Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    30/01/2025, 13:24 UTC

General

  • Target

    home/maciek/mimikatz/mimicom.idl

  • Size

    2KB

  • MD5

    ca47e27329203c266372d04475db2c57

  • SHA1

    4f7e3cb56c1a0d66ea979ff0ae644a6fe3feb0d8

  • SHA256

    51d45e6c5df6b43b17afc863794f34000d32fb37cd7c3664efc5bd99039ac3df

  • SHA512

    6e3a697ac27db3184284c4537cccea6a7204ef7a23327f8eb58eaa9bdbe774c2ed7ddfd0070a5d6eba034195d10b82f7cfc8167a54a230e12e55e6c0ddbaa4e9

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\home\maciek\mimikatz\mimicom.idl
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\home\maciek\mimikatz\mimicom.idl
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\home\maciek\mimikatz\mimicom.idl"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    11c5a8703bf0d8f56417b682516c97cc

    SHA1

    9bacd51e3c97187632c4f6ac9fa3755fa36c8e38

    SHA256

    e0ab1bc828e9b3562b22dad025bf6f08776b051aea98d0e7539ec8d79af85d7d

    SHA512

    dddc566ab4c9c56c013b50a9c33117380e9117d23f6249f0fa3fe10e9d1c1b1d45055242b56bb362ac77df4c979ea905bd0ed37a646bef8e92bff9bc638bb2c1

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.