Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Aug. 4, 2024, 1:23 p.m. | Aug. 4, 2024, 1:37 p.m. |
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,DrvDisableDriver
2572-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,DrvDisableDriver
2944
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,DrvEnableDriver
2656-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,DrvEnableDriver
2964
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,DrvQueryDriverInfo
2748-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,DrvQueryDriverInfo
2076
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,DrvResetConfigCache
2844-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,DrvResetConfigCache
2184
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,GenerateCopyFilePaths
2932-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,GenerateCopyFilePaths
2216
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,SpoolerCopyFileEvent
908-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,SpoolerCopyFileEvent
2560
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mimispool.dll,
2200
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
Lionic | Trojan.Win32.Mimikatz.i!c |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
ALYac | Gen:Variant.Mimikatz.10 |
Cylance | Unsafe |
VIPRE | Gen:Variant.Mimikatz.10 |
K7AntiVirus | Trojan ( 005821131 ) |
BitDefender | Gen:Variant.Mimikatz.10 |
K7GW | Trojan ( 005821131 ) |
Arcabit | Trojan.Mimikatz.10 |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/RiskWare.Mimikatz.BG |
Avast | Win32:CVE-2021-1675-G [Expl] |
Kaspersky | HEUR:Trojan-PSW.Win64.Mimikatz.gen |
Alibaba | TrojanPSW:Win64/Mimikatz.e8ec8578 |
MicroWorld-eScan | Gen:Variant.Mimikatz.10 |
Rising | Trojan.Agent!8.B1E (TFE:6:Z7hKCBfrpcB) |
Emsisoft | Gen:Variant.Mimikatz.10 (B) |
Zillya | Tool.Mimikatz.Win32.2698 |
TrendMicro | HKTL_MIMIKATZ64 |
McAfeeD | ti!8CB1AC82F4EC |
FireEye | Gen:Variant.Mimikatz.10 |
Sophos | ATK/Mimikatz-CR |
Ikarus | Win32.Outbreak |
Jiangmin | Trojan.PSW.Mimikatz.cxj |
Webroot | W32.Hacktool.Gen |
Detected | |
Antiy-AVL | RiskWare/Win32.Mimikatz |
Kingsoft | Win64.Trojan-PSW.Mimikatz.gen |
Gridinsoft | Trojan.Win64.Downloader.sa |
Microsoft | VirTool:Win64/Mimispoolz.A!MTB |
ZoneAlarm | HEUR:Trojan-PSW.Win64.Mimikatz.gen |
GData | Gen:Variant.Mimikatz.10 |
Varist | W64/ABTrojan.UQBP-0786 |
AhnLab-V3 | Trojan/Win.Mimikatz.R439082 |
DeepInstinct | MALICIOUS |
Panda | Trj/GdSda.A |
TrendMicro-HouseCall | HKTL_MIMIKATZ64 |
Tencent | Trojan.Win64.Mimikatz.a |
Yandex | RiskWare.Mimikatz!/EnXYkTDFmc |
MAX | malware (ai score=87) |
AVG | Win32:CVE-2021-1675-G [Expl] |
CrowdStrike | win/malicious_confidence_70% (D) |
alibabacloud | HackTool:Win/Mimikatz.k |