Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-11-2024 22:09

General

  • Target

    mimikatz-master/Win32/mimilove.exe

  • Size

    35KB

  • MD5

    5b25c78e900658105bc64f0a31b10656

  • SHA1

    2ca81716cf60d5debae0ad9a82c8566ab53f19a4

  • SHA256

    eac47b3ba3c4a035d4fb8abe0b5531d7f23f1d803b0c784f25cdf68c27520c77

  • SHA512

    ba6bd33c39523b5ebf20b3a5f2f37544b5a5637c64cc132bb1c162a8682288c1a9c105baf7fe2e581ca22070def5a1a33ad68e8f28c26067abf1a4d021c82eb9

  • SSDEEP

    768:dZuH7PLxh8+AJtxF0jBuD24aYNNW9gFqF6VGCxBl/qkFSuEh8FxzEh6:juHxsreYa9dnCxBlnSuEg5EY

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\mimikatz-master\Win32\mimilove.exe
    "C:\Users\Admin\AppData\Local\Temp\mimikatz-master\Win32\mimilove.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads