Overview
overview
10Static
static
10sample.tar
windows7-x64
1sample.tar
windows10-2004-x64
8arsenal-ki...kit.sh
ubuntu-18.04-amd64
3arsenal-ki...kit.sh
debian-9-armhf
3arsenal-ki...kit.sh
debian-9-mips
3arsenal-ki...kit.sh
debian-9-mipsel
3arsenal-ki...ild.sh
ubuntu-18.04-amd64
1arsenal-ki...ild.sh
debian-9-armhf
1arsenal-ki...ild.sh
debian-9-mips
1arsenal-ki...ild.sh
debian-9-mipsel
1arsenal-ki...ild.sh
ubuntu-18.04-amd64
1arsenal-ki...ild.sh
debian-9-armhf
1arsenal-ki...ild.sh
debian-9-mips
1arsenal-ki...ild.sh
debian-9-mipsel
1arsenal-ki...64.dll
windows7-x64
1arsenal-ki...64.dll
windows10-2004-x64
8arsenal-ki...86.dll
windows7-x64
3arsenal-ki...86.dll
windows10-2004-x64
8arsenal-ki...64.dll
windows7-x64
1arsenal-ki...64.dll
windows10-2004-x64
8arsenal-ki...86.dll
windows7-x64
3arsenal-ki...86.dll
windows10-2004-x64
8arsenal-ki...64.dll
windows7-x64
1arsenal-ki...64.dll
windows10-2004-x64
8arsenal-ki...86.dll
windows7-x64
3arsenal-ki...86.dll
windows10-2004-x64
8arsenal-ki...64.dll
windows7-x64
1arsenal-ki...64.dll
windows10-2004-x64
arsenal-ki...86.dll
windows7-x64
3arsenal-ki...86.dll
windows10-2004-x64
8arsenal-ki...tor.sh
ubuntu-18.04-amd64
1arsenal-ki...tor.sh
debian-9-armhf
1Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
09-02-2025 05:38
Behavioral task
behavioral1
Sample
sample.tar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
sample.tar
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
arsenal-kit/build_arsenal_kit.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral4
Sample
arsenal-kit/build_arsenal_kit.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral5
Sample
arsenal-kit/build_arsenal_kit.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral6
Sample
arsenal-kit/build_arsenal_kit.sh
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral7
Sample
arsenal-kit/kits/artifact/build.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral8
Sample
arsenal-kit/kits/artifact/build.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral9
Sample
arsenal-kit/kits/artifact/build.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral10
Sample
arsenal-kit/kits/artifact/build.sh
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral11
Sample
arsenal-kit/kits/mimikatz/build.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral12
Sample
arsenal-kit/kits/mimikatz/build.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral13
Sample
arsenal-kit/kits/mimikatz/build.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral14
Sample
arsenal-kit/kits/mimikatz/build.sh
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral15
Sample
arsenal-kit/kits/mimikatz/mimikatz-chrome.x64.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
arsenal-kit/kits/mimikatz/mimikatz-chrome.x64.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral17
Sample
arsenal-kit/kits/mimikatz/mimikatz-chrome.x86.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
arsenal-kit/kits/mimikatz/mimikatz-chrome.x86.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral19
Sample
arsenal-kit/kits/mimikatz/mimikatz-full.x64.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
arsenal-kit/kits/mimikatz/mimikatz-full.x64.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral21
Sample
arsenal-kit/kits/mimikatz/mimikatz-full.x86.dll
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
arsenal-kit/kits/mimikatz/mimikatz-full.x86.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral23
Sample
arsenal-kit/kits/mimikatz/mimikatz-max.x64.dll
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
arsenal-kit/kits/mimikatz/mimikatz-max.x64.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral25
Sample
arsenal-kit/kits/mimikatz/mimikatz-max.x86.dll
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
arsenal-kit/kits/mimikatz/mimikatz-max.x86.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral27
Sample
arsenal-kit/kits/mimikatz/mimikatz-min.x64.dll
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
arsenal-kit/kits/mimikatz/mimikatz-min.x64.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral29
Sample
arsenal-kit/kits/mimikatz/mimikatz-min.x86.dll
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
arsenal-kit/kits/mimikatz/mimikatz-min.x86.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral31
Sample
arsenal-kit/kits/mutator/docker_mutator.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral32
Sample
arsenal-kit/kits/mutator/docker_mutator.sh
Resource
debian9-armhf-20240729-en
General
-
Target
arsenal-kit/kits/mimikatz/mimikatz-chrome.x86.dll
-
Size
623KB
-
MD5
c944bbd13ac4904fb3b31c3e2f2b27d0
-
SHA1
d2e6d62a0a13acd547595f6fa27a3fde96c68c15
-
SHA256
a33eb47904d7a3b0949d79c3a6051e28e171315082eb896e6b9c688922311c7a
-
SHA512
bc7b278710393f9023b98a02749e0561784784c2a329e87cd2a0dabfc9e5c2a9f77418af2701d1f7844df7795422810f47fab479fbed64ca19010110ec9d9d36
-
SSDEEP
12288:qmy/sRoFPtR64fVYapNN+DI4dS+1Ob9RtxFrdi4TdNwlyo2VODETcL9hR:q3/PFPtR6YVYaXP4E+0b9R/FhdKF20wO
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 56 3208 Process not Found -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2864 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1412 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1028 wrote to memory of 1412 1028 rundll32.exe 85 PID 1028 wrote to memory of 1412 1028 rundll32.exe 85 PID 1028 wrote to memory of 1412 1028 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\arsenal-kit\kits\mimikatz\mimikatz-chrome.x86.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\arsenal-kit\kits\mimikatz\mimikatz-chrome.x86.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NTFDRTE1ODAtQ0NFQy00REU5LUExRkYtNDNFNUEwMkVBMjQzfSIgdXNlcmlkPSJ7REQyQkEzQjgtNDQzNi00NzVELTg1QzEtOERGQkY1MkQwNEI3fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7OTE0RUFEQTYtQzNBRS00MzIyLUFDMTYtNUMxMkFGN0JEMkZDfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5MjEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE5ODA3NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1Mjg2NTUwNzY2Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2864