Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

15/04/2024, 10:26

240415-mgzvqsef2v 10

15/04/2024, 10:23

240415-mex85acb93 10

15/04/2024, 10:21

240415-mdn9tsee21 10

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2024, 10:26

General

  • Target

    SpyMax 4.0 - DenQewPie/SpyMax 4.0 - THTlllroselll/SpyMax 4.0.exe

  • Size

    2.4MB

  • MD5

    8343d36e6d175e648796e0b4619509e8

  • SHA1

    55072df90b4dde636ac9224da96b292d541a51ae

  • SHA256

    982608c4bc15e5d7f36660665d96b5625d5cfffd63c895ed67956562a6807b8a

  • SHA512

    18e5319a9d3e33cfdc74b847f8d4eeb9ce59fc0b0674561c6aa16d925bb2feb1084814b6dfe2da8c9526a1fae10636796b85ecd227bd8f741461ed57d5b4cf86

  • SSDEEP

    49152:qIJfVyhrxCsY5SuQhk10PnXoCCCRsTWNPHlPp6b+x:qIJdyXRYlSq0Pn4C6TYPHlh0+

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 45 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SpyMax 4.0 - DenQewPie\SpyMax 4.0 - THTlllroselll\SpyMax 4.0.exe
    "C:\Users\Admin\AppData\Local\Temp\SpyMax 4.0 - DenQewPie\SpyMax 4.0 - THTlllroselll\SpyMax 4.0.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1708-0-0x0000000000950000-0x0000000000BC8000-memory.dmp

    Filesize

    2.5MB

  • memory/1708-1-0x0000000074FE0000-0x0000000075790000-memory.dmp

    Filesize

    7.7MB

  • memory/1708-2-0x0000000007A40000-0x0000000007D9C000-memory.dmp

    Filesize

    3.4MB

  • memory/1708-3-0x0000000007DA0000-0x0000000007E3C000-memory.dmp

    Filesize

    624KB

  • memory/1708-4-0x00000000083F0000-0x0000000008994000-memory.dmp

    Filesize

    5.6MB

  • memory/1708-5-0x0000000007EE0000-0x0000000007F72000-memory.dmp

    Filesize

    584KB

  • memory/1708-6-0x0000000005540000-0x0000000005546000-memory.dmp

    Filesize

    24KB

  • memory/1708-7-0x0000000005560000-0x0000000005570000-memory.dmp

    Filesize

    64KB

  • memory/1708-8-0x0000000007E40000-0x0000000007E4A000-memory.dmp

    Filesize

    40KB

  • memory/1708-9-0x00000000082C0000-0x0000000008316000-memory.dmp

    Filesize

    344KB

  • memory/1708-10-0x0000000005560000-0x0000000005570000-memory.dmp

    Filesize

    64KB

  • memory/1708-11-0x000000000B0B0000-0x000000000B116000-memory.dmp

    Filesize

    408KB

  • memory/1708-12-0x000000000E8F0000-0x000000000E8F8000-memory.dmp

    Filesize

    32KB

  • memory/1708-13-0x0000000074FE0000-0x0000000075790000-memory.dmp

    Filesize

    7.7MB

  • memory/1708-14-0x0000000005560000-0x0000000005570000-memory.dmp

    Filesize

    64KB

  • memory/1708-15-0x0000000005560000-0x0000000005570000-memory.dmp

    Filesize

    64KB

  • memory/1708-18-0x0000000005560000-0x0000000005570000-memory.dmp

    Filesize

    64KB

  • memory/1708-19-0x0000000005560000-0x0000000005570000-memory.dmp

    Filesize

    64KB