Malware Analysis Report

2024-11-13 16:37

Sample ID 220912-xw6lyahfhr
Target 12-september-2-7976836135.zip
SHA256 8cdf70e57177f9623574059ef1f524a07a91f45bb876549e6e7823ec59f6acaa
Tags
gootloader loader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

8cdf70e57177f9623574059ef1f524a07a91f45bb876549e6e7823ec59f6acaa

Threat Level: Known bad

The file 12-september-2-7976836135.zip was found to be: Known bad.

Malicious Activity Summary

gootloader loader

GootLoader

Blocklisted process makes network request

Script User-Agent

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-09-12 19:13

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2022-09-12 19:13

Reported

2022-09-12 19:18

Platform

win10-20220812-en

Max time kernel

143s

Max time network

146s

Command Line

wscript.exe "C:\Users\Admin\AppData\Local\Temp\Iowa_uniform_premarital_agreement_act (ashi).js"

Signatures

GootLoader

loader gootloader

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\system32\wscript.exe N/A
N/A N/A C:\Windows\system32\wscript.exe N/A
N/A N/A C:\Windows\system32\wscript.exe N/A

Script User-Agent

Description Indicator Process Target
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A

Processes

C:\Windows\system32\wscript.exe

wscript.exe "C:\Users\Admin\AppData\Local\Temp\Iowa_uniform_premarital_agreement_act (ashi).js"

Network

Country Destination Domain Proto
US 104.208.16.88:443 tcp
US 8.8.8.8:53 www.macromixenlinea.com udp
N/A 100.79.154.198:443 www.macromixenlinea.com tcp
US 8.8.8.8:53 www.lovlr.com udp
N/A 100.113.79.59:443 www.lovlr.com tcp
US 8.8.8.8:53 www.lukeamiller.net udp
N/A 100.91.131.1:443 www.lukeamiller.net tcp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2022-09-12 19:13

Reported

2022-09-12 19:18

Platform

win10-20220812-en

Max time kernel

53s

Max time network

74s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\940b0242c2488d3200d5eb6527de67bc73af8280734b544f60877a9ebd88f936.js

Signatures

N/A

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\940b0242c2488d3200d5eb6527de67bc73af8280734b544f60877a9ebd88f936.js

Network

Country Destination Domain Proto
US 20.189.173.13:443 tcp
US 209.197.3.8:80 tcp

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2022-09-12 19:13

Reported

2022-09-12 19:18

Platform

win10-20220901-en

Max time kernel

225s

Max time network

229s

Command Line

wscript.exe "C:\Users\Admin\AppData\Local\Temp\Ttc_local_113_collective_agreement (gjz).js"

Signatures

GootLoader

loader gootloader

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\system32\wscript.exe N/A
N/A N/A C:\Windows\system32\wscript.exe N/A
N/A N/A C:\Windows\system32\wscript.exe N/A

Script User-Agent

Description Indicator Process Target
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A

Processes

C:\Windows\system32\wscript.exe

wscript.exe "C:\Users\Admin\AppData\Local\Temp\Ttc_local_113_collective_agreement (gjz).js"

Network

Country Destination Domain Proto
US 52.168.112.66:443 tcp
US 8.8.8.8:53 www.lovlr.com udp
N/A 100.95.204.169:443 www.lovlr.com tcp
US 8.8.8.8:53 www.lukeamiller.net udp
N/A 100.68.58.105:443 www.lukeamiller.net tcp
US 8.8.8.8:53 www.luckies.cc udp
N/A 100.70.71.233:443 www.luckies.cc tcp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-09-12 19:13

Reported

2022-09-12 19:18

Platform

win10-20220812-en

Max time kernel

156s

Max time network

158s

Command Line

wscript.exe "C:\Users\Admin\AppData\Local\Temp\Agreement_of_guiding_principles_(property_insurance) (envph).js"

Signatures

GootLoader

loader gootloader

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\system32\wscript.exe N/A
N/A N/A C:\Windows\system32\wscript.exe N/A
N/A N/A C:\Windows\system32\wscript.exe N/A

Script User-Agent

Description Indicator Process Target
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A

Processes

C:\Windows\system32\wscript.exe

wscript.exe "C:\Users\Admin\AppData\Local\Temp\Agreement_of_guiding_principles_(property_insurance) (envph).js"

Network

Country Destination Domain Proto
FR 51.11.192.50:443 tcp
NL 8.238.23.254:80 tcp
US 93.184.220.29:80 tcp
US 8.8.8.8:53 www.macromixenlinea.com udp
N/A 100.73.89.199:443 www.macromixenlinea.com tcp
US 8.8.8.8:53 www.lovlr.com udp
N/A 100.81.173.70:443 www.lovlr.com tcp
US 8.8.8.8:53 www.lukeamiller.net udp
N/A 100.88.179.252:443 www.lukeamiller.net tcp

Files

N/A