15 08:48

Sample ID 220910-pgz7lsdgfl
Target 10-Sept-7992196120.zip
SHA256 f26487354bcd04a3e5aa7233af094f567bd8ac72cf6e5734ea5432739a8e5a9d
Tags
gootloader loader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f26487354bcd04a3e5aa7233af094f567bd8ac72cf6e5734ea5432739a8e5a9d

Threat Level: Known bad

The file 10-Sept-7992196120.zip was found to be: Known bad.

Malicious Activity Summary

gootloader loader

GootLoader

Blocklisted process makes network request

Script User-Agent

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-09-10 12:18

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-09-10 12:18

Reported

2022-09-10 12:24

Platform

win10-20220812-en

Max time kernel

165s

Max time network

167s

Command Line

wscript.exe "C:\Users\Admin\AppData\Local\Temp\Agreement_of_guiding_principles_(property_insurance) (envph).js"

Signatures

GootLoader

loader gootloader

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\system32\wscript.exe N/A
N/A N/A C:\Windows\system32\wscript.exe N/A
N/A N/A C:\Windows\system32\wscript.exe N/A

Script User-Agent

Description Indicator Process Target
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A

Processes

C:\Windows\system32\wscript.exe

wscript.exe "C:\Users\Admin\AppData\Local\Temp\Agreement_of_guiding_principles_(property_insurance) (envph).js"

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.macromixenlinea.com udp
N/A 100.83.235.147:443 www.macromixenlinea.com tcp
US 8.8.8.8:53 www.lovlr.com udp
N/A 100.124.215.74:443 www.lovlr.com tcp
US 8.8.8.8:53 www.lukeamiller.net udp
N/A 100.109.167.130:443 www.lukeamiller.net tcp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2022-09-10 12:18

Reported

2022-09-10 12:24

Platform

win10-20220812-en

Max time kernel

50s

Max time network

146s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\940b0242c2488d3200d5eb6527de67bc73af8280734b544f60877a9ebd88f936.js

Signatures

N/A

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\940b0242c2488d3200d5eb6527de67bc73af8280734b544f60877a9ebd88f936.js

Network

Country Destination Domain Proto
US 52.168.117.170:443 tcp
NL 87.248.202.1:80 tcp

Files

N/A