Analysis
-
max time kernel
135s -
max time network
50s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
09/07/2020, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
Mimikatz.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Mimikatz.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
Mimikatz.exe
-
Size
374KB
-
MD5
7a9f3d5d28718c039c591c3077b2be07
-
SHA1
bd07de2bcb53f2ad0fa3918827da9f2779f6500d
-
SHA256
a6964b245e70a97f8633616ede2122a72b6e159a70874beb1d8b3aba26b510dc
-
SHA512
107dbfba2150f35cb7eef5b030cb449ce1ea2ef073392cc7d02b671aacd4d066c1fd6c04d48740e024d523393f60755e893c722e43ff83249ef4991ae3370134
Score
8/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 664 wrote to memory of 1420 664 Mimikatz.exe 68 PID 664 wrote to memory of 1420 664 Mimikatz.exe 68 PID 664 wrote to memory of 1420 664 Mimikatz.exe 68 PID 664 wrote to memory of 1776 664 Mimikatz.exe 69 PID 664 wrote to memory of 1776 664 Mimikatz.exe 69 PID 664 wrote to memory of 1776 664 Mimikatz.exe 69 -
Executes dropped EXE 2 IoCs
pid Process 1420 jfiag_gg.exe 1776 jfiag_gg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1776 jfiag_gg.exe 1776 jfiag_gg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kissq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kissq.exe" Mimikatz.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\Mimikatz.exe"1⤵
- Suspicious use of WriteProcessMemory
- Adds Run entry to start application
PID:664 -
C:\Users\Admin\AppData\Local\Temp\jfiag_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fjgha23_fa.txt2⤵
- Executes dropped EXE
PID:1420
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fjgha23_fa.txt2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1776
-