Analysis
-
max time kernel
0s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-08-2024 14:08
Behavioral task
behavioral1
Sample
a78c9871da09fab21aec9b88a4e880f81ecb1ed0fa941f31cc2f041067e8e972.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
a78c9871da09fab21aec9b88a4e880f81ecb1ed0fa941f31cc2f041067e8e972.sys
Resource
win11-20240802-en
General
-
Target
a78c9871da09fab21aec9b88a4e880f81ecb1ed0fa941f31cc2f041067e8e972.sys
-
Size
32KB
-
MD5
a37ed7663073319d02f2513575a22995
-
SHA1
005754dab657ddc6dae28eee313ca2cc6a0c375c
-
SHA256
a78c9871da09fab21aec9b88a4e880f81ecb1ed0fa941f31cc2f041067e8e972
-
SHA512
a4f63c33d7c23143e79550bf089a147138f85c1fd5b7d41234f0a16a16e9429b338826c4122b5bb9d83bcc34329a0731163d90ba69b56daf07640487da9f0e64
-
SSDEEP
768:N1r1OG4n1D+TC/spyQ9pSpvWv11qlCiSvslgWVHkiMxn:Xr1cVK4vo1QlLSvslbJkiMB
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule behavioral2/memory/4068-0-0x0000000000010000-0x000000000001E000-memory.dmp mimikatz
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\a78c9871da09fab21aec9b88a4e880f81ecb1ed0fa941f31cc2f041067e8e972.sys1⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\a78c9871da09fab21aec9b88a4e880f81ecb1ed0fa941f31cc2f041067e8e972.sysC:\Users\Admin\AppData\Local\Temp\a78c9871da09fab21aec9b88a4e880f81ecb1ed0fa941f31cc2f041067e8e972.sys2⤵PID:4068
-