Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 08:19
Behavioral task
behavioral1
Sample
mimikatz.exe
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
mimikatz.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
mimikatz.exe
-
Size
1.0MB
-
MD5
d3b17ddf0b98fd2441ed46b033043456
-
SHA1
93ed68c7e5096d936115854954135d110648e739
-
SHA256
94795fd89366e01bd6ce6471ff27c3782e2e16377a848426cf0b2e6baee9449b
-
SHA512
cac2230361981323ea998c08f7d9afc9369c62a683a60421628adab1eb1e4ffbbc9c2239a8bf66cb662ad7d56e7284f9051bb548979b8c6862570ce45aa27120
-
SSDEEP
24576:uiDjF7X3YoGq4tC1YJk+3nWBkDeq26iLutKcEY4:u05YjqakE3Aq2vu7E
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mimikatz.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2096 mimikatz.exe 2096 mimikatz.exe 2096 mimikatz.exe 2096 mimikatz.exe 2096 mimikatz.exe 2096 mimikatz.exe 2096 mimikatz.exe 2096 mimikatz.exe 2096 mimikatz.exe 2096 mimikatz.exe 2096 mimikatz.exe 2096 mimikatz.exe 2096 mimikatz.exe 2096 mimikatz.exe 2096 mimikatz.exe 2096 mimikatz.exe 2096 mimikatz.exe 2096 mimikatz.exe 2096 mimikatz.exe 2096 mimikatz.exe 2096 mimikatz.exe