Malware Analysis Report

2024-11-13 16:37

Sample ID 220914-sln7paafe3
Target united_flight_attendant_union_agreement (dkx).js
SHA256 64363a18c8e226200c00233cad8ba9b3089ed9663931026c0d3163350cebfefa
Tags
gootloader loader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

64363a18c8e226200c00233cad8ba9b3089ed9663931026c0d3163350cebfefa

Threat Level: Known bad

The file united_flight_attendant_union_agreement (dkx).js was found to be: Known bad.

Malicious Activity Summary

gootloader loader

GootLoader

Blocklisted process makes network request

Script User-Agent

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-09-14 15:12

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-09-14 15:12

Reported

2022-09-14 15:16

Platform

win7-20220901-en

Max time kernel

77s

Max time network

81s

Command Line

wscript.exe "C:\Users\Admin\AppData\Local\Temp\united_flight_attendant_union_agreement (dkx).js"

Signatures

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\system32\wscript.exe N/A
N/A N/A C:\Windows\system32\wscript.exe N/A

Processes

C:\Windows\system32\wscript.exe

wscript.exe "C:\Users\Admin\AppData\Local\Temp\united_flight_attendant_union_agreement (dkx).js"

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.losgaucos.cz udp
DE 62.171.133.93:443 www.losgaucos.cz tcp
DE 62.171.133.93:443 www.losgaucos.cz tcp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2022-09-14 15:12

Reported

2022-09-14 15:16

Platform

win10v2004-20220812-en

Max time kernel

148s

Max time network

181s

Command Line

wscript.exe "C:\Users\Admin\AppData\Local\Temp\united_flight_attendant_union_agreement (dkx).js"

Signatures

GootLoader

loader gootloader

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\system32\wscript.exe N/A
N/A N/A C:\Windows\system32\wscript.exe N/A
N/A N/A C:\Windows\system32\wscript.exe N/A

Script User-Agent

Description Indicator Process Target
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A

Processes

C:\Windows\system32\wscript.exe

wscript.exe "C:\Users\Admin\AppData\Local\Temp\united_flight_attendant_union_agreement (dkx).js"

Network

Country Destination Domain Proto
US 93.184.221.240:80 tcp
US 93.184.221.240:80 tcp
NL 13.69.109.130:443 tcp
US 8.8.8.8:53 www.losgaucos.cz udp
DE 62.171.133.93:443 www.losgaucos.cz tcp
US 8.8.8.8:53 www.lohevisto.com udp
FR 188.165.135.193:443 www.lohevisto.com tcp
US 8.8.8.8:53 www.liparicasa.it udp
US 173.236.166.127:443 www.liparicasa.it tcp

Files

N/A