Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 08:00
Static task
static1
Behavioral task
behavioral1
Sample
folderpro.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
folderpro.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20240226-en
General
-
Target
folderpro.exe
-
Size
919KB
-
MD5
78c015b4b4ee3091b0caff110e738e9d
-
SHA1
3495c55294a7b214e557d023a5bbe95106300643
-
SHA256
ef740068422d64a60abc31750614f2881d3e6b04ab46e69fbefabbbd23399556
-
SHA512
0ec85b0d3c327dde04870fb5a6e2554da66a0f786c684aec0baa125fa06b44594f853e153fec1fb511a848547feccf7c2264fee5d871ccc43c2443cfaada81be
-
SSDEEP
24576:7I39dOpYHtge6N0wtUH40et6XNA15UrMV:76dO6Htgec0wCH4059E5UrM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2520 is-3UP44.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3956 wrote to memory of 2520 3956 folderpro.exe 87 PID 3956 wrote to memory of 2520 3956 folderpro.exe 87 PID 3956 wrote to memory of 2520 3956 folderpro.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\folderpro.exe"C:\Users\Admin\AppData\Local\Temp\folderpro.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\is-CSIAE.tmp\is-3UP44.tmp"C:\Users\Admin\AppData\Local\Temp\is-CSIAE.tmp\is-3UP44.tmp" /SL4 $A01DA "C:\Users\Admin\AppData\Local\Temp\folderpro.exe" 704698 522242⤵
- Executes dropped EXE
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
635KB
MD55ba571eb89bacef396539841970711b0
SHA1f51e65174a43784710cc2b03a5129f21f3578644
SHA256440f88196d6586d81917097b39bfb98bf338afc24116434de0c25c356e2d7452
SHA512ee46d826d1da230f75ec2e2d96ad1aa918a7f71f530422ee58cc4c50272fce08950eceadd52b103937b36039af44ce1cadeb9d6a1c8eeecdf6e8d07274471a54