Overview
overview
10Static
static
10SpyMax 4.0...26.apk
windows11-21h2-x64
3SpyMax 4.0...28.apk
windows11-21h2-x64
3SpyMax 4.0....0.exe
windows11-21h2-x64
1SpyMax 4.0...et.dll
windows11-21h2-x64
1SpyMax 4.0...ld.exe
windows11-21h2-x64
1SpyMax 4.0...SM.dll
windows11-21h2-x64
1platformBi...32.dll
windows11-21h2-x64
1platformBi...ge.dll
windows11-21h2-x64
1platformBi...32.dll
windows11-21h2-x64
1platformBi...ge.dll
windows11-21h2-x64
1platformBi...32.dll
windows11-21h2-x64
3platformBi...ge.dll
windows11-21h2-x64
3platformBi...ol.bat
windows11-21h2-x64
1platformBi...ol.jar
windows11-21h2-x64
7platformBi...ch.dll
windows11-21h2-x64
1platformBi...wt.dll
windows11-21h2-x64
1platformBi...db.exe
windows11-21h2-x64
1platformBi...vm.dll
windows11-21h2-x64
3platformBi...em.dll
windows11-21h2-x64
3platformBi...et.dll
windows11-21h2-x64
1platformBi...er.dll
windows11-21h2-x64
1platformBi...pe.dll
windows11-21h2-x64
3platformBi...of.dll
windows11-21h2-x64
3platformBi...db.exe
windows11-21h2-x64
1SpyMax 4.0...n-1.pl
windows11-21h2-x64
3SpyMax 4.0...n-2.pl
windows11-21h2-x64
3SpyMax 4.0...n-3.pl
windows11-21h2-x64
3SpyMax 4.0...n-4.pl
windows11-21h2-x64
3SpyMax 4.0...n-5.pl
windows11-21h2-x64
3SpyMax 4.0...n-6.pl
windows11-21h2-x64
3SpyMax 4.0...n-7.pl
windows11-21h2-x64
3SpyMax 4.0...n-8.pl
windows11-21h2-x64
3Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-04-2024 09:47
Behavioral task
behavioral1
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/PATCH-SDK26.apk
Resource
win11-20240412-en
Behavioral task
behavioral2
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/PATCH-SDK28.apk
Resource
win11-20240412-en
Behavioral task
behavioral3
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/SpyMax 4.0.exe
Resource
win11-20240412-en
Behavioral task
behavioral4
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/WinMM.Net.dll
Resource
win11-20240412-en
Behavioral task
behavioral5
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Lib/Build.exe
Resource
win11-20240412-en
Behavioral task
behavioral6
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Lib/LibGSM.dll
Resource
win11-20240412-en
Behavioral task
behavioral7
Sample
platformBinary32/bin/JAWTAccessBridge-32.dll
Resource
win11-20240412-en
Behavioral task
behavioral8
Sample
platformBinary32/bin/JAWTAccessBridge.dll
Resource
win11-20240412-en
Behavioral task
behavioral9
Sample
platformBinary32/bin/JavaAccessBridge-32.dll
Resource
win11-20240412-en
Behavioral task
behavioral10
Sample
platformBinary32/bin/JavaAccessBridge.dll
Resource
win11-20240412-en
Behavioral task
behavioral11
Sample
platformBinary32/bin/WindowsAccessBridge-32.dll
Resource
win11-20240412-en
Behavioral task
behavioral12
Sample
platformBinary32/bin/WindowsAccessBridge.dll
Resource
win11-20240412-en
Behavioral task
behavioral13
Sample
platformBinary32/bin/apktool.bat
Resource
win11-20240412-en
Behavioral task
behavioral14
Sample
platformBinary32/bin/apktool.jar
Resource
win11-20240412-en
Behavioral task
behavioral15
Sample
platformBinary32/bin/attach.dll
Resource
win11-20240412-en
Behavioral task
behavioral16
Sample
platformBinary32/bin/awt.dll
Resource
win11-20240412-en
Behavioral task
behavioral17
Sample
platformBinary32/bin/clhsdb.exe
Resource
win11-20240412-en
Behavioral task
behavioral18
Sample
platformBinary32/bin/client/jvm.dll
Resource
win11-20240412-en
Behavioral task
behavioral19
Sample
platformBinary32/bin/dt_shmem.dll
Resource
win11-20240412-en
Behavioral task
behavioral20
Sample
platformBinary32/bin/dt_socket.dll
Resource
win11-20240412-en
Behavioral task
behavioral21
Sample
platformBinary32/bin/fontmanager.dll
Resource
win11-20240412-en
Behavioral task
behavioral22
Sample
platformBinary32/bin/freetype.dll
Resource
win11-20240412-en
Behavioral task
behavioral23
Sample
platformBinary32/bin/hprof.dll
Resource
win11-20240412-en
Behavioral task
behavioral24
Sample
platformBinary32/bin/hsdb.exe
Resource
win11-20240412-en
Behavioral task
behavioral25
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-1.pl
Resource
win11-20240412-en
Behavioral task
behavioral26
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-2.pl
Resource
win11-20240412-en
Behavioral task
behavioral27
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-3.pl
Resource
win11-20240412-en
Behavioral task
behavioral28
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-4.pl
Resource
win11-20240412-en
Behavioral task
behavioral29
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-5.pl
Resource
win11-20240412-en
Behavioral task
behavioral30
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-6.pl
Resource
win11-20240412-en
Behavioral task
behavioral31
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-7.pl
Resource
win11-20240412-en
Behavioral task
behavioral32
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-8.pl
Resource
win11-20240412-en
General
-
Target
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-1.pl
-
Size
5KB
-
MD5
210fca93da3cd2aa7aab223b4f6483c9
-
SHA1
153c8c62718162c732eda2b520aa361eed479d83
-
SHA256
74be0a34fa03858f3a80f7a7e0df7359d1a27185de342e5541975e53658eeb55
-
SHA512
d3c3a81a2924be5eb468209d02efa229d5e579b7bc1f8d6cdb5fc5b589888cdd7ec5849641e8b1405fc23d06dd0c7b30d59e0a991d036f52d74291a7e9439188
-
SSDEEP
96:JK+BK+nexThxmd4JD7sNG7Z/dWCjjEa5QAcreTXKrEx08zTGarFAQA1/:YAK+nexTo4b/UC0iUe91zTG4FAQA1/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-801878912-692986033-442676226-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-801878912-692986033-442676226-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3868 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\SpyMax 4.0 - DenQewPie\SpyMax 4.0 - THTlllroselll\res\Plugins\Android\gen-1.pl"1⤵
- Modifies registry class
PID:2296
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3868