Analysis

  • max time kernel
    298s
  • max time network
    300s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13-09-2022 12:54

General

  • Target

    How_to_fill_t1-ovp_form (owvv).js

  • Size

    483KB

  • MD5

    6962b25999460084e0556b0482067eff

  • SHA1

    354bc001089e5a4e9c4352b95bbf26d25858d2e6

  • SHA256

    02e477b52df4ea910526f3bad988aeaabcb2ac4d5e98b4cbc47a4c36b32acf4f

  • SHA512

    3d2fd051ee5d68a4eec4486c71914dd05010c75f9fb810258a6f78e3dab59996baed690d85a76f220b432e5ad3e88a1fb6347e0fc3e414da19c859c91a737113

  • SSDEEP

    6144:xQW+tTulaxl4khEfD3xA7cGiagmd7iLAmWH6WSF:ChhEfD3xVGiagmd7iLAmWH6T

Score
10/10

Malware Config

Signatures

  • GootLoader

    JavaScript loader known for delivering other families such as Gootkit and Cobaltstrike.

  • Blocklisted process makes network request 2 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\How_to_fill_t1-ovp_form (owvv).js"
    1⤵
    • Blocklisted process makes network request
    PID:2196

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads