Analysis

  • max time kernel
    0s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    03-08-2024 14:08

General

  • Target

    a78c9871da09fab21aec9b88a4e880f81ecb1ed0fa941f31cc2f041067e8e972.sys

  • Size

    32KB

  • MD5

    a37ed7663073319d02f2513575a22995

  • SHA1

    005754dab657ddc6dae28eee313ca2cc6a0c375c

  • SHA256

    a78c9871da09fab21aec9b88a4e880f81ecb1ed0fa941f31cc2f041067e8e972

  • SHA512

    a4f63c33d7c23143e79550bf089a147138f85c1fd5b7d41234f0a16a16e9429b338826c4122b5bb9d83bcc34329a0731163d90ba69b56daf07640487da9f0e64

  • SSDEEP

    768:N1r1OG4n1D+TC/spyQ9pSpvWv11qlCiSvslgWVHkiMxn:Xr1cVK4vo1QlLSvslbJkiMB

Score
10/10

Malware Config

Signatures

  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • mimikatz is an open source tool to dump credentials on Windows 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\a78c9871da09fab21aec9b88a4e880f81ecb1ed0fa941f31cc2f041067e8e972.sys
    1⤵
      PID:3348
      • C:\Users\Admin\AppData\Local\Temp\a78c9871da09fab21aec9b88a4e880f81ecb1ed0fa941f31cc2f041067e8e972.sys
        C:\Users\Admin\AppData\Local\Temp\a78c9871da09fab21aec9b88a4e880f81ecb1ed0fa941f31cc2f041067e8e972.sys
        2⤵
          PID:4068

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4068-0-0x0000000000010000-0x000000000001E000-memory.dmp

        Filesize

        56KB