Analysis

  • max time kernel
    92s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-01-2025 13:24

General

  • Target

    home/maciek/mimikatz/Win32/mimispool.dll

  • Size

    29KB

  • MD5

    64321f9e601651cb623e63d67de6c984

  • SHA1

    ee256081c8dff963701a45b9803d9f5d9e6638ec

  • SHA256

    b016e0fb93032d4ab6f2fb2ec6388e3117442d836bed2fe38ae8b73d7b825c5e

  • SHA512

    ffe04da002f901fec52bdaa61dbd5dfdfa87d1a3ce53a4941afda008dcd726ceea054b2ef188d6f36ab4691b1fa02c5589aafe118ded0360e5daa4fe98903d3f

  • SSDEEP

    768:V+B+s0uolsCDihqa1aSoQuSPNaiho9W1aSoQuSP/N:VW0uolHDi/oL7SPNaiEWoL7SP/N

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\home\maciek\mimikatz\Win32\mimispool.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:964
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\home\maciek\mimikatz\Win32\mimispool.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads