Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 12:08
Static task
static1
Behavioral task
behavioral1
Sample
dea3e2f108cf2d8c7d6e1bb806234c271dcd71ed4dd55b37e4c541f5e0194cb1.exe
Resource
win7-20240705-en
General
-
Target
dea3e2f108cf2d8c7d6e1bb806234c271dcd71ed4dd55b37e4c541f5e0194cb1.exe
-
Size
534KB
-
MD5
7ae349fca95e8f118b29e6b890426723
-
SHA1
afa26a61e487eec4ee8e1bef2e72394797e40b78
-
SHA256
dea3e2f108cf2d8c7d6e1bb806234c271dcd71ed4dd55b37e4c541f5e0194cb1
-
SHA512
95b97ec59d91ff3d97f9e4ba9addc587c76c68e37665abd2e12a94154357a76c5b060c457ec16f3df34c3d540a94c7d7847121bf1a0a0a6659ba73a0bd9c7724
-
SSDEEP
12288:Oem/mdG34ESlKuSUET+95r+5AYvawd59idQCk1nPstVOHoZ17usAen/:OeMmdA4HKKETlAMawdz6KEfzvAc
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
mimikatz is an open source tool to dump credentials on Windows 2 IoCs
resource yara_rule behavioral2/memory/212-2-0x0000000000400000-0x000000000050C233-memory.dmp mimikatz behavioral2/memory/212-3-0x0000000000400000-0x000000000050C233-memory.dmp mimikatz -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dea3e2f108cf2d8c7d6e1bb806234c271dcd71ed4dd55b37e4c541f5e0194cb1.exe