Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 11:41
Static task
static1
Behavioral task
behavioral1
Sample
HA_MojoPac_1010_SZL.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
HA_MojoPac_1010_SZL.exe
Resource
win10v2004-20240508-en
General
-
Target
HA_MojoPac_1010_SZL.exe
-
Size
11.0MB
-
MD5
e5cff22c05e81e00678c225167648f49
-
SHA1
c211c4251ff13dfbc4e677189aa56a29d48c7c64
-
SHA256
cf553fb9f858c50a5971df5feb567494edf028d9e34174f2b69bc8de4c7419e1
-
SHA512
3de16c10bc7f470d18799805328494942eaff077db3f5c751465b0801cb26042b029b2b25991e8fd8221c5e26c6871f3e10cbee657b5957e4f065bac34a5b2d8
-
SSDEEP
196608:5NH8Ncx9OXYmjBOKXMqU5vBEV2ztnFCGZC5d2jZdX9axwwOmxhFd98NX5lO:5NcNc/OImjQvqU5BK6rC9d2jZdXCwwOu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1928 is-GC9LH.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2604 wrote to memory of 1928 2604 HA_MojoPac_1010_SZL.exe 81 PID 2604 wrote to memory of 1928 2604 HA_MojoPac_1010_SZL.exe 81 PID 2604 wrote to memory of 1928 2604 HA_MojoPac_1010_SZL.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\HA_MojoPac_1010_SZL.exe"C:\Users\Admin\AppData\Local\Temp\HA_MojoPac_1010_SZL.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\is-5UQKN.tmp\is-GC9LH.tmp"C:\Users\Admin\AppData\Local\Temp\is-5UQKN.tmp\is-GC9LH.tmp" /SL4 $C0054 "C:\Users\Admin\AppData\Local\Temp\HA_MojoPac_1010_SZL.exe" 11257581 522242⤵
- Executes dropped EXE
PID:1928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
635KB
MD5f64f3e435c3a29249e99ec0ce5f46e5d
SHA10e59cb1364db9a1e7be0cb5f94da71d5ebf751c6
SHA25679377ebd3a92563b382c32abcdb64001d610f1627d335661062cf42d41bd10a8
SHA51290ca96ea4b48350be496099cc22a00de57d567677795cac9118d6b91015121ee3e93506f05367b9361a77f24fe0d259149e739fc9051c43912ccb6e587aca3c6