Overview
overview
10Static
static
10SpyMax 4.0...26.apk
windows11-21h2-x64
3SpyMax 4.0...28.apk
windows11-21h2-x64
3SpyMax 4.0....0.exe
windows11-21h2-x64
1SpyMax 4.0...et.dll
windows11-21h2-x64
1SpyMax 4.0...ld.exe
windows11-21h2-x64
1SpyMax 4.0...SM.dll
windows11-21h2-x64
1platformBi...32.dll
windows11-21h2-x64
1platformBi...ge.dll
windows11-21h2-x64
1platformBi...32.dll
windows11-21h2-x64
1platformBi...ge.dll
windows11-21h2-x64
1platformBi...32.dll
windows11-21h2-x64
3platformBi...ge.dll
windows11-21h2-x64
3platformBi...ol.bat
windows11-21h2-x64
1platformBi...ol.jar
windows11-21h2-x64
7platformBi...ch.dll
windows11-21h2-x64
1platformBi...wt.dll
windows11-21h2-x64
1platformBi...db.exe
windows11-21h2-x64
1platformBi...vm.dll
windows11-21h2-x64
3platformBi...em.dll
windows11-21h2-x64
3platformBi...et.dll
windows11-21h2-x64
1platformBi...er.dll
windows11-21h2-x64
1platformBi...pe.dll
windows11-21h2-x64
3platformBi...of.dll
windows11-21h2-x64
3platformBi...db.exe
windows11-21h2-x64
1SpyMax 4.0...n-1.pl
windows11-21h2-x64
3SpyMax 4.0...n-2.pl
windows11-21h2-x64
3SpyMax 4.0...n-3.pl
windows11-21h2-x64
3SpyMax 4.0...n-4.pl
windows11-21h2-x64
3SpyMax 4.0...n-5.pl
windows11-21h2-x64
3SpyMax 4.0...n-6.pl
windows11-21h2-x64
3SpyMax 4.0...n-7.pl
windows11-21h2-x64
3SpyMax 4.0...n-8.pl
windows11-21h2-x64
3Analysis
-
max time kernel
143s -
max time network
160s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-04-2024 09:47
Behavioral task
behavioral1
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/PATCH-SDK26.apk
Resource
win11-20240412-en
Behavioral task
behavioral2
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/PATCH-SDK28.apk
Resource
win11-20240412-en
Behavioral task
behavioral3
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/SpyMax 4.0.exe
Resource
win11-20240412-en
Behavioral task
behavioral4
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/WinMM.Net.dll
Resource
win11-20240412-en
Behavioral task
behavioral5
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Lib/Build.exe
Resource
win11-20240412-en
Behavioral task
behavioral6
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Lib/LibGSM.dll
Resource
win11-20240412-en
Behavioral task
behavioral7
Sample
platformBinary32/bin/JAWTAccessBridge-32.dll
Resource
win11-20240412-en
Behavioral task
behavioral8
Sample
platformBinary32/bin/JAWTAccessBridge.dll
Resource
win11-20240412-en
Behavioral task
behavioral9
Sample
platformBinary32/bin/JavaAccessBridge-32.dll
Resource
win11-20240412-en
Behavioral task
behavioral10
Sample
platformBinary32/bin/JavaAccessBridge.dll
Resource
win11-20240412-en
Behavioral task
behavioral11
Sample
platformBinary32/bin/WindowsAccessBridge-32.dll
Resource
win11-20240412-en
Behavioral task
behavioral12
Sample
platformBinary32/bin/WindowsAccessBridge.dll
Resource
win11-20240412-en
Behavioral task
behavioral13
Sample
platformBinary32/bin/apktool.bat
Resource
win11-20240412-en
Behavioral task
behavioral14
Sample
platformBinary32/bin/apktool.jar
Resource
win11-20240412-en
Behavioral task
behavioral15
Sample
platformBinary32/bin/attach.dll
Resource
win11-20240412-en
Behavioral task
behavioral16
Sample
platformBinary32/bin/awt.dll
Resource
win11-20240412-en
Behavioral task
behavioral17
Sample
platformBinary32/bin/clhsdb.exe
Resource
win11-20240412-en
Behavioral task
behavioral18
Sample
platformBinary32/bin/client/jvm.dll
Resource
win11-20240412-en
Behavioral task
behavioral19
Sample
platformBinary32/bin/dt_shmem.dll
Resource
win11-20240412-en
Behavioral task
behavioral20
Sample
platformBinary32/bin/dt_socket.dll
Resource
win11-20240412-en
Behavioral task
behavioral21
Sample
platformBinary32/bin/fontmanager.dll
Resource
win11-20240412-en
Behavioral task
behavioral22
Sample
platformBinary32/bin/freetype.dll
Resource
win11-20240412-en
Behavioral task
behavioral23
Sample
platformBinary32/bin/hprof.dll
Resource
win11-20240412-en
Behavioral task
behavioral24
Sample
platformBinary32/bin/hsdb.exe
Resource
win11-20240412-en
Behavioral task
behavioral25
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-1.pl
Resource
win11-20240412-en
Behavioral task
behavioral26
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-2.pl
Resource
win11-20240412-en
Behavioral task
behavioral27
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-3.pl
Resource
win11-20240412-en
Behavioral task
behavioral28
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-4.pl
Resource
win11-20240412-en
Behavioral task
behavioral29
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-5.pl
Resource
win11-20240412-en
Behavioral task
behavioral30
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-6.pl
Resource
win11-20240412-en
Behavioral task
behavioral31
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-7.pl
Resource
win11-20240412-en
Behavioral task
behavioral32
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-8.pl
Resource
win11-20240412-en
General
-
Target
platformBinary32/bin/dt_shmem.dll
-
Size
25KB
-
MD5
33990e423774c2e1ef62702f52ba49ce
-
SHA1
20261f7d281bba8de2eb5c21d898597d8a2c585e
-
SHA256
37e78789078575793b9bb8a979c40b055c06a3d620e970558045a097689db6b2
-
SHA512
83ebfd5c10da1b591b7580afc966edf5e8a29fd4e6dcc85014d2a3e21c2db00f9856c5697bf46a2516f6817ecabf5b965077d3ac44076bed19631fa2f2315805
-
SSDEEP
384:x3ZQgxsj7ttBesu6PXu6ZEPG5uvjvt3VDGyonwePnhJ:x3WYsfttX/u6W+aV3VDGyqhJ
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2136 4988 WerFault.exe 77 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 560 wrote to memory of 4988 560 rundll32.exe 77 PID 560 wrote to memory of 4988 560 rundll32.exe 77 PID 560 wrote to memory of 4988 560 rundll32.exe 77
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\platformBinary32\bin\dt_shmem.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\platformBinary32\bin\dt_shmem.dll,#12⤵PID:4988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 4523⤵
- Program crash
PID:2136
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4988 -ip 49881⤵PID:3344