Analysis Overview
SHA256
e20d3b2c03c01b84fe313d18de51b04fe1d51108c52923d0db4e7454c520d3ad
Threat Level: Known bad
The file 9a456b4a5048179e010add9c53c93834.exe was found to be: Known bad.
Malicious Activity Summary
mimikatz is an open source tool to dump credentials on Windows
Mimikatz
Mimikatz family
mimikatz is an open source tool to dump credentials on Windows
Unsigned PE
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-08-10 07:58
Signatures
Mimikatz family
mimikatz is an open source tool to dump credentials on Windows
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-08-10 07:58
Reported
2024-08-10 08:00
Platform
win7-20240704-en
Max time kernel
13s
Max time network
19s
Command Line
Signatures
Mimikatz
mimikatz is an open source tool to dump credentials on Windows
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\9a456b4a5048179e010add9c53c93834.exe
"C:\Users\Admin\AppData\Local\Temp\9a456b4a5048179e010add9c53c93834.exe"
Network
Files
memory/2472-0-0x000007FEF5723000-0x000007FEF5724000-memory.dmp
memory/2472-1-0x00000000001A0000-0x00000000003A6000-memory.dmp
memory/2472-3-0x000007FEF5720000-0x000007FEF610C000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-08-10 07:58
Reported
2024-08-10 08:00
Platform
win10v2004-20240802-en
Max time kernel
140s
Max time network
134s
Command Line
Signatures
Mimikatz
mimikatz is an open source tool to dump credentials on Windows
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\9a456b4a5048179e010add9c53c93834.exe
"C:\Users\Admin\AppData\Local\Temp\9a456b4a5048179e010add9c53c93834.exe"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4460,i,4174666705242427184,7333705955694532165,262144 --variations-seed-version --mojo-platform-channel-handle=4100 /prefetch:8
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 68.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 192.142.123.92.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
Files
memory/2396-1-0x00000000000D0000-0x00000000002D6000-memory.dmp
memory/2396-0-0x00007FF966DE3000-0x00007FF966DE5000-memory.dmp
memory/2396-3-0x00007FF966DE0000-0x00007FF9678A1000-memory.dmp
memory/2396-5-0x00007FF966DE0000-0x00007FF9678A1000-memory.dmp