Overview
overview
6Static
static
1SpyNote_v....ib.dll
windows10-2004-x64
1SpyNote_v....pi.dll
windows10-2004-x64
1SpyNote_v....ip.dll
windows10-2004-x64
1SpyNote_v....lse.js
windows10-2004-x64
1SpyNote_v....rue.js
windows10-2004-x64
1SpyNote_v....go.jpg
windows10-2004-x64
3SpyNote_v....SM.dll
windows10-2004-x64
1SpyNote_v....ub.exe
windows10-2004-x64
1SpyNote_v....ib.dll
windows10-2004-x64
1SpyNote_v....il.dll
windows10-2004-x64
1SpyNote_v....am.dll
windows10-2004-x64
1SpyNote_v....ec.dll
windows10-2004-x64
1SpyNote_v.... G.exe
windows10-2004-x64
6Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
SpyNote_v.8.6_G/SpyNote_v.8.6_G/AxInterop.WMPLib.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
SpyNote_v.8.6_G/SpyNote_v.8.6_G/CoreAudioApi.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
SpyNote_v.8.6_G/SpyNote_v.8.6_G/DotNetZip.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
SpyNote_v.8.6_G/SpyNote_v.8.6_G/Icons/Battery/b60false.js
Resource
win10v2004-20230221-en
Behavioral task
behavioral5
Sample
SpyNote_v.8.6_G/SpyNote_v.8.6_G/Icons/Battery/b60true.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
SpyNote_v.8.6_G/SpyNote_v.8.6_G/Icons/Logo/Logo.jpg
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
SpyNote_v.8.6_G/SpyNote_v.8.6_G/Imports/Gsm/GSM.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
SpyNote_v.8.6_G/SpyNote_v.8.6_G/Imports/stub.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
SpyNote_v.8.6_G/SpyNote_v.8.6_G/Interop.WMPLib.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
SpyNote_v.8.6_G/SpyNote_v.8.6_G/Plugin/Mono.Cecil.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
SpyNote_v.8.6_G/SpyNote_v.8.6_G/Plugin/cam.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
SpyNote_v.8.6_G/SpyNote_v.8.6_G/Plugin/rec.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral13
Sample
SpyNote_v.8.6_G/SpyNote_v.8.6_G/SpyNote v.8.6 G.exe
Resource
win10v2004-20230220-en
General
-
Target
SpyNote_v.8.6_G/SpyNote_v.8.6_G/SpyNote v.8.6 G.exe
-
Size
1.9MB
-
MD5
f718011bd5c43003623406e2bb605314
-
SHA1
c26a4f36cf93a58e5395c686184b8c2dae79b6ad
-
SHA256
824418a3fef8efa294e020aef3fb92787df0789d56da88486d6f156d5c0acdbd
-
SHA512
0595b0f1fe26b91a24cc6fab55bfd191e6244e1f29faa2c957f00aafcc8350a2630e606476657f3d763fccf7a98a10362051c1fde3e4effdba496db0e3058e6b
-
SSDEEP
24576:eUioaz+51akJrdQSxvLEGp5E8DF1OvA9iB6QjHXoRoxqEEMW60peN7NhfKOSCTBy:eV+V/p5EXvKiXg4RNhSvCTBpkP
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: SpyNote v.8.6 G.exe File opened (read-only) \??\E: SpyNote v.8.6 G.exe File opened (read-only) \??\P: SpyNote v.8.6 G.exe File opened (read-only) \??\W: SpyNote v.8.6 G.exe File opened (read-only) \??\Z: SpyNote v.8.6 G.exe File opened (read-only) \??\A: SpyNote v.8.6 G.exe File opened (read-only) \??\I: SpyNote v.8.6 G.exe File opened (read-only) \??\L: SpyNote v.8.6 G.exe File opened (read-only) \??\M: SpyNote v.8.6 G.exe File opened (read-only) \??\N: SpyNote v.8.6 G.exe File opened (read-only) \??\S: SpyNote v.8.6 G.exe File opened (read-only) \??\T: SpyNote v.8.6 G.exe File opened (read-only) \??\H: SpyNote v.8.6 G.exe File opened (read-only) \??\G: SpyNote v.8.6 G.exe File opened (read-only) \??\K: SpyNote v.8.6 G.exe File opened (read-only) \??\O: SpyNote v.8.6 G.exe File opened (read-only) \??\R: SpyNote v.8.6 G.exe File opened (read-only) \??\U: SpyNote v.8.6 G.exe File opened (read-only) \??\Y: SpyNote v.8.6 G.exe File opened (read-only) \??\F: SpyNote v.8.6 G.exe File opened (read-only) \??\Q: SpyNote v.8.6 G.exe File opened (read-only) \??\V: SpyNote v.8.6 G.exe File opened (read-only) \??\X: SpyNote v.8.6 G.exe File opened (read-only) \??\J: SpyNote v.8.6 G.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor SpyNote v.8.6 G.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor SpyNote v.8.6 G.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SpyNote v.8.6 G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SpyNote v.8.6 G.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1529757233-3489015626-3409890339-1000\{1F1B5C7C-DF46-4299-BCF7-04CD759EC76F} SpyNote v.8.6 G.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1529757233-3489015626-3409890339-1000\{95A16E12-9F24-467D-8809-68B3292851CF} SpyNote v.8.6 G.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5048 SpyNote v.8.6 G.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 5048 SpyNote v.8.6 G.exe Token: SeShutdownPrivilege 5048 SpyNote v.8.6 G.exe Token: SeCreatePagefilePrivilege 5048 SpyNote v.8.6 G.exe Token: 33 2636 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2636 AUDIODG.EXE Token: SeShutdownPrivilege 5048 SpyNote v.8.6 G.exe Token: SeCreatePagefilePrivilege 5048 SpyNote v.8.6 G.exe Token: SeShutdownPrivilege 5048 SpyNote v.8.6 G.exe Token: SeCreatePagefilePrivilege 5048 SpyNote v.8.6 G.exe Token: SeShutdownPrivilege 5048 SpyNote v.8.6 G.exe Token: SeCreatePagefilePrivilege 5048 SpyNote v.8.6 G.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 5048 SpyNote v.8.6 G.exe 5048 SpyNote v.8.6 G.exe 5048 SpyNote v.8.6 G.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 5048 SpyNote v.8.6 G.exe 5048 SpyNote v.8.6 G.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SpyNote_v.8.6_G\SpyNote_v.8.6_G\SpyNote v.8.6 G.exe"C:\Users\Admin\AppData\Local\Temp\SpyNote_v.8.6_G\SpyNote_v.8.6_G\SpyNote v.8.6 G.exe"1⤵
- Enumerates connected drives
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5048
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3cc 0x2b41⤵
- Suspicious use of AdjustPrivilegeToken
PID:2636
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5ab57d6576bac817e24e09b125a2fc42f
SHA10fbec340b8ec1256b89d115f2598853a281312ba
SHA2561f85be4464de03096c5272ec692fb71cd9f0f6ac485c4f47a984513b3990c5ac
SHA512d3d1077369971f56eae10b2737552e93658df660fa06b627606c2ee5c8cbff2d0247401ff259d95ce1bc6757e79d869a7acc3bbcf1eadc1a1eaafc9be4d17faa
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b