Overview
overview
10Static
static
10SpyMax 4.0...26.apk
windows11-21h2-x64
3SpyMax 4.0...28.apk
windows11-21h2-x64
3SpyMax 4.0....0.exe
windows11-21h2-x64
1SpyMax 4.0...et.dll
windows11-21h2-x64
1SpyMax 4.0...ld.exe
windows11-21h2-x64
1SpyMax 4.0...SM.dll
windows11-21h2-x64
1platformBi...32.dll
windows11-21h2-x64
1platformBi...ge.dll
windows11-21h2-x64
1platformBi...32.dll
windows11-21h2-x64
1platformBi...ge.dll
windows11-21h2-x64
1platformBi...32.dll
windows11-21h2-x64
3platformBi...ge.dll
windows11-21h2-x64
3platformBi...ol.bat
windows11-21h2-x64
1platformBi...ol.jar
windows11-21h2-x64
7platformBi...ch.dll
windows11-21h2-x64
1platformBi...wt.dll
windows11-21h2-x64
1platformBi...db.exe
windows11-21h2-x64
1platformBi...vm.dll
windows11-21h2-x64
3platformBi...em.dll
windows11-21h2-x64
3platformBi...et.dll
windows11-21h2-x64
1platformBi...er.dll
windows11-21h2-x64
1platformBi...pe.dll
windows11-21h2-x64
3platformBi...of.dll
windows11-21h2-x64
3platformBi...db.exe
windows11-21h2-x64
1SpyMax 4.0...n-1.pl
windows11-21h2-x64
3SpyMax 4.0...n-2.pl
windows11-21h2-x64
3SpyMax 4.0...n-3.pl
windows11-21h2-x64
3SpyMax 4.0...n-4.pl
windows11-21h2-x64
3SpyMax 4.0...n-5.pl
windows11-21h2-x64
3SpyMax 4.0...n-6.pl
windows11-21h2-x64
3SpyMax 4.0...n-7.pl
windows11-21h2-x64
3SpyMax 4.0...n-8.pl
windows11-21h2-x64
3Analysis
-
max time kernel
86s -
max time network
95s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-04-2024 09:47
Behavioral task
behavioral1
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/PATCH-SDK26.apk
Resource
win11-20240412-en
Behavioral task
behavioral2
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/PATCH-SDK28.apk
Resource
win11-20240412-en
Behavioral task
behavioral3
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/SpyMax 4.0.exe
Resource
win11-20240412-en
Behavioral task
behavioral4
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/WinMM.Net.dll
Resource
win11-20240412-en
Behavioral task
behavioral5
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Lib/Build.exe
Resource
win11-20240412-en
Behavioral task
behavioral6
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Lib/LibGSM.dll
Resource
win11-20240412-en
Behavioral task
behavioral7
Sample
platformBinary32/bin/JAWTAccessBridge-32.dll
Resource
win11-20240412-en
Behavioral task
behavioral8
Sample
platformBinary32/bin/JAWTAccessBridge.dll
Resource
win11-20240412-en
Behavioral task
behavioral9
Sample
platformBinary32/bin/JavaAccessBridge-32.dll
Resource
win11-20240412-en
Behavioral task
behavioral10
Sample
platformBinary32/bin/JavaAccessBridge.dll
Resource
win11-20240412-en
Behavioral task
behavioral11
Sample
platformBinary32/bin/WindowsAccessBridge-32.dll
Resource
win11-20240412-en
Behavioral task
behavioral12
Sample
platformBinary32/bin/WindowsAccessBridge.dll
Resource
win11-20240412-en
Behavioral task
behavioral13
Sample
platformBinary32/bin/apktool.bat
Resource
win11-20240412-en
Behavioral task
behavioral14
Sample
platformBinary32/bin/apktool.jar
Resource
win11-20240412-en
Behavioral task
behavioral15
Sample
platformBinary32/bin/attach.dll
Resource
win11-20240412-en
Behavioral task
behavioral16
Sample
platformBinary32/bin/awt.dll
Resource
win11-20240412-en
Behavioral task
behavioral17
Sample
platformBinary32/bin/clhsdb.exe
Resource
win11-20240412-en
Behavioral task
behavioral18
Sample
platformBinary32/bin/client/jvm.dll
Resource
win11-20240412-en
Behavioral task
behavioral19
Sample
platformBinary32/bin/dt_shmem.dll
Resource
win11-20240412-en
Behavioral task
behavioral20
Sample
platformBinary32/bin/dt_socket.dll
Resource
win11-20240412-en
Behavioral task
behavioral21
Sample
platformBinary32/bin/fontmanager.dll
Resource
win11-20240412-en
Behavioral task
behavioral22
Sample
platformBinary32/bin/freetype.dll
Resource
win11-20240412-en
Behavioral task
behavioral23
Sample
platformBinary32/bin/hprof.dll
Resource
win11-20240412-en
Behavioral task
behavioral24
Sample
platformBinary32/bin/hsdb.exe
Resource
win11-20240412-en
Behavioral task
behavioral25
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-1.pl
Resource
win11-20240412-en
Behavioral task
behavioral26
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-2.pl
Resource
win11-20240412-en
Behavioral task
behavioral27
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-3.pl
Resource
win11-20240412-en
Behavioral task
behavioral28
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-4.pl
Resource
win11-20240412-en
Behavioral task
behavioral29
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-5.pl
Resource
win11-20240412-en
Behavioral task
behavioral30
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-6.pl
Resource
win11-20240412-en
Behavioral task
behavioral31
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-7.pl
Resource
win11-20240412-en
Behavioral task
behavioral32
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-8.pl
Resource
win11-20240412-en
General
-
Target
platformBinary32/bin/JAWTAccessBridge.dll
-
Size
15KB
-
MD5
18a83919deb33b572e42b08000e362a1
-
SHA1
24cf5bdc5d6d50d5fed3f0cd7bfc401387c0ea00
-
SHA256
4227bc0f4ca568c8bb84cb01705ecad235826297a4b942cd56f2f2a3cfd882c1
-
SHA512
b126e3a03739b84ea45ec51f259906d8e2d0b6bbf351382739aa2f65a7a168028e4cd1e1335c4e7ab8ef09a65f20a89722ec695e0fef9e5c69db17d3084b0027
-
SSDEEP
192:VqcdMr5Y53XLPVT6ts6a5e1HVuurDWpHTyFonI7CY1duasnZHmR:VJMNW7PVp6THVuMDGyonNPnhw
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3904 wrote to memory of 3144 3904 rundll32.exe 81 PID 3904 wrote to memory of 3144 3904 rundll32.exe 81 PID 3904 wrote to memory of 3144 3904 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\platformBinary32\bin\JAWTAccessBridge.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\platformBinary32\bin\JAWTAccessBridge.dll,#12⤵PID:3144
-