Analysis
-
max time kernel
80s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe
Resource
win10v2004-20240508-en
General
-
Target
05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe
-
Size
1009KB
-
MD5
a38109846c85c59384c9b71ef67f655d
-
SHA1
211f659b70bf4abd6be8b742e156cc6d5c1d9e43
-
SHA256
05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb
-
SHA512
adc11e5871df6db8f5921ef803865a4611bc274bfef308a524cc7d00e9f4e81d2047ff984a90a6dc752c506246fc9ae141409c685e79d83185c577126729a19a
-
SSDEEP
24576:Ld9Mrf7iaNVxowiTsJvJkI65s0o5bJQAoDy:ByTeFwWsJxkI660o5roW
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023409-23.dat mimikatz -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe -
Executes dropped EXE 1 IoCs
pid Process 2832 mimikatz.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File created C:\Windows\Help\Help\mimicom.idl 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe File opened for modification C:\Windows\Help\Help\kiwi_passwords.yar 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe File created C:\Windows\Help\Help\Win32\mimikatz.exe 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe File opened for modification C:\Windows\Help\Help\Win32\mimilove.exe 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe File opened for modification C:\Windows\Help\Help\Win32 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe File created C:\Windows\Help\Help\README.md 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe File opened for modification C:\Windows\Help\Help\mimicom.idl 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe File opened for modification C:\Windows\Help\Help\Win32\mimikatz.exe 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe File created C:\Windows\Help\Help\Win32\mimilove.exe 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe File opened for modification C:\Windows\Help\Help\Win32\mimispool.dll 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe File created C:\Windows\Help\Help\Win32\mimidrv.sys 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe File created C:\Windows\Help\Help\kiwi_passwords.yar 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe File created C:\Windows\Help\Help\Win32\mimispool.dll 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe File opened for modification C:\Windows\Help\Help\README.md 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe File created C:\Windows\Help\Help\3.bat 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe File opened for modification C:\Windows\Help\Help\3.bat 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe File created C:\Windows\Help\Help\Win32\mimilib.dll 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe File opened for modification C:\Windows\Help\Help\Win32\mimilib.dll 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe File opened for modification C:\Windows\Help\Help\Win32\mimidrv.sys 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3284 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2832 mimikatz.exe 2832 mimikatz.exe 2832 mimikatz.exe 2832 mimikatz.exe 2832 mimikatz.exe 2832 mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4884 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe Token: SeDebugPrivilege 2832 mimikatz.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4884 wrote to memory of 5088 4884 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe 83 PID 4884 wrote to memory of 5088 4884 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe 83 PID 4884 wrote to memory of 5088 4884 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe 83 PID 4884 wrote to memory of 2088 4884 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe 85 PID 4884 wrote to memory of 2088 4884 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe 85 PID 4884 wrote to memory of 2088 4884 05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe 85 PID 5088 wrote to memory of 2832 5088 cmd.exe 87 PID 5088 wrote to memory of 2832 5088 cmd.exe 87 PID 5088 wrote to memory of 2832 5088 cmd.exe 87 PID 5088 wrote to memory of 3272 5088 cmd.exe 88 PID 5088 wrote to memory of 3272 5088 cmd.exe 88 PID 5088 wrote to memory of 3272 5088 cmd.exe 88 PID 2088 wrote to memory of 3284 2088 cmd.exe 89 PID 2088 wrote to memory of 3284 2088 cmd.exe 89 PID 2088 wrote to memory of 3284 2088 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe"C:\Users\Admin\AppData\Local\Temp\05b5a1a5354201eb02051a8555a63d82e98766798f5739111c454103ca2599bb.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\Help\Help\3.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\Help\Help\Win32\mimikatz.exeWin32\mimikatz.exe privilege::debug sekurlsa::logonpasswords3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Executed 32. You can close ."3⤵PID:3272
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\HZ~4DA3.tmp.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:3284
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD53a2efde61c44f800aceedb24c7966acc
SHA15267d8deea10916a68d3a3d482cd15b957eba864
SHA2563b569b72310e33b4704d2de0bbc75ce0331d3ec229cf4f6e7d07451469fa5132
SHA51248e5433f1c0b8468c0722290bbc2973c829ac61152dd756d0ea14ad3c89c868d51af18aecfa6f982188f5936b57f1c5581d1c8d4bcc280f41baaa41309655a0d
-
Filesize
196B
MD586310b48a6ad1c68fc8e4a0eeb15f180
SHA10f69537f3742eb57a1e9e57a895aec4b6667320c
SHA256b05f645941a40594c82a4277cb02edcf75a31378676f002dcd79c9dda2f71a43
SHA512f6c0188562476236efe5cc816855e64c1e0a6899cc94f9b180ad2d636b3bb3a5b30ec90c7e91520f5362be8dc4fc9c47d0188ea9101953f75746a18131f0c3c0
-
Filesize
1.0MB
MD5d3b17ddf0b98fd2441ed46b033043456
SHA193ed68c7e5096d936115854954135d110648e739
SHA25694795fd89366e01bd6ce6471ff27c3782e2e16377a848426cf0b2e6baee9449b
SHA512cac2230361981323ea998c08f7d9afc9369c62a683a60421628adab1eb1e4ffbbc9c2239a8bf66cb662ad7d56e7284f9051bb548979b8c6862570ce45aa27120