Resubmissions

09/05/2024, 11:45

240509-nw3evaae24 1

09/05/2024, 11:42

240509-nvex6aac95 1

09/05/2024, 11:37

240509-nrlxasfe2z 1

Analysis

  • max time kernel
    119s
  • max time network
    93s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    09/05/2024, 11:42

General

  • Target

    PopulateDeviceDetails.exe

  • Size

    5.6MB

  • MD5

    415aa45d98a005949a833cab186c5983

  • SHA1

    28f466c25c12f2be565a0537184c9bfd29558ff1

  • SHA256

    78b8d2108491beb28f10f1cc87f0ab4b7cf5584017107b56f7a4c1dd6d387922

  • SHA512

    d9fe63f0f9e89387a7f68f145d77e337a86d2b81fb4c3ca2e931c960d01e9a633e5c3980bf69427b9daac23361760c2835b539fa20d88a084499a36e51c173ce

  • SSDEEP

    49152:L8vOPBiznLpUf1kVyp/ORLerS/3K1gIwunV7GmOVm9gRhvbIaWnmdxTPZrhDFEBF:uHmRsK13DlDSb1+ku9M6IjGr4ty

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 30 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PopulateDeviceDetails.exe
    "C:\Users\Admin\AppData\Local\Temp\PopulateDeviceDetails.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of WriteProcessMemory
    PID:1892
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c pause
      2⤵
        PID:4232
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:820

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads