Overview
overview
10Static
static
10SpyMax 4.0...26.apk
windows10-2004-x64
3SpyMax 4.0...28.apk
windows10-2004-x64
3SpyMax 4.0....0.exe
windows10-2004-x64
3SpyMax 4.0...et.dll
windows10-2004-x64
1SpyMax 4.0...ld.exe
windows10-2004-x64
1SpyMax 4.0...SM.dll
windows10-2004-x64
1SpyMax 4.0...n-1.pl
windows10-2004-x64
3SpyMax 4.0...n-2.pl
windows10-2004-x64
3SpyMax 4.0...n-3.pl
windows10-2004-x64
3SpyMax 4.0...n-4.pl
windows10-2004-x64
3SpyMax 4.0...n-5.pl
windows10-2004-x64
3SpyMax 4.0...n-6.pl
windows10-2004-x64
3SpyMax 4.0...n-7.pl
windows10-2004-x64
3SpyMax 4.0...n-8.pl
windows10-2004-x64
3Resubmissions
15-04-2024 10:26
240415-mgzvqsef2v 1015-04-2024 10:23
240415-mex85acb93 1015-04-2024 10:21
240415-mdn9tsee21 10Analysis
-
max time kernel
92s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2024 10:26
Behavioral task
behavioral1
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/PATCH-SDK26.apk
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/PATCH-SDK28.apk
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/SpyMax 4.0.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/WinMM.Net.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Lib/Build.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Lib/LibGSM.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-1.pl
Resource
win10v2004-20240412-en
Behavioral task
behavioral8
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-2.pl
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-3.pl
Resource
win10v2004-20240412-en
Behavioral task
behavioral10
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-4.pl
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-5.pl
Resource
win10v2004-20240412-en
Behavioral task
behavioral12
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-6.pl
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-7.pl
Resource
win10v2004-20240412-en
Behavioral task
behavioral14
Sample
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/res/Plugins/Android/gen-8.pl
Resource
win10v2004-20240412-en
General
-
Target
SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/PATCH-SDK26.apk
-
Size
28KB
-
MD5
ac7e3b5bcd591fe15bf2c5aa43f389a8
-
SHA1
9bfb12f6b99c9d7e80123c224a3c0d89fede5c58
-
SHA256
cde47bed5ec83e29f6455ec35228c3f56d488393668f5b720b79fcd6cb3bc098
-
SHA512
a17dfaaf85f7347772981b91bbaa7c117d38d18213b2dec8e37f62a7fc5516002e0705e54b243df46ec96e4d998ef6fb58d5a1bbdb9a9a9a546012c53fe36efe
-
SSDEEP
768:T7qKKd3PyfFrT2GJxeEUaDWD2RKFCl3fp66/YzL:T4P8eGJxOaDJ66/YzL
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 552 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\SpyMax 4.0 - DenQewPie\SpyMax 4.0 - THTlllroselll\PATCH-SDK26.apk"1⤵
- Modifies registry class
PID:3300
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:552