Resubmissions

09-05-2024 11:45

240509-nw3evaae24 1

09-05-2024 11:42

240509-nvex6aac95 1

09-05-2024 11:37

240509-nrlxasfe2z 1

Analysis

  • max time kernel
    1381s
  • max time network
    1165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 11:45

General

  • Target

    PopulateDeviceDetails.exe

  • Size

    5.6MB

  • MD5

    415aa45d98a005949a833cab186c5983

  • SHA1

    28f466c25c12f2be565a0537184c9bfd29558ff1

  • SHA256

    78b8d2108491beb28f10f1cc87f0ab4b7cf5584017107b56f7a4c1dd6d387922

  • SHA512

    d9fe63f0f9e89387a7f68f145d77e337a86d2b81fb4c3ca2e931c960d01e9a633e5c3980bf69427b9daac23361760c2835b539fa20d88a084499a36e51c173ce

  • SSDEEP

    49152:L8vOPBiznLpUf1kVyp/ORLerS/3K1gIwunV7GmOVm9gRhvbIaWnmdxTPZrhDFEBF:uHmRsK13DlDSb1+ku9M6IjGr4ty

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 30 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PopulateDeviceDetails.exe
    "C:\Users\Admin\AppData\Local\Temp\PopulateDeviceDetails.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c pause
      2⤵
        PID:4508

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads