Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 05:33
Static task
static1
Behavioral task
behavioral1
Sample
HA_Amond2iPhone2.4_LRH.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
HA_Amond2iPhone2.4_LRH.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20231215-en
General
-
Target
HA_Amond2iPhone2.4_LRH.exe
-
Size
5.0MB
-
MD5
a30c5fe88d4811269d36bda2209fc582
-
SHA1
dd9a15f0d272347fc9c6c4324e82fa9c28356671
-
SHA256
ae34c40db887332b28668aea2de2a9eb0336dfaee7efbfed1ebb85aaa306bc9f
-
SHA512
fc3d5753fc0e22536bc7bcacf7eb3e2384ea658712efc5fff7120740a8a5a57717d6bae71fc9c1037889a6d49ec50d62028ce86f458d7442bab40425a21971a8
-
SSDEEP
98304:8g4a3GJBIjrkk+gVjKoUZ9Db6IYjGBCujoeYliwUCXLRpcxSv+WhEqdaj/gXdn96:4a3nrkk+YjEP5oyr8ZMKR1hbIj/gXoj
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 5636 HA_Amond2iPhone2.4_LRH.exe 5636 HA_Amond2iPhone2.4_LRH.exe 5636 HA_Amond2iPhone2.4_LRH.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 400 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HA_Amond2iPhone2.4_LRH.exe"C:\Users\Admin\AppData\Local\Temp\HA_Amond2iPhone2.4_LRH.exe"1⤵
- Loads dropped DLL
PID:5636
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3668
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59c3488b5e9655d1837c3963ecec33f70
SHA1f0fa9b4c29e75c6e4419c4633d09f2797aee2ef3
SHA25605ef4beb7fab9d04c1fb251874166fa2d73a34b4a7f2b145d37a2fd00c88979a
SHA5126af9f88d65d2279a71620f2a656062b1737b3a9a1692ed4e5887bdee891ce08d21c5c0b25ab3acbe6da9fe255dcd7f8a517c2751e73dc56add216740c945e4a7
-
Filesize
14KB
MD599a01229bfad8d31bf0ccf636f993393
SHA1699c225ac447723d20bb786d18f4c95f5fd8951c
SHA25658b6827090451254627c340ddc941cfdd87930606e3859bd29495ece878ca115
SHA512bbf78a03004347cae25fab552e846dfd4873b39a2cc3613bc05a328a5a6cff026b13fa0653d3607197faccbabd4a9d97df2948bcf2ef5414e7d08cdfad6bbe15
-
Filesize
680B
MD5a979ca958afb50c6a397bcbee0e2c2d6
SHA15aadb65027822e1155ecf8f35a00633ec7ab222b
SHA256f05231bffbcbe87d5576fff45b896251d28078cd6df3ff513736f73d9462f96d
SHA512ce761f627e91b7c3c6049c234bba5d08e9d24c6d6e643161f9de502f3fa8284d3d4b07f30db20224e9b5fb722840d9c928ca2636d2161da9b5b1ff172196fb8d