Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | April 25, 2023, 5:46 p.m. | April 25, 2023, 5:49 p.m. |
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,DrvDisableDriver
2564-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,DrvDisableDriver
2744
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,DrvEnableDriver
2648-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,DrvEnableDriver
2860
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,DrvQueryDriverInfo
2780-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,DrvQueryDriverInfo
2996
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,DrvResetConfigCache
2908-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,DrvResetConfigCache
744
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,GenerateCopyFilePaths
3064-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,GenerateCopyFilePaths
2068
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,SpoolerCopyFileEvent
2180-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,SpoolerCopyFileEvent
2456
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,
2576
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
Lionic | Trojan.Win64.Mimikatz.i!c |
MicroWorld-eScan | Gen:Variant.Mimikatz.10 |
FireEye | Gen:Variant.Mimikatz.10 |
ALYac | Gen:Variant.Mimikatz.10 |
Malwarebytes | Mimikatz.Spyware.Stealer.DDS |
Zillya | Trojan.Mimikatz.Win64.482 |
Sangfor | Infostealer.Win32.Mimikatz.Vfnv |
K7AntiVirus | Riskware ( 0040eff71 ) |
Alibaba | TrojanPSW:Win32/Mimikatz.f5bcc2d8 |
K7GW | Riskware ( 0040eff71 ) |
CrowdStrike | win/malicious_confidence_100% (W) |
Arcabit | Trojan.Mimikatz.10 |
Cyren | W64/Mimikatz.L |
Symantec | Hacktool.Mimikatz |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Generik.BAPJZZG |
Cynet | Malicious (score: 100) |
Paloalto | generic.ml |
Kaspersky | HEUR:Trojan-PSW.Win64.Mimikatz.gen |
BitDefender | Gen:Variant.Mimikatz.10 |
NANO-Antivirus | Trojan.Win64.Mimikatz.jsrsix |
Avast | Win32:CVE-2021-1675-G [Expl] |
Tencent | Trojan.Win64.Mimikatz.a |
Emsisoft | Gen:Variant.Mimikatz.10 (B) |
DrWeb | Tool.Mimikatz.1199 |
VIPRE | Gen:Variant.Mimikatz.10 |
TrendMicro | HKTL_MIMIKATZ64 |
McAfee-GW-Edition | RDN/Generic PWS.y |
Sophos | ATK/Mimikatz-CR |
Jiangmin | Trojan.PSW.Mimikatz.cyl |
Webroot | W32.Hacktool.Gen |
Antiy-AVL | Trojan[PSW]/Win64.Mimikatz |
Gridinsoft | Trojan.Win64.Downloader.cl |
Microsoft | HackTool:Win32/Mimikatz!MSR |
ZoneAlarm | HEUR:Trojan-PSW.Win64.Mimikatz.gen |
GData | Gen:Variant.Mimikatz.10 |
Detected | |
AhnLab-V3 | Trojan/Win.Mimikatz.R445129 |
McAfee | RDN/Generic PWS.y |
MAX | malware (ai score=100) |
Cylance | unsafe |
Panda | Trj/CI.A |
TrendMicro-HouseCall | HKTL_MIMIKATZ64 |
Rising | Trojan.Agent!8.B1E (TFE:6:Z7hKCBfrpcB) |
Yandex | Trojan.Agent!UfvKYTGIZOw |
Ikarus | Trojan.PSW.Mimikatz |
MaxSecure | Trojan.Malware.9545116.susgen |
Fortinet | W32/PossibleThreat |
AVG | Win32:CVE-2021-1675-G [Expl] |
DeepInstinct | MALICIOUS |