Malware Analysis Report

2024-11-13 16:37

Sample ID 220912-sfgknadec9
Target Ttc local 113 collective agreement (65859).zip
SHA256 d9f08416406532897749a563535fed69ec43e9acc73f1fafaa7e3f84df47e776
Tags
gootloader loader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d9f08416406532897749a563535fed69ec43e9acc73f1fafaa7e3f84df47e776

Threat Level: Known bad

The file Ttc local 113 collective agreement (65859).zip was found to be: Known bad.

Malicious Activity Summary

gootloader loader

GootLoader

Blocklisted process makes network request

Script User-Agent

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-09-12 15:03

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-09-12 15:03

Reported

2022-09-12 15:06

Platform

win7-20220812-en

Max time kernel

126s

Max time network

132s

Command Line

wscript.exe "C:\Users\Admin\AppData\Local\Temp\Ttc_local_113_collective_agreement (gjz).js"

Signatures

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\system32\wscript.exe N/A
N/A N/A C:\Windows\system32\wscript.exe N/A

Processes

C:\Windows\system32\wscript.exe

wscript.exe "C:\Users\Admin\AppData\Local\Temp\Ttc_local_113_collective_agreement (gjz).js"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.lovlr.com udp
DK 77.111.240.6:443 www.lovlr.com tcp
DK 77.111.240.6:443 www.lovlr.com tcp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2022-09-12 15:03

Reported

2022-09-12 15:09

Platform

win10v2004-20220812-en

Max time kernel

168s

Max time network

179s

Command Line

wscript.exe "C:\Users\Admin\AppData\Local\Temp\Ttc_local_113_collective_agreement (gjz).js"

Signatures

GootLoader

loader gootloader

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\system32\wscript.exe N/A
N/A N/A C:\Windows\system32\wscript.exe N/A

Script User-Agent

Description Indicator Process Target
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A

Processes

C:\Windows\system32\wscript.exe

wscript.exe "C:\Users\Admin\AppData\Local\Temp\Ttc_local_113_collective_agreement (gjz).js"

Network

Country Destination Domain Proto
US 93.184.221.240:80 tcp
US 93.184.221.240:80 tcp
US 93.184.220.29:80 tcp
US 20.42.65.84:443 tcp
US 8.253.208.113:80 tcp
US 8.253.208.113:80 tcp
US 8.8.8.8:53 www.lovlr.com udp
DK 77.111.240.6:443 www.lovlr.com tcp
US 8.8.8.8:53 www.lukeamiller.net udp
US 69.163.163.127:443 www.lukeamiller.net tcp

Files

N/A