Overview
overview
10Static
static
10arsenal-ki...kit.sh
windows10-ltsc 2021-x64
8arsenal-ki...ild.sh
windows10-ltsc 2021-x64
8arsenal-ki...ild.sh
windows10-ltsc 2021-x64
8arsenal-ki...64.dll
windows10-ltsc 2021-x64
8arsenal-ki...86.dll
windows10-ltsc 2021-x64
3arsenal-ki...64.dll
windows10-ltsc 2021-x64
8arsenal-ki...86.dll
windows10-ltsc 2021-x64
8arsenal-ki...64.dll
windows10-ltsc 2021-x64
8arsenal-ki...86.dll
windows10-ltsc 2021-x64
8arsenal-ki...64.dll
windows10-ltsc 2021-x64
8arsenal-ki...86.dll
windows10-ltsc 2021-x64
8arsenal-ki...ild.sh
windows10-ltsc 2021-x64
8arsenal-ki...ild.sh
windows10-ltsc 2021-x64
8arsenal-ki...ss.ps1
windows10-ltsc 2021-x64
8arsenal-ki...64.ps1
windows10-ltsc 2021-x64
8arsenal-ki...86.ps1
windows10-ltsc 2021-x64
8arsenal-ki...ate.py
windows10-ltsc 2021-x64
8arsenal-ki...te.vbs
windows10-ltsc 2021-x64
8arsenal-ki...64.ps1
windows10-ltsc 2021-x64
8arsenal-ki...86.ps1
windows10-ltsc 2021-x64
8arsenal-ki...86.vbs
windows10-ltsc 2021-x64
8arsenal-ki...ild.sh
windows10-ltsc 2021-x64
8arsenal-ki...drl.py
windows10-ltsc 2021-x64
8arsenal-ki...ild.sh
windows10-ltsc 2021-x64
8Resubmissions
09-02-2025 05:32
250209-f8mk6ayjcp 1009-02-2025 05:31
250209-f72zfswrfz 1009-02-2025 05:28
250209-f6gl5awrct 10Analysis
-
max time kernel
124s -
max time network
147s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250207-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250207-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
09-02-2025 05:28
Behavioral task
behavioral1
Sample
arsenal-kit20230919-zh-CN/build_arsenal_kit.sh
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral2
Sample
arsenal-kit20230919-zh-CN/kits/artifact/build.sh
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral3
Sample
arsenal-kit20230919-zh-CN/kits/mimikatz/build.sh
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral4
Sample
arsenal-kit20230919-zh-CN/kits/mimikatz/mimikatz-chrome.x64.dll
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral5
Sample
arsenal-kit20230919-zh-CN/kits/mimikatz/mimikatz-chrome.x86.dll
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral6
Sample
arsenal-kit20230919-zh-CN/kits/mimikatz/mimikatz-full.x64.dll
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral7
Sample
arsenal-kit20230919-zh-CN/kits/mimikatz/mimikatz-full.x86.dll
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral8
Sample
arsenal-kit20230919-zh-CN/kits/mimikatz/mimikatz-max.x64.dll
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral9
Sample
arsenal-kit20230919-zh-CN/kits/mimikatz/mimikatz-max.x86.dll
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral10
Sample
arsenal-kit20230919-zh-CN/kits/mimikatz/mimikatz-min.x64.dll
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral11
Sample
arsenal-kit20230919-zh-CN/kits/mimikatz/mimikatz-min.x86.dll
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral12
Sample
arsenal-kit20230919-zh-CN/kits/process_inject/build.sh
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral13
Sample
arsenal-kit20230919-zh-CN/kits/resource/build.sh
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral14
Sample
arsenal-kit20230919-zh-CN/kits/resource/compress.ps1
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral15
Sample
arsenal-kit20230919-zh-CN/kits/resource/template.hint.x64.ps1
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral16
Sample
arsenal-kit20230919-zh-CN/kits/resource/template.hint.x86.ps1
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral17
Sample
arsenal-kit20230919-zh-CN/kits/resource/template.py
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral18
Sample
arsenal-kit20230919-zh-CN/kits/resource/template.vbs
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral19
Sample
arsenal-kit20230919-zh-CN/kits/resource/template.x64.ps1
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral20
Sample
arsenal-kit20230919-zh-CN/kits/resource/template.x86.ps1
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral21
Sample
arsenal-kit20230919-zh-CN/kits/resource/template.x86.vbs
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral22
Sample
arsenal-kit20230919-zh-CN/kits/sleepmask/build.sh
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral23
Sample
arsenal-kit20230919-zh-CN/kits/udrl-vs/udrl.py
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral24
Sample
arsenal-kit20230919-zh-CN/kits/udrl/build.sh
Resource
win10ltsc2021-20250207-en
General
-
Target
arsenal-kit20230919-zh-CN/kits/mimikatz/mimikatz-full.x86.dll
-
Size
687KB
-
MD5
2137195fbba50f73f0f17693484d451e
-
SHA1
006517389486662290918daecacedcaf65a9baa4
-
SHA256
9ba86ae2808fe8df76a52001ef765b5ad3216447d0c0148dc719c6b9527c0e2d
-
SHA512
d4fd9c156081ebf26ae466bbdf21b7b7f7a0b2f489170a57409eaccf270a3d3b7313f896411d4346e5d01c466bfdcc12e132cf3835efd5aed2fc40139ecba9c0
-
SSDEEP
6144:84we2712GJRf9/r3qEVltgK8uFWt3FdW08iXqq49ipmwlXm0S3mnhtXtaY+z4:fweIJRftr3nVMK8pF38gqFimdGfaX4
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 20 2380 Process not Found -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1088 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2056 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3556 wrote to memory of 2056 3556 rundll32.exe 85 PID 3556 wrote to memory of 2056 3556 rundll32.exe 85 PID 3556 wrote to memory of 2056 3556 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\arsenal-kit20230919-zh-CN\kits\mimikatz\mimikatz-full.x86.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\arsenal-kit20230919-zh-CN\kits\mimikatz\mimikatz-full.x86.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1088