Overview
overview
9Static
static
9winpirate-...un.bat
windows7-x64
8winpirate-...un.bat
windows10-2004-x64
8winpirate-...eys.sh
ubuntu-18.04-amd64
3winpirate-...eys.sh
debian-9-armhf
3winpirate-...eys.sh
debian-9-mips
3winpirate-...eys.sh
debian-9-mipsel
3winpirate-...ew.chm
windows7-x64
1winpirate-...ew.chm
windows10-2004-x64
1winpirate-...ew.exe
windows7-x64
3winpirate-...ew.exe
windows10-2004-x64
3winpirate-...64.exe
windows7-x64
3winpirate-...64.exe
windows10-2004-x64
3winpirate-...rds.py
windows7-x64
3winpirate-...rds.py
windows10-2004-x64
3winpirate-...nz.ps1
windows7-x64
3winpirate-...nz.ps1
windows10-2004-x64
3winpirate-...it.exe
windows7-x64
7winpirate-...it.exe
windows10-2004-x64
7winpirate-...te.bat
windows7-x64
8winpirate-...te.bat
windows10-2004-x64
8winpirate-...de.vbs
windows7-x64
1winpirate-...de.vbs
windows10-2004-x64
1Analysis
-
max time kernel
136s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2024 22:21
Static task
static1
Behavioral task
behavioral1
Sample
winpirate-master/Run.bat
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
winpirate-master/Run.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
winpirate-master/Stickykeys.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral4
Sample
winpirate-master/Stickykeys.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral5
Sample
winpirate-master/Stickykeys.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral6
Sample
winpirate-master/Stickykeys.sh
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral7
Sample
winpirate-master/Tools/Browsinghistoryview/BrowsingHistoryView.chm
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
winpirate-master/Tools/Browsinghistoryview/BrowsingHistoryView.chm
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
winpirate-master/Tools/Browsinghistoryview/BrowsingHistoryView.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
winpirate-master/Tools/Browsinghistoryview/BrowsingHistoryView.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
winpirate-master/Tools/Browsinghistoryview/BrowsingHistoryView64.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
winpirate-master/Tools/Browsinghistoryview/BrowsingHistoryView64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
winpirate-master/Tools/Chrome/chromepasswords.py
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
winpirate-master/Tools/Chrome/chromepasswords.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
winpirate-master/Tools/mimikittenz/Invoke-mimikittenz.ps1
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
winpirate-master/Tools/mimikittenz/Invoke-mimikittenz.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
winpirate-master/Tools/winaudit/WinAudit.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
winpirate-master/Tools/winaudit/WinAudit.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
winpirate-master/WinPirate.bat
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
winpirate-master/WinPirate.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
winpirate-master/hide.vbs
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
winpirate-master/hide.vbs
Resource
win10v2004-20241007-en
General
-
Target
winpirate-master/Tools/mimikittenz/Invoke-mimikittenz.ps1
-
Size
21KB
-
MD5
bdb28c5a180a1649e6411301eb94452f
-
SHA1
f8324684d3042e7cee8f1bc21ba89b2e8536b38e
-
SHA256
14e2f70470396a18c27debb419a4f4063c2ad5b6976f429d47f55e31066a5e6a
-
SHA512
a0f4e27b70d26569afaac2bce1c179dfc77db605bc75867682819263438ab2fa9479a290ff726e52dcbe2f9810648cc2037197cbd8691e280c849079ecb57b8b
-
SSDEEP
192:XmGuSnWGH0/7tSULU8doB3x0HNm0H8nU4L/k70GCB89W/SGZgggMGDAch1ZB9mH2:ySWGH6td48doB3x0HSU5pCBNSh01SPV
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 4216 powershell.exe 4216 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 4216 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\winpirate-master\Tools\mimikittenz\Invoke-mimikittenz.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82