Report - mimikatz.exe

Generic Malware Malicious Library Antivirus UPX PE File PE32 OS Processor Check PowerShell
ScreenShot
Created 2025.02.24 12:06 Machine s1_win7_x6403
Filename mimikatz.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
7.2
ZERO API file : malware
VT API (file)
md5 cc5e97a8a3e9b5dfc2093dde57137b23
sha256 5975948b57707a6f3da15eecf5c53642caaea7ef315273ddf4a71c2530c5c3e4
ssdeep 6144:1Md0LosbeItdFLl6cuOPdvJ9vYXzvcEBORLAOw0XYWT//w:18ueI9l6cuOPdvJ9vg4RLW0Xdw
imphash 731dd1fc6ad7bf433d008a38b5a232d8
impfuzzy 24:QcNzx5srjKW+Mu9QHFxtzjDYc+WZYtaM3JBl39Wu/KOovbOxvJkFZYjMLz8aBMuP:3TixtzQc+eYtaMPpHt3RaFZXBK0i/W
  Network IP location

Signature (19cnts)

Level Description
warning Generates some ICMP traffic
watch Creates a suspicious Powershell process
watch Installs itself for autorun at Windows startup
notice A process attempted to delay the analysis task.
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Drops an executable to the user AppData folder
notice Repeatedly searches for a not-found process
notice Searches running processes potentially to identify processes for sandbox evasion
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info Queries for the computername
info This executable has a PDB path
info Uses Windows APIs to generate a cryptographic key

Rules (15cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Antivirus Contains references to security software binaries (download)
watch Antivirus Contains references to security software binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info PowerShell PowerShell script scripts

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x431024 ReleaseMutex
 0x431028 GetComputerNameExW
 0x43102c OpenProcess
 0x431030 CreateToolhelp32Snapshot
 0x431034 Sleep
 0x431038 GetLastError
 0x43103c GetFileAttributesA
 0x431040 Process32NextW
 0x431044 WaitForSingleObject
 0x431048 CloseHandle
 0x43104c GetCurrentProcessId
 0x431050 CreateProcessW
 0x431054 WideCharToMultiByte
 0x431058 GetComputerNameExA
 0x43105c IsDebuggerPresent
 0x431060 WriteConsoleW
 0x431064 HeapSize
 0x431068 CreateFileW
 0x43106c CreateMutexW
 0x431070 CreatePipe
 0x431074 GetModuleFileNameW
 0x431078 TerminateProcess
 0x43107c GetStdHandle
 0x431080 GetCurrentProcess
 0x431084 SetHandleInformation
 0x431088 Process32FirstW
 0x43108c ReadFile
 0x431090 SetStdHandle
 0x431094 GetProcessHeap
 0x431098 SetEnvironmentVariableW
 0x43109c FreeEnvironmentStringsW
 0x4310a0 GetEnvironmentStringsW
 0x4310a4 MultiByteToWideChar
 0x4310a8 QueryPerformanceCounter
 0x4310ac QueryPerformanceFrequency
 0x4310b0 GetStringTypeW
 0x4310b4 GetCurrentThreadId
 0x4310b8 InitializeCriticalSectionEx
 0x4310bc GetSystemTimeAsFileTime
 0x4310c0 GetModuleHandleW
 0x4310c4 GetProcAddress
 0x4310c8 EnterCriticalSection
 0x4310cc LeaveCriticalSection
 0x4310d0 DeleteCriticalSection
 0x4310d4 EncodePointer
 0x4310d8 DecodePointer
 0x4310dc LCMapStringEx
 0x4310e0 GetCPInfo
 0x4310e4 UnhandledExceptionFilter
 0x4310e8 SetUnhandledExceptionFilter
 0x4310ec IsProcessorFeaturePresent
 0x4310f0 GetStartupInfoW
 0x4310f4 InitializeSListHead
 0x4310f8 RtlUnwind
 0x4310fc RaiseException
 0x431100 SetLastError
 0x431104 InitializeCriticalSectionAndSpinCount
 0x431108 TlsAlloc
 0x43110c TlsGetValue
 0x431110 TlsSetValue
 0x431114 TlsFree
 0x431118 FreeLibrary
 0x43111c LoadLibraryExW
 0x431120 CreateThread
 0x431124 ExitThread
 0x431128 FreeLibraryAndExitThread
 0x43112c GetModuleHandleExW
 0x431130 ExitProcess
 0x431134 WriteFile
 0x431138 GetCommandLineA
 0x43113c GetCommandLineW
 0x431140 GetFileSizeEx
 0x431144 SetFilePointerEx
 0x431148 GetFileType
 0x43114c HeapAlloc
 0x431150 HeapFree
 0x431154 CompareStringW
 0x431158 LCMapStringW
 0x43115c GetLocaleInfoW
 0x431160 IsValidLocale
 0x431164 GetUserDefaultLCID
 0x431168 EnumSystemLocalesW
 0x43116c FlushFileBuffers
 0x431170 GetConsoleCP
 0x431174 GetConsoleMode
 0x431178 ReadConsoleW
 0x43117c HeapReAlloc
 0x431180 FindClose
 0x431184 FindFirstFileExW
 0x431188 FindNextFileW
 0x43118c IsValidCodePage
 0x431190 GetACP
 0x431194 GetOEMCP
USER32.dll
 0x4311a8 wsprintfW
ADVAPI32.dll
 0x431000 AdjustTokenPrivileges
 0x431004 RegCloseKey
 0x431008 RegSetValueExW
 0x43100c OpenProcessToken
 0x431010 RegOpenKeyExW
 0x431014 RegCreateKeyW
 0x431018 RegQueryValueExW
 0x43101c LookupPrivilegeValueW
NETAPI32.dll
 0x43119c DsGetDcNameA
 0x4311a0 NetApiBufferFree

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure