Overview
overview
10Static
static
10Spy Note 6...pi.dll
windows7-x64
1Spy Note 6...pi.dll
windows10-2004-x64
1Spy Note 6...SM.dll
windows7-x64
1Spy Note 6...SM.dll
windows10-2004-x64
1Spy Note 6...SL.exe
windows7-x64
1Spy Note 6...SL.exe
windows10-2004-x64
1Spy Note 6...ub.apk
android-9-x86
Spy Note 6...ub.apk
android-10-x64
Spy Note 6...ub.apk
android-11-x64
Spy Note 6...va.jar
windows7-x64
1Spy Note 6...va.jar
windows10-2004-x64
7Spy Note 6...sS.exe
windows7-x64
1Spy Note 6...sS.exe
windows10-2004-x64
1Spy Note 6...in.exe
windows7-x64
1Spy Note 6...in.exe
windows10-2004-x64
1Spy Note 6...ed.exe
windows7-x64
1Spy Note 6...ed.exe
windows10-2004-x64
1Spy Note 6...er.apk
android-9-x86
Spy Note 6...er.apk
android-10-x64
Spy Note 6...er.apk
android-11-x64
Analysis
-
max time kernel
92s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2024 15:23
Behavioral task
behavioral1
Sample
Spy Note 6.4/CoreAudioApi.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Spy Note 6.4/CoreAudioApi.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
Spy Note 6.4/Resources/Imports/Gsm/GSM.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Spy Note 6.4/Resources/Imports/Gsm/GSM.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Spy Note 6.4/Resources/Imports/Payload/SL.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Spy Note 6.4/Resources/Imports/Payload/SL.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
Spy Note 6.4/Resources/Imports/Payload/stub.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral8
Sample
Spy Note 6.4/Resources/Imports/Payload/stub.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral9
Sample
Spy Note 6.4/Resources/Imports/Payload/stub.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral10
Sample
Spy Note 6.4/Resources/Imports/PlayerJava/PlayerJava.jar
Resource
win7-20231215-en
Behavioral task
behavioral11
Sample
Spy Note 6.4/Resources/Imports/PlayerJava/PlayerJava.jar
Resource
win10v2004-20231215-en
Behavioral task
behavioral12
Sample
Spy Note 6.4/Resources/Imports/T/sS.exe
Resource
win7-20231215-en
Behavioral task
behavioral13
Sample
Spy Note 6.4/Resources/Imports/T/sS.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral14
Sample
Spy Note 6.4/Resources/Imports/platform-tools/plwin.exe
Resource
win7-20231215-en
Behavioral task
behavioral15
Sample
Spy Note 6.4/Resources/Imports/platform-tools/plwin.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral16
Sample
Spy Note 6.4/SpyNote Cracked.exe
Resource
win7-20231215-en
Behavioral task
behavioral17
Sample
Spy Note 6.4/SpyNote Cracked.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral18
Sample
Spy Note 6.4/Weather.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral19
Sample
Spy Note 6.4/Weather.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral20
Sample
Spy Note 6.4/Weather.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
Spy Note 6.4/Resources/Imports/PlayerJava/PlayerJava.jar
-
Size
3KB
-
MD5
d9c23d7574c0d886321dcd029e463f2c
-
SHA1
7fad47eb6860a01325c6d526a43d9bbadb66aff7
-
SHA256
e22d8a06415f21b900a9a079a6a7928d6c84d2cf33aa07c6ad385dfbbfcd55ed
-
SHA512
c32c019fb0bacbd70441cf3ed769bfde9597389f840ff8511db36586756382ef22bd163a7b7cb9e258a4b7a896e5d1a606d92513a141cb2e3c6e421a66ecb316
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
java.exedescription pid process target process PID 4920 wrote to memory of 4276 4920 java.exe icacls.exe PID 4920 wrote to memory of 4276 4920 java.exe icacls.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\Spy Note 6.4\Resources\Imports\PlayerJava\PlayerJava.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:4276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5425bee3211d1c4a98504040aaf81005f
SHA1c7e88a9fd905b060a01ce85efd1597cd198ad880
SHA2567251f07cc7556ce487cd0c1bb169343f878c600460cc3537ebbb320452ed2fa2
SHA512c9ec6474c7be27205aeae8e66a7a6f7312b30f6e18743d31649888598bd7e54e9bce8e8f986b06dbeff3abf86dcef0d688d3d7ab801e8913bec36fa92b38320c