Overview
overview
10Static
static
10sample.tar
windows7-x64
1sample.tar
windows10-2004-x64
8arsenal-ki...kit.sh
ubuntu-18.04-amd64
3arsenal-ki...kit.sh
debian-9-armhf
3arsenal-ki...kit.sh
debian-9-mips
3arsenal-ki...kit.sh
debian-9-mipsel
3arsenal-ki...ild.sh
ubuntu-18.04-amd64
1arsenal-ki...ild.sh
debian-9-armhf
1arsenal-ki...ild.sh
debian-9-mips
1arsenal-ki...ild.sh
debian-9-mipsel
1arsenal-ki...ild.sh
ubuntu-18.04-amd64
1arsenal-ki...ild.sh
debian-9-armhf
1arsenal-ki...ild.sh
debian-9-mips
1arsenal-ki...ild.sh
debian-9-mipsel
1arsenal-ki...64.dll
windows7-x64
1arsenal-ki...64.dll
windows10-2004-x64
8arsenal-ki...86.dll
windows7-x64
3arsenal-ki...86.dll
windows10-2004-x64
8arsenal-ki...64.dll
windows7-x64
1arsenal-ki...64.dll
windows10-2004-x64
8arsenal-ki...86.dll
windows7-x64
3arsenal-ki...86.dll
windows10-2004-x64
8arsenal-ki...64.dll
windows7-x64
1arsenal-ki...64.dll
windows10-2004-x64
8arsenal-ki...86.dll
windows7-x64
3arsenal-ki...86.dll
windows10-2004-x64
8arsenal-ki...64.dll
windows7-x64
1arsenal-ki...64.dll
windows10-2004-x64
arsenal-ki...86.dll
windows7-x64
3arsenal-ki...86.dll
windows10-2004-x64
8arsenal-ki...tor.sh
ubuntu-18.04-amd64
1arsenal-ki...tor.sh
debian-9-armhf
1Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
09-02-2025 05:38
Behavioral task
behavioral1
Sample
sample.tar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
sample.tar
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
arsenal-kit/build_arsenal_kit.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral4
Sample
arsenal-kit/build_arsenal_kit.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral5
Sample
arsenal-kit/build_arsenal_kit.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral6
Sample
arsenal-kit/build_arsenal_kit.sh
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral7
Sample
arsenal-kit/kits/artifact/build.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral8
Sample
arsenal-kit/kits/artifact/build.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral9
Sample
arsenal-kit/kits/artifact/build.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral10
Sample
arsenal-kit/kits/artifact/build.sh
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral11
Sample
arsenal-kit/kits/mimikatz/build.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral12
Sample
arsenal-kit/kits/mimikatz/build.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral13
Sample
arsenal-kit/kits/mimikatz/build.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral14
Sample
arsenal-kit/kits/mimikatz/build.sh
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral15
Sample
arsenal-kit/kits/mimikatz/mimikatz-chrome.x64.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
arsenal-kit/kits/mimikatz/mimikatz-chrome.x64.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral17
Sample
arsenal-kit/kits/mimikatz/mimikatz-chrome.x86.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
arsenal-kit/kits/mimikatz/mimikatz-chrome.x86.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral19
Sample
arsenal-kit/kits/mimikatz/mimikatz-full.x64.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
arsenal-kit/kits/mimikatz/mimikatz-full.x64.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral21
Sample
arsenal-kit/kits/mimikatz/mimikatz-full.x86.dll
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
arsenal-kit/kits/mimikatz/mimikatz-full.x86.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral23
Sample
arsenal-kit/kits/mimikatz/mimikatz-max.x64.dll
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
arsenal-kit/kits/mimikatz/mimikatz-max.x64.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral25
Sample
arsenal-kit/kits/mimikatz/mimikatz-max.x86.dll
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
arsenal-kit/kits/mimikatz/mimikatz-max.x86.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral27
Sample
arsenal-kit/kits/mimikatz/mimikatz-min.x64.dll
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
arsenal-kit/kits/mimikatz/mimikatz-min.x64.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral29
Sample
arsenal-kit/kits/mimikatz/mimikatz-min.x86.dll
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
arsenal-kit/kits/mimikatz/mimikatz-min.x86.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral31
Sample
arsenal-kit/kits/mutator/docker_mutator.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral32
Sample
arsenal-kit/kits/mutator/docker_mutator.sh
Resource
debian9-armhf-20240729-en
General
-
Target
arsenal-kit/kits/mimikatz/mimikatz-full.x86.dll
-
Size
687KB
-
MD5
2137195fbba50f73f0f17693484d451e
-
SHA1
006517389486662290918daecacedcaf65a9baa4
-
SHA256
9ba86ae2808fe8df76a52001ef765b5ad3216447d0c0148dc719c6b9527c0e2d
-
SHA512
d4fd9c156081ebf26ae466bbdf21b7b7f7a0b2f489170a57409eaccf270a3d3b7313f896411d4346e5d01c466bfdcc12e132cf3835efd5aed2fc40139ecba9c0
-
SSDEEP
6144:84we2712GJRf9/r3qEVltgK8uFWt3FdW08iXqq49ipmwlXm0S3mnhtXtaY+z4:fweIJRftr3nVMK8pF38gqFimdGfaX4
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 36 2468 Process not Found -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1664 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4460 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4412 wrote to memory of 4460 4412 rundll32.exe 88 PID 4412 wrote to memory of 4460 4412 rundll32.exe 88 PID 4412 wrote to memory of 4460 4412 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\arsenal-kit\kits\mimikatz\mimikatz-full.x86.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\arsenal-kit\kits\mimikatz\mimikatz-full.x86.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5MjEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE5ODA3NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0OTc3NjMxNTIxIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1664