Overview
overview
10Static
static
10SpyMax 4.0...26.apk
windows11-21h2-x64
3SpyMax 4.0...28.apk
windows11-21h2-x64
3SpyMax 4.0....0.exe
windows11-21h2-x64
1SpyMax 4.0...et.dll
windows11-21h2-x64
1SpyMax 4.0...ld.exe
windows11-21h2-x64
1SpyMax 4.0...SM.dll
windows11-21h2-x64
1platformBi...32.dll
windows11-21h2-x64
1platformBi...ge.dll
windows11-21h2-x64
1platformBi...32.dll
windows11-21h2-x64
1platformBi...ge.dll
windows11-21h2-x64
1platformBi...32.dll
windows11-21h2-x64
3platformBi...ge.dll
windows11-21h2-x64
3platformBi...ol.bat
windows11-21h2-x64
1platformBi...ol.jar
windows11-21h2-x64
7platformBi...ch.dll
windows11-21h2-x64
1platformBi...wt.dll
windows11-21h2-x64
1platformBi...db.exe
windows11-21h2-x64
1platformBi...vm.dll
windows11-21h2-x64
3platformBi...em.dll
windows11-21h2-x64
3platformBi...et.dll
windows11-21h2-x64
1platformBi...er.dll
windows11-21h2-x64
1platformBi...pe.dll
windows11-21h2-x64
3platformBi...of.dll
windows11-21h2-x64
3platformBi...db.exe
windows11-21h2-x64
1SpyMax 4.0...n-1.pl
windows11-21h2-x64
3SpyMax 4.0...n-2.pl
windows11-21h2-x64
3SpyMax 4.0...n-3.pl
windows11-21h2-x64
3SpyMax 4.0...n-4.pl
windows11-21h2-x64
3SpyMax 4.0...n-5.pl
windows11-21h2-x64
3SpyMax 4.0...n-6.pl
windows11-21h2-x64
3SpyMax 4.0...n-7.pl
windows11-21h2-x64
3SpyMax 4.0...n-8.pl
windows11-21h2-x64
3Analysis
-
max time kernel
89s -
max time network
93s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-04-2024 09:47
Behavioral task
behavioral1
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/PATCH-SDK26.apk
Resource
win11-20240412-en
Behavioral task
behavioral2
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/PATCH-SDK28.apk
Resource
win11-20240412-en
Behavioral task
behavioral3
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/SpyMax 4.0.exe
Resource
win11-20240412-en
Behavioral task
behavioral4
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/WinMM.Net.dll
Resource
win11-20240412-en
Behavioral task
behavioral5
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Lib/Build.exe
Resource
win11-20240412-en
Behavioral task
behavioral6
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Lib/LibGSM.dll
Resource
win11-20240412-en
Behavioral task
behavioral7
Sample
platformBinary32/bin/JAWTAccessBridge-32.dll
Resource
win11-20240412-en
Behavioral task
behavioral8
Sample
platformBinary32/bin/JAWTAccessBridge.dll
Resource
win11-20240412-en
Behavioral task
behavioral9
Sample
platformBinary32/bin/JavaAccessBridge-32.dll
Resource
win11-20240412-en
Behavioral task
behavioral10
Sample
platformBinary32/bin/JavaAccessBridge.dll
Resource
win11-20240412-en
Behavioral task
behavioral11
Sample
platformBinary32/bin/WindowsAccessBridge-32.dll
Resource
win11-20240412-en
Behavioral task
behavioral12
Sample
platformBinary32/bin/WindowsAccessBridge.dll
Resource
win11-20240412-en
Behavioral task
behavioral13
Sample
platformBinary32/bin/apktool.bat
Resource
win11-20240412-en
Behavioral task
behavioral14
Sample
platformBinary32/bin/apktool.jar
Resource
win11-20240412-en
Behavioral task
behavioral15
Sample
platformBinary32/bin/attach.dll
Resource
win11-20240412-en
Behavioral task
behavioral16
Sample
platformBinary32/bin/awt.dll
Resource
win11-20240412-en
Behavioral task
behavioral17
Sample
platformBinary32/bin/clhsdb.exe
Resource
win11-20240412-en
Behavioral task
behavioral18
Sample
platformBinary32/bin/client/jvm.dll
Resource
win11-20240412-en
Behavioral task
behavioral19
Sample
platformBinary32/bin/dt_shmem.dll
Resource
win11-20240412-en
Behavioral task
behavioral20
Sample
platformBinary32/bin/dt_socket.dll
Resource
win11-20240412-en
Behavioral task
behavioral21
Sample
platformBinary32/bin/fontmanager.dll
Resource
win11-20240412-en
Behavioral task
behavioral22
Sample
platformBinary32/bin/freetype.dll
Resource
win11-20240412-en
Behavioral task
behavioral23
Sample
platformBinary32/bin/hprof.dll
Resource
win11-20240412-en
Behavioral task
behavioral24
Sample
platformBinary32/bin/hsdb.exe
Resource
win11-20240412-en
Behavioral task
behavioral25
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-1.pl
Resource
win11-20240412-en
Behavioral task
behavioral26
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-2.pl
Resource
win11-20240412-en
Behavioral task
behavioral27
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-3.pl
Resource
win11-20240412-en
Behavioral task
behavioral28
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-4.pl
Resource
win11-20240412-en
Behavioral task
behavioral29
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-5.pl
Resource
win11-20240412-en
Behavioral task
behavioral30
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-6.pl
Resource
win11-20240412-en
Behavioral task
behavioral31
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-7.pl
Resource
win11-20240412-en
Behavioral task
behavioral32
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-8.pl
Resource
win11-20240412-en
General
-
Target
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/PATCH-SDK26.apk
-
Size
28KB
-
MD5
ac7e3b5bcd591fe15bf2c5aa43f389a8
-
SHA1
9bfb12f6b99c9d7e80123c224a3c0d89fede5c58
-
SHA256
cde47bed5ec83e29f6455ec35228c3f56d488393668f5b720b79fcd6cb3bc098
-
SHA512
a17dfaaf85f7347772981b91bbaa7c117d38d18213b2dec8e37f62a7fc5516002e0705e54b243df46ec96e4d998ef6fb58d5a1bbdb9a9a9a546012c53fe36efe
-
SSDEEP
768:T7qKKd3PyfFrT2GJxeEUaDWD2RKFCl3fp66/YzL:T4P8eGJxOaDJ66/YzL
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-801765966-3955847401-2235691403-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-801765966-3955847401-2235691403-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4324 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\SpyMax 4.0 - DenQewPie\SpyMax 4.0 - THTlllroselll\PATCH-SDK26.apk"1⤵
- Modifies registry class
PID:4704
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4324