Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
99276613e20a0f55bb2e7b550c042b546d96b6790fcab9398d705df2201e3254.exe
Resource
win7-20241023-en
General
-
Target
99276613e20a0f55bb2e7b550c042b546d96b6790fcab9398d705df2201e3254.exe
-
Size
1.1MB
-
MD5
46104f7ba95ffaa016f8c58535dbc476
-
SHA1
d157b6a1b48650c2f08150224b20c39e0d5dadee
-
SHA256
99276613e20a0f55bb2e7b550c042b546d96b6790fcab9398d705df2201e3254
-
SHA512
ec2f5752f60b0e9fa81ef67133de7a698cc130d78525720f972c01a0b49ff6ecfb5d80b646a5c0307e66a429b6f7cda7fb341a13ed3cd5a58ce7919dd82d27e9
-
SSDEEP
12288:BtEwiJMd1YxgfhG1PTrWmzJ0vgDlt6DhGsaPvNl3/rVvg8ImC9SeQRRiz00hg8uN:B2w/ExdztiEz6NGsK3je2PlYoVdH3
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
mimikatz is an open source tool to dump credentials on Windows 2 IoCs
resource yara_rule behavioral2/memory/3380-1-0x0000000001180000-0x000000000128D000-memory.dmp mimikatz behavioral2/memory/3380-2-0x0000000001180000-0x000000000128D000-memory.dmp mimikatz -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99276613e20a0f55bb2e7b550c042b546d96b6790fcab9398d705df2201e3254.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3380 99276613e20a0f55bb2e7b550c042b546d96b6790fcab9398d705df2201e3254.exe 3380 99276613e20a0f55bb2e7b550c042b546d96b6790fcab9398d705df2201e3254.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\99276613e20a0f55bb2e7b550c042b546d96b6790fcab9398d705df2201e3254.exe"C:\Users\Admin\AppData\Local\Temp\99276613e20a0f55bb2e7b550c042b546d96b6790fcab9398d705df2201e3254.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3380