Overview
overview
10Static
static
10arsenal-ki...kit.sh
windows10-ltsc 2021-x64
8arsenal-ki...ild.sh
windows10-ltsc 2021-x64
8arsenal-ki...ild.sh
windows10-ltsc 2021-x64
8arsenal-ki...64.dll
windows10-ltsc 2021-x64
8arsenal-ki...86.dll
windows10-ltsc 2021-x64
3arsenal-ki...64.dll
windows10-ltsc 2021-x64
8arsenal-ki...86.dll
windows10-ltsc 2021-x64
8arsenal-ki...64.dll
windows10-ltsc 2021-x64
8arsenal-ki...86.dll
windows10-ltsc 2021-x64
8arsenal-ki...64.dll
windows10-ltsc 2021-x64
8arsenal-ki...86.dll
windows10-ltsc 2021-x64
8arsenal-ki...ild.sh
windows10-ltsc 2021-x64
8arsenal-ki...ild.sh
windows10-ltsc 2021-x64
8arsenal-ki...ss.ps1
windows10-ltsc 2021-x64
8arsenal-ki...64.ps1
windows10-ltsc 2021-x64
8arsenal-ki...86.ps1
windows10-ltsc 2021-x64
8arsenal-ki...ate.py
windows10-ltsc 2021-x64
8arsenal-ki...te.vbs
windows10-ltsc 2021-x64
8arsenal-ki...64.ps1
windows10-ltsc 2021-x64
8arsenal-ki...86.ps1
windows10-ltsc 2021-x64
8arsenal-ki...86.vbs
windows10-ltsc 2021-x64
8arsenal-ki...ild.sh
windows10-ltsc 2021-x64
8arsenal-ki...drl.py
windows10-ltsc 2021-x64
8arsenal-ki...ild.sh
windows10-ltsc 2021-x64
8Resubmissions
09-02-2025 05:32
250209-f8mk6ayjcp 1009-02-2025 05:31
250209-f72zfswrfz 1009-02-2025 05:28
250209-f6gl5awrct 10Analysis
-
max time kernel
96s -
max time network
150s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250207-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250207-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
09-02-2025 05:28
Behavioral task
behavioral1
Sample
arsenal-kit20230919-zh-CN/build_arsenal_kit.sh
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral2
Sample
arsenal-kit20230919-zh-CN/kits/artifact/build.sh
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral3
Sample
arsenal-kit20230919-zh-CN/kits/mimikatz/build.sh
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral4
Sample
arsenal-kit20230919-zh-CN/kits/mimikatz/mimikatz-chrome.x64.dll
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral5
Sample
arsenal-kit20230919-zh-CN/kits/mimikatz/mimikatz-chrome.x86.dll
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral6
Sample
arsenal-kit20230919-zh-CN/kits/mimikatz/mimikatz-full.x64.dll
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral7
Sample
arsenal-kit20230919-zh-CN/kits/mimikatz/mimikatz-full.x86.dll
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral8
Sample
arsenal-kit20230919-zh-CN/kits/mimikatz/mimikatz-max.x64.dll
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral9
Sample
arsenal-kit20230919-zh-CN/kits/mimikatz/mimikatz-max.x86.dll
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral10
Sample
arsenal-kit20230919-zh-CN/kits/mimikatz/mimikatz-min.x64.dll
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral11
Sample
arsenal-kit20230919-zh-CN/kits/mimikatz/mimikatz-min.x86.dll
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral12
Sample
arsenal-kit20230919-zh-CN/kits/process_inject/build.sh
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral13
Sample
arsenal-kit20230919-zh-CN/kits/resource/build.sh
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral14
Sample
arsenal-kit20230919-zh-CN/kits/resource/compress.ps1
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral15
Sample
arsenal-kit20230919-zh-CN/kits/resource/template.hint.x64.ps1
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral16
Sample
arsenal-kit20230919-zh-CN/kits/resource/template.hint.x86.ps1
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral17
Sample
arsenal-kit20230919-zh-CN/kits/resource/template.py
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral18
Sample
arsenal-kit20230919-zh-CN/kits/resource/template.vbs
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral19
Sample
arsenal-kit20230919-zh-CN/kits/resource/template.x64.ps1
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral20
Sample
arsenal-kit20230919-zh-CN/kits/resource/template.x86.ps1
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral21
Sample
arsenal-kit20230919-zh-CN/kits/resource/template.x86.vbs
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral22
Sample
arsenal-kit20230919-zh-CN/kits/sleepmask/build.sh
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral23
Sample
arsenal-kit20230919-zh-CN/kits/udrl-vs/udrl.py
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral24
Sample
arsenal-kit20230919-zh-CN/kits/udrl/build.sh
Resource
win10ltsc2021-20250207-en
General
-
Target
arsenal-kit20230919-zh-CN/kits/mimikatz/mimikatz-max.x86.dll
-
Size
1.1MB
-
MD5
564403d232ac0036429252d78345c463
-
SHA1
1ee91ad43fdd291c0a4d15603762ffa7f24e9f68
-
SHA256
4cee15302a5e78ca9221c1fa2206e7bf97322fdf40580dc2df506901c8ba5c61
-
SHA512
908d5b4fbbb58afa50feeafa4b04bb4573db8177d147347d485ce276e79974a9c64e804e2e4811a4a5f39c67380cafb32defe209424e3dacabcb08d7e2065e63
-
SSDEEP
24576:9UmExe7s3hUGZ4MSmeD0OkuyhsxxJ3GeBlpg0gyG+:9UBlSMNg0ThsxxJ3zm0
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 23 3768 Process not Found -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 8 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2480 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4676 wrote to memory of 2480 4676 rundll32.exe 83 PID 4676 wrote to memory of 2480 4676 rundll32.exe 83 PID 4676 wrote to memory of 2480 4676 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\arsenal-kit20230919-zh-CN\kits\mimikatz\mimikatz-max.x86.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\arsenal-kit20230919-zh-CN\kits\mimikatz\mimikatz-max.x86.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:8