Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-02-2025 15:40

General

  • Target

    mimilib.exe

  • Size

    400KB

  • MD5

    52d843d99b8783b0eda83ec6a35cc37a

  • SHA1

    40bc79ac3ff1ac7b533c92a9991d528790fb06fd

  • SHA256

    efab2072095d507acf7eebe1d8e2641d741e62688edd926cf1a52c8899bb5b66

  • SHA512

    fb5c4ae50c111ed507cae077867cf94a4a9f571dc3a5fdea99a63a8daa92096028d848c9a36c5fcb8f2cb3a9478eb45866757bfbab2f56e5e255a95710c243eb

  • SSDEEP

    12288:I/XEXxg5SJgzF9X+t4Uq9TUVAO/b2G5jNhZ1L:I/XEXjJSFHUKat/TNpL

Malware Config

Signatures

  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Mimikatz family
  • mimikatz is an open source tool to dump credentials on Windows 1 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\mimilib.exe
    "C:\Users\Admin\AppData\Local\Temp\mimilib.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:468
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Microsoft\DRM\batch.bat" "
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5088
      • C:\ProgramData\Microsoft\DRM\KURspp.exe
        C:\ProgramData\Microsoft\DRM\KURspp.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2220
      • C:\Windows\SysWOW64\net.exe
        net user Admin password
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4212
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 user Admin password
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2880
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\ProgramData\Microsoft\DRM\pass.vbs"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4932
      • C:\Windows\SysWOW64\runas.exe
        runas /USER:Admin cmd
        3⤵
        • Access Token Manipulation: Create Process with Token
        • System Location Discovery: System Language Discovery
        PID:3268
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5060
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIyIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU1NzgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODAxNjUyMzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0ODM4ODM0NTY5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:2332
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{61FB7EEF-9D6C-4474-8F39-8191A18A8541}\MicrosoftEdge_X64_133.0.3065.51.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{61FB7EEF-9D6C-4474-8F39-8191A18A8541}\MicrosoftEdge_X64_133.0.3065.51.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4268
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{61FB7EEF-9D6C-4474-8F39-8191A18A8541}\EDGEMITMP_0FFE2.tmp\setup.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{61FB7EEF-9D6C-4474-8F39-8191A18A8541}\EDGEMITMP_0FFE2.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{61FB7EEF-9D6C-4474-8F39-8191A18A8541}\MicrosoftEdge_X64_133.0.3065.51.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1540
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{61FB7EEF-9D6C-4474-8F39-8191A18A8541}\EDGEMITMP_0FFE2.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{61FB7EEF-9D6C-4474-8F39-8191A18A8541}\EDGEMITMP_0FFE2.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.54 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{61FB7EEF-9D6C-4474-8F39-8191A18A8541}\EDGEMITMP_0FFE2.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.51 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6d9416a68,0x7ff6d9416a74,0x7ff6d9416a80
        3⤵
        • Executes dropped EXE
        PID:848
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{61FB7EEF-9D6C-4474-8F39-8191A18A8541}\EDGEMITMP_0FFE2.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{61FB7EEF-9D6C-4474-8F39-8191A18A8541}\EDGEMITMP_0FFE2.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{61FB7EEF-9D6C-4474-8F39-8191A18A8541}\EDGEMITMP_0FFE2.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{61FB7EEF-9D6C-4474-8F39-8191A18A8541}\EDGEMITMP_0FFE2.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.54 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{61FB7EEF-9D6C-4474-8F39-8191A18A8541}\EDGEMITMP_0FFE2.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.51 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6d9416a68,0x7ff6d9416a74,0x7ff6d9416a80
          4⤵
          • Executes dropped EXE
          PID:3340
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.51\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.51\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3648
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.51\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.51\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.54 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.51\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.51 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6b27c6a68,0x7ff6b27c6a74,0x7ff6b27c6a80
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          PID:856
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.51\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.51\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:5052
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.51\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.51\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.54 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.51\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.51 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6b27c6a68,0x7ff6b27c6a74,0x7ff6b27c6a80
          4⤵
          • Executes dropped EXE
          PID:4672
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.51\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.51\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2100
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.51\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.51\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.54 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.51\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.51 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6b27c6a68,0x7ff6b27c6a74,0x7ff6b27c6a80
          4⤵
          • Executes dropped EXE
          PID:1928
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k AppReadiness -p -s AppReadiness
    1⤵
      PID:1080

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{61FB7EEF-9D6C-4474-8F39-8191A18A8541}\EDGEMITMP_0FFE2.tmp\setup.exe

      Filesize

      6.8MB

      MD5

      9e8136a9be4d89a224ac072d28cae0c3

      SHA1

      4b73f200cbedd0db01b2b927829e0c72f2b77418

      SHA256

      60304a058775c7fdc4e656e018c4f977a3c61fb9630607b95ef504b408575264

      SHA512

      a9b28c4afd7bf5ced9179b2fd084b10eca971215295865564c86763500f16ab8ea99a58e8a4240e1faed113e573f27a60dd6696e42854aa58335b262cebe7c30

    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

      Filesize

      3.9MB

      MD5

      72d6c99b8786c8993a67620bf19fd130

      SHA1

      f59d8ea56b0ddb3c6d4fb84f593c2edeb1dc0e5f

      SHA256

      ed6cec9c8bf86b68424a037f359ca957c880295a8228f253c0b2c6623a058fa7

      SHA512

      91b414d56fe7960a6b55fdf3367d0004e9cec94a5da1ccfa363626993284ab4d03e2de756801b81ffbf72a18bd741c40514f4c4bb65e37cbedf4fcb928f1b362

    • C:\Program Files\msedge_installer.log

      Filesize

      73KB

      MD5

      5fd6c1496660a7bec2fd741867786b51

      SHA1

      9b0f4377f363fb9d6ec8fdfe968aa7a171045eab

      SHA256

      ac0de386151ba2a492d1c6f331e64e08553e44a3809f9896324b6da37f161c3c

      SHA512

      17f1951b7ceda0a5e630464552a3e6a9709b5763257b3effa288980029b561c8a76f9537cad656ac64d993ccfb537ba32a0334875fcac94faf3fcfee0a92c27e

    • C:\Program Files\msedge_installer.log

      Filesize

      99KB

      MD5

      a5ce05790869bbacdb85d8463adc7867

      SHA1

      940af27c072ca6b5e86f83cd64d00c98e80fdc2c

      SHA256

      ebf98822a756d7e0da5831d4ab0986b09b1f4c388473b2f103557d8b9b8002b5

      SHA512

      74ff970d9c3841cbc4378e4678db5f99f9c4d14e725026e1af217b3ddbb083a4ad22d6b1ed7dc72ff0bd42eff13d1490772b8a2ed32d6312f7db08fe1be2ec54

    • C:\Program Files\msedge_installer.log

      Filesize

      104KB

      MD5

      ebdc1d9135a8176c212920e52aca48e3

      SHA1

      b22dd56c326d20d4a13eb39028c5e83ecb082ecd

      SHA256

      13131c3ed790aa1e61293cf0c414ca74d59ea6efe5ea9bb182735595e5460aa8

      SHA512

      a9ce88ed3088af4536234f179d26a7cd0bdbbb35795bcabacfdbc11ee2b659f2f3c784b0ae6e77c9b71eef24bc73823bf3627a106395d689675a98da48a298de

    • C:\ProgramData\Microsoft\DRM\KURspp.exe

      Filesize

      109KB

      MD5

      b0220c78ac4d60097bcda4eb2c57aaf0

      SHA1

      0568e8bc084e4474533b7664d02af76ddea14eb1

      SHA256

      850bf85db1c26fb6d49438bdc913a4ceddae057e58325af60ff26a69310b7dfe

      SHA512

      0bce51c051ae2d1527ddda74fe22406e88bf2b3b23ec4e70668e6ff929864a25653a4f3f59094242e1278d348a45c5e30ffb6294c77431396b744bb0639c3159

    • C:\ProgramData\Microsoft\DRM\batch.bat

      Filesize

      107B

      MD5

      db0fde9dbdf881756c0507885a5e3fdb

      SHA1

      36bbcd4e2ec1a7adb4bc483773e2b98fbd802955

      SHA256

      f6dbd5c6c24471d8a1f0738902ae39a490b0d447d9d00c5f4cbc45089abba917

      SHA512

      e5a2dbd58fb628876a486de296420bf3ddb979cbe95e34cb0752f3ea53e2e8c412ca251c384e19b178259edb3d60fda8039bec4536646c30ffdaadbb22d3cfb8

    • C:\ProgramData\Microsoft\DRM\mediadrm.dll

      Filesize

      138KB

      MD5

      be57543e1b5b2978abf5d27690aeceac

      SHA1

      95bcbbe4b6745d42cc1b4b56838e6cb04f136b02

      SHA256

      d4f421c985f1786f603bd1eaf4232d5a0d56b5ee8a7f02e0da978b478f060af2

      SHA512

      d03cefeacc5bce6873b4aca253085001934d099199354d9a5dbbc86d075013d91552dce1727a968db96ad9de35da61f58d56b95116bec4b2f5574530275fe797

    • C:\ProgramData\Microsoft\DRM\pass.vbs

      Filesize

      103B

      MD5

      4eb93bc96cd33392eeb669cf1f9371e5

      SHA1

      80752891adcc9f4ac47668b668dc289ec9bd9836

      SHA256

      7eb2bbc569ff73a97730a41c2c3a4812e225b480e88231032c79d0cb8a562adf

      SHA512

      f85b0e649510ea2e3ac3ba50aa97079897361038461cfe7f535750055f96401e276bb4752aaa19508342c7cf1df49317db60d4da2b807da4b0b6f3692c5286e9