Analysis
-
max time kernel
57s -
max time network
17s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
17-10-2024 22:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
win8http.dll
Resource
win10-20240404-en
windows10-1703-x64
3 signatures
150 seconds
General
-
Target
win8http.dll
-
Size
17KB
-
MD5
797c4de64422d14ca329306cf17cd962
-
SHA1
f2ed993ce47476d76c2f39a769ab446cff86ec8d
-
SHA256
8ce074ad76709fb960c570a8e1f347530b3bfe2c7ba726670c4722baa963089c
-
SHA512
5a09cd409ae8d15d1b6792a62ad65725502698212551c93dcb3dc6948bfe906cd25e12c9c1ac762351ea8d92ce3195a122a9406782cc2193f38743a60a85ef18
-
SSDEEP
384:GxCVPmM3fDIEgpbq2Wmfthc5q9QBy53vTaladED:G8wMsXpGKfHCB2dED
Score
10/10
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
Processes:
resource yara_rule behavioral1/memory/5000-0-0x0000000180000000-0x000000018000E000-memory.dmp mimikatz -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid Process procid_target PID 4732 wrote to memory of 2552 4732 cmd.exe 79 PID 4732 wrote to memory of 2552 4732 cmd.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\win8http.dll,#11⤵PID:5000
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\system32\rundll32.exerundll32.exe2⤵PID:2552
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2280