Overview
overview
10Static
static
10mimi.zip
windows7-x64
1mimi.zip
windows10-2004-x64
1home/macie...rv.sys
windows7-x64
10home/macie...rv.sys
windows10-2004-x64
10home/macie...tz.exe
windows7-x64
3home/macie...tz.exe
windows10-2004-x64
3home/macie...ib.dll
windows7-x64
3home/macie...ib.dll
windows10-2004-x64
3home/macie...ve.exe
windows7-x64
3home/macie...ve.exe
windows10-2004-x64
3home/macie...ol.dll
windows7-x64
3home/macie...ol.dll
windows10-2004-x64
3home/macie...ds.yar
windows7-x64
3home/macie...ds.yar
windows10-2004-x64
3home/macie...om.idl
windows7-x64
3home/macie...om.idl
windows10-2004-x64
3home/macie...rv.sys
windows7-x64
10home/macie...rv.sys
windows10-2004-x64
10home/macie...tz.exe
windows7-x64
1home/macie...tz.exe
windows10-2004-x64
1home/macie...ib.dll
windows7-x64
1home/macie...ib.dll
windows10-2004-x64
1home/macie...ol.dll
windows7-x64
1home/macie...ol.dll
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-01-2025 13:24
Behavioral task
behavioral1
Sample
mimi.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
mimi.zip
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
home/maciek/mimikatz/Win32/mimidrv.sys
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
home/maciek/mimikatz/Win32/mimidrv.sys
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
home/maciek/mimikatz/Win32/mimikatz.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
home/maciek/mimikatz/Win32/mimikatz.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
home/maciek/mimikatz/Win32/mimilib.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
home/maciek/mimikatz/Win32/mimilib.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral9
Sample
home/maciek/mimikatz/Win32/mimilove.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
home/maciek/mimikatz/Win32/mimilove.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
home/maciek/mimikatz/Win32/mimispool.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
home/maciek/mimikatz/Win32/mimispool.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
home/maciek/mimikatz/kiwi_passwords.yar
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
home/maciek/mimikatz/kiwi_passwords.yar
Resource
win10v2004-20250129-en
Behavioral task
behavioral15
Sample
home/maciek/mimikatz/mimicom.idl
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
home/maciek/mimikatz/mimicom.idl
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
home/maciek/mimikatz/x64/mimidrv.sys
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
home/maciek/mimikatz/x64/mimidrv.sys
Resource
win10v2004-20250129-en
Behavioral task
behavioral19
Sample
home/maciek/mimikatz/x64/mimikatz.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
home/maciek/mimikatz/x64/mimikatz.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
home/maciek/mimikatz/x64/mimilib.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
home/maciek/mimikatz/x64/mimilib.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral23
Sample
home/maciek/mimikatz/x64/mimispool.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
home/maciek/mimikatz/x64/mimispool.dll
Resource
win10v2004-20250129-en
General
-
Target
home/maciek/mimikatz/kiwi_passwords.yar
-
Size
2KB
-
MD5
21cb5b54ab42c19f66a10e839f789d64
-
SHA1
36cb221fad2de8af5abe28702c189d20afe5d141
-
SHA256
25b0c720edf459b98346692d52c094abc92bae6b9e1309b7ab6f11057d605e21
-
SHA512
042cb7c42588c7cf013061db95e68b035e51ec5d14701fc9e12a19e661de0e05564985650598c95c830c449553a5177b256fe9fc813447e2e6d506bad3748ff8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2776 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2776 AcroRd32.exe 2776 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2224 2152 cmd.exe 32 PID 2152 wrote to memory of 2224 2152 cmd.exe 32 PID 2152 wrote to memory of 2224 2152 cmd.exe 32 PID 2224 wrote to memory of 2776 2224 rundll32.exe 33 PID 2224 wrote to memory of 2776 2224 rundll32.exe 33 PID 2224 wrote to memory of 2776 2224 rundll32.exe 33 PID 2224 wrote to memory of 2776 2224 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\home\maciek\mimikatz\kiwi_passwords.yar1⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\home\maciek\mimikatz\kiwi_passwords.yar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\home\maciek\mimikatz\kiwi_passwords.yar"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2776
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5759f687fb2a378c5ef597dc12a48d6fb
SHA1a8ded22405c932595c88bfa109c16c12a14efe63
SHA25605f6ec5ed64ed91c47baa45b182d0993aa421b0acb3b0843122a0dc62d66f435
SHA512f7bc74f1c0f46ab3ca7126e7e765f045da1e6c63d881ebb554410ff66521b47e299d2475651bf3fdfb064d3a0170b961a2da53feb47e02d60aa4ac07e01697aa