Overview
overview
10Static
static
10Spy Note 6...pi.dll
windows7-x64
1Spy Note 6...pi.dll
windows10-2004-x64
1Spy Note 6...SM.dll
windows7-x64
1Spy Note 6...SM.dll
windows10-2004-x64
1Spy Note 6...SL.exe
windows7-x64
1Spy Note 6...SL.exe
windows10-2004-x64
1Spy Note 6...ub.apk
android-9-x86
Spy Note 6...ub.apk
android-10-x64
Spy Note 6...ub.apk
android-11-x64
Spy Note 6...va.jar
windows7-x64
1Spy Note 6...va.jar
windows10-2004-x64
7Spy Note 6...sS.exe
windows7-x64
1Spy Note 6...sS.exe
windows10-2004-x64
1Spy Note 6...in.exe
windows7-x64
1Spy Note 6...in.exe
windows10-2004-x64
1Spy Note 6...ed.exe
windows7-x64
1Spy Note 6...ed.exe
windows10-2004-x64
1Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2024 15:37
Behavioral task
behavioral1
Sample
Spy Note 6.4/CoreAudioApi.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Spy Note 6.4/CoreAudioApi.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Spy Note 6.4/Resources/Imports/Gsm/GSM.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Spy Note 6.4/Resources/Imports/Gsm/GSM.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Spy Note 6.4/Resources/Imports/Payload/SL.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Spy Note 6.4/Resources/Imports/Payload/SL.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Spy Note 6.4/Resources/Imports/Payload/stub.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral8
Sample
Spy Note 6.4/Resources/Imports/Payload/stub.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral9
Sample
Spy Note 6.4/Resources/Imports/Payload/stub.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral10
Sample
Spy Note 6.4/Resources/Imports/PlayerJava/PlayerJava.jar
Resource
win7-20231215-en
Behavioral task
behavioral11
Sample
Spy Note 6.4/Resources/Imports/PlayerJava/PlayerJava.jar
Resource
win10v2004-20231222-en
Behavioral task
behavioral12
Sample
Spy Note 6.4/Resources/Imports/T/sS.exe
Resource
win7-20231129-en
Behavioral task
behavioral13
Sample
Spy Note 6.4/Resources/Imports/T/sS.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral14
Sample
Spy Note 6.4/Resources/Imports/platform-tools/plwin.exe
Resource
win7-20231215-en
Behavioral task
behavioral15
Sample
Spy Note 6.4/Resources/Imports/platform-tools/plwin.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral16
Sample
Spy Note 6.4/SpyNote Cracked.exe
Resource
win7-20231215-en
Behavioral task
behavioral17
Sample
Spy Note 6.4/SpyNote Cracked.exe
Resource
win10v2004-20231222-en
General
-
Target
Spy Note 6.4/Resources/Imports/PlayerJava/PlayerJava.jar
-
Size
3KB
-
MD5
d9c23d7574c0d886321dcd029e463f2c
-
SHA1
7fad47eb6860a01325c6d526a43d9bbadb66aff7
-
SHA256
e22d8a06415f21b900a9a079a6a7928d6c84d2cf33aa07c6ad385dfbbfcd55ed
-
SHA512
c32c019fb0bacbd70441cf3ed769bfde9597389f840ff8511db36586756382ef22bd163a7b7cb9e258a4b7a896e5d1a606d92513a141cb2e3c6e421a66ecb316
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
java.exedescription pid process target process PID 3596 wrote to memory of 1100 3596 java.exe icacls.exe PID 3596 wrote to memory of 1100 3596 java.exe icacls.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\Spy Note 6.4\Resources\Imports\PlayerJava\PlayerJava.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:1100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestampFilesize
46B
MD574c9937adfb908aae72bea2eb2d3f433
SHA1713ec815122f55bd4574bbe987002e3c11a86cc2
SHA256de90ab767e99972fbc01c4f6ceb25f940ba2c7b3a18fc0592ffc82f302b9047b
SHA5120a77e5c1620ed8ac51e66a97ea2dd86d5a1d065b7b1ff2e2c4c6f696ad5f37f2d987823350067fdcc95ebf9ce750d94f054ed34c6f3335521b03246c7e043e26
-
memory/3596-4-0x000001C3BE590000-0x000001C3BF590000-memory.dmpFilesize
16.0MB
-
memory/3596-13-0x000001C3BCD00000-0x000001C3BCD01000-memory.dmpFilesize
4KB