Analysis Overview
score
10/10
SHA256
a5760c44000a01657ff773182f5403ec576b075859e4447048435f273cc1ead1
Threat Level: Known bad
The file Offer_to_purchase_and_contract_form_2g (laj).js was found to be: Known bad.
Malicious Activity Summary
GootLoader
Blocklisted process makes network request
Script User-Agent
MITRE ATT&CK
N/A
Analysis: static1
Detonation Overview
Reported
2022-09-11 13:08
Signatures
N/A
Analysis: behavioral1
Detonation Overview
Submitted
2022-09-11 13:08
Reported
2022-09-11 13:14
Platform
win10-20220812-en
Max time kernel
150s
Max time network
152s
Command Line
wscript.exe "C:\Users\Admin\AppData\Local\Temp\Offer_to_purchase_and_contract_form_2g (laj).js"
Signatures
GootLoader
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\wscript.exe | N/A |
| N/A | N/A | C:\Windows\system32\wscript.exe | N/A |
| N/A | N/A | C:\Windows\system32\wscript.exe | N/A |
Script User-Agent
| Description | Indicator | Process | Target |
| HTTP User-Agent header | Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) | N/A | N/A |
| HTTP User-Agent header | Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) | N/A | N/A |
| HTTP User-Agent header | Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) | N/A | N/A |
Processes
C:\Windows\system32\wscript.exe
wscript.exe "C:\Users\Admin\AppData\Local\Temp\Offer_to_purchase_and_contract_form_2g (laj).js"
Network
| Country | Destination | Domain | Proto |
| IE | 13.69.239.74:443 | tcp | |
| US | 8.8.8.8:53 | www.macromixenlinea.com | udp |
| N/A | 100.102.153.146:443 | www.macromixenlinea.com | tcp |
| US | 8.8.8.8:53 | www.lovlr.com | udp |
| N/A | 100.84.181.108:443 | www.lovlr.com | tcp |
| US | 8.8.8.8:53 | www.lukeamiller.net | udp |
| N/A | 100.78.53.237:443 | www.lukeamiller.net | tcp |
Files
N/A