Overview
overview
10Static
static
10SpyMax 4.0...26.apk
windows11-21h2-x64
3SpyMax 4.0...28.apk
windows11-21h2-x64
3SpyMax 4.0....0.exe
windows11-21h2-x64
1SpyMax 4.0...et.dll
windows11-21h2-x64
1SpyMax 4.0...ld.exe
windows11-21h2-x64
1SpyMax 4.0...SM.dll
windows11-21h2-x64
1platformBi...32.dll
windows11-21h2-x64
1platformBi...ge.dll
windows11-21h2-x64
1platformBi...32.dll
windows11-21h2-x64
1platformBi...ge.dll
windows11-21h2-x64
1platformBi...32.dll
windows11-21h2-x64
3platformBi...ge.dll
windows11-21h2-x64
3platformBi...ol.bat
windows11-21h2-x64
1platformBi...ol.jar
windows11-21h2-x64
7platformBi...ch.dll
windows11-21h2-x64
1platformBi...wt.dll
windows11-21h2-x64
1platformBi...db.exe
windows11-21h2-x64
1platformBi...vm.dll
windows11-21h2-x64
3platformBi...em.dll
windows11-21h2-x64
3platformBi...et.dll
windows11-21h2-x64
1platformBi...er.dll
windows11-21h2-x64
1platformBi...pe.dll
windows11-21h2-x64
3platformBi...of.dll
windows11-21h2-x64
3platformBi...db.exe
windows11-21h2-x64
1SpyMax 4.0...n-1.pl
windows11-21h2-x64
3SpyMax 4.0...n-2.pl
windows11-21h2-x64
3SpyMax 4.0...n-3.pl
windows11-21h2-x64
3SpyMax 4.0...n-4.pl
windows11-21h2-x64
3SpyMax 4.0...n-5.pl
windows11-21h2-x64
3SpyMax 4.0...n-6.pl
windows11-21h2-x64
3SpyMax 4.0...n-7.pl
windows11-21h2-x64
3SpyMax 4.0...n-8.pl
windows11-21h2-x64
3Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-04-2024 09:47
Behavioral task
behavioral1
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/PATCH-SDK26.apk
Resource
win11-20240412-en
Behavioral task
behavioral2
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/PATCH-SDK28.apk
Resource
win11-20240412-en
Behavioral task
behavioral3
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/SpyMax 4.0.exe
Resource
win11-20240412-en
Behavioral task
behavioral4
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/WinMM.Net.dll
Resource
win11-20240412-en
Behavioral task
behavioral5
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Lib/Build.exe
Resource
win11-20240412-en
Behavioral task
behavioral6
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Lib/LibGSM.dll
Resource
win11-20240412-en
Behavioral task
behavioral7
Sample
platformBinary32/bin/JAWTAccessBridge-32.dll
Resource
win11-20240412-en
Behavioral task
behavioral8
Sample
platformBinary32/bin/JAWTAccessBridge.dll
Resource
win11-20240412-en
Behavioral task
behavioral9
Sample
platformBinary32/bin/JavaAccessBridge-32.dll
Resource
win11-20240412-en
Behavioral task
behavioral10
Sample
platformBinary32/bin/JavaAccessBridge.dll
Resource
win11-20240412-en
Behavioral task
behavioral11
Sample
platformBinary32/bin/WindowsAccessBridge-32.dll
Resource
win11-20240412-en
Behavioral task
behavioral12
Sample
platformBinary32/bin/WindowsAccessBridge.dll
Resource
win11-20240412-en
Behavioral task
behavioral13
Sample
platformBinary32/bin/apktool.bat
Resource
win11-20240412-en
Behavioral task
behavioral14
Sample
platformBinary32/bin/apktool.jar
Resource
win11-20240412-en
Behavioral task
behavioral15
Sample
platformBinary32/bin/attach.dll
Resource
win11-20240412-en
Behavioral task
behavioral16
Sample
platformBinary32/bin/awt.dll
Resource
win11-20240412-en
Behavioral task
behavioral17
Sample
platformBinary32/bin/clhsdb.exe
Resource
win11-20240412-en
Behavioral task
behavioral18
Sample
platformBinary32/bin/client/jvm.dll
Resource
win11-20240412-en
Behavioral task
behavioral19
Sample
platformBinary32/bin/dt_shmem.dll
Resource
win11-20240412-en
Behavioral task
behavioral20
Sample
platformBinary32/bin/dt_socket.dll
Resource
win11-20240412-en
Behavioral task
behavioral21
Sample
platformBinary32/bin/fontmanager.dll
Resource
win11-20240412-en
Behavioral task
behavioral22
Sample
platformBinary32/bin/freetype.dll
Resource
win11-20240412-en
Behavioral task
behavioral23
Sample
platformBinary32/bin/hprof.dll
Resource
win11-20240412-en
Behavioral task
behavioral24
Sample
platformBinary32/bin/hsdb.exe
Resource
win11-20240412-en
Behavioral task
behavioral25
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-1.pl
Resource
win11-20240412-en
Behavioral task
behavioral26
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-2.pl
Resource
win11-20240412-en
Behavioral task
behavioral27
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-3.pl
Resource
win11-20240412-en
Behavioral task
behavioral28
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-4.pl
Resource
win11-20240412-en
Behavioral task
behavioral29
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-5.pl
Resource
win11-20240412-en
Behavioral task
behavioral30
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-6.pl
Resource
win11-20240412-en
Behavioral task
behavioral31
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-7.pl
Resource
win11-20240412-en
Behavioral task
behavioral32
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-8.pl
Resource
win11-20240412-en
General
-
Target
platformBinary32/bin/freetype.dll
-
Size
501KB
-
MD5
84cae47d5baea16f854b7d1d77d406ca
-
SHA1
2586373f18119f33230048f2b97bf6b4d7b81a38
-
SHA256
ac9651655b48c5d5f8236857c2124707c9405149c83963e223d89891a93427d1
-
SHA512
9b1ca654e8b9009ca29375beba892d082f3f2337fa83282d0c155e8a8384b10f81ab4fc2349b33e5645b4417b6c7d931247f94eba77e2201f740367568a45966
-
SSDEEP
6144:JtsMcLi9OyTYBbks+XF8XbA77soR2DDlO3XAX+0oXCxYrMDHVV+arSaWsEWmfDAX:/sMcLi9O1h+r7sNHlAwX6+5kar5fEWmo
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2412 4744 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1404 wrote to memory of 4744 1404 rundll32.exe 81 PID 1404 wrote to memory of 4744 1404 rundll32.exe 81 PID 1404 wrote to memory of 4744 1404 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\platformBinary32\bin\freetype.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\platformBinary32\bin\freetype.dll,#12⤵PID:4744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 4523⤵
- Program crash
PID:2412
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4744 -ip 47441⤵PID:4864