Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 11:41

General

  • Target

    HA_MojoPac_1010_SZL.exe

  • Size

    11.0MB

  • MD5

    e5cff22c05e81e00678c225167648f49

  • SHA1

    c211c4251ff13dfbc4e677189aa56a29d48c7c64

  • SHA256

    cf553fb9f858c50a5971df5feb567494edf028d9e34174f2b69bc8de4c7419e1

  • SHA512

    3de16c10bc7f470d18799805328494942eaff077db3f5c751465b0801cb26042b029b2b25991e8fd8221c5e26c6871f3e10cbee657b5957e4f065bac34a5b2d8

  • SSDEEP

    196608:5NH8Ncx9OXYmjBOKXMqU5vBEV2ztnFCGZC5d2jZdX9axwwOmxhFd98NX5lO:5NcNc/OImjQvqU5BK6rC9d2jZdXCwwOu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HA_MojoPac_1010_SZL.exe
    "C:\Users\Admin\AppData\Local\Temp\HA_MojoPac_1010_SZL.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Users\Admin\AppData\Local\Temp\is-5UQKN.tmp\is-GC9LH.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-5UQKN.tmp\is-GC9LH.tmp" /SL4 $C0054 "C:\Users\Admin\AppData\Local\Temp\HA_MojoPac_1010_SZL.exe" 11257581 52224
      2⤵
      • Executes dropped EXE
      PID:1928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-5UQKN.tmp\is-GC9LH.tmp

    Filesize

    635KB

    MD5

    f64f3e435c3a29249e99ec0ce5f46e5d

    SHA1

    0e59cb1364db9a1e7be0cb5f94da71d5ebf751c6

    SHA256

    79377ebd3a92563b382c32abcdb64001d610f1627d335661062cf42d41bd10a8

    SHA512

    90ca96ea4b48350be496099cc22a00de57d567677795cac9118d6b91015121ee3e93506f05367b9361a77f24fe0d259149e739fc9051c43912ccb6e587aca3c6

  • memory/1928-9-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/1928-13-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2604-0-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2604-2-0x0000000000401000-0x000000000040A000-memory.dmp

    Filesize

    36KB

  • memory/2604-12-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB