Overview
overview
10Static
static
10SpyNote_v6...pi.dll
windows10-2004-x64
1SpyNote_v6...6.html
windows10-2004-x64
1SpyNote_v6...2.html
windows10-2004-x64
1SpyNote_v6...9.html
windows10-2004-x64
1SpyNote_v6...SM.dll
windows10-2004-x64
1SpyNote_v6...SL.exe
windows10-2004-x64
1apktool/apktool.bat
windows10-2004-x64
7apktool/apktool.jar
windows10-2004-x64
7apktool/signapk.jar
windows10-2004-x64
7SpyNote_v6...ub.apk
windows10-2004-x64
3SpyNote_v6...va.jar
windows10-2004-x64
7SpyNote_v6...sS.exe
windows10-2004-x64
1platform-t...pi.dll
windows10-2004-x64
3platform-t...pi.dll
windows10-2004-x64
3platform-t...db.exe
windows10-2004-x64
1platform-t...mp.exe
windows10-2004-x64
1platform-t...ol.exe
windows10-2004-x64
1platform-t...ot.exe
windows10-2004-x64
1platform-t...nv.exe
windows10-2004-x64
1platform-t...c++.so
windows10-2004-x64
3platform-t...-1.dll
windows10-2004-x64
1platform-t...fs.exe
windows10-2004-x64
1platform-t...fs.exe
windows10-2004-x64
1platform-t...e3.exe
windows10-2004-x64
1platform-t...t__.py
windows10-2004-x64
3platform-t...ror.py
windows10-2004-x64
3platform-t...per.py
windows10-2004-x64
3platform-t...est.py
windows10-2004-x64
3platform-t...est.py
windows10-2004-x64
3platform-t..._tests
windows10-2004-x64
1SpyNote_v6...in.exe
windows10-2004-x64
1SpyNote_v6...te.exe
windows10-2004-x64
5Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-uk -
resource tags
arch:x64arch:x86image:win10v2004-20240412-uklocale:uk-uaos:windows10-2004-x64systemwindows -
submitted
15-04-2024 14:02
Behavioral task
behavioral1
Sample
SpyNote_v6.4/CoreAudioApi.dll
Resource
win10v2004-20240412-uk
Behavioral task
behavioral2
Sample
SpyNote_v6.4/Resources/Clients/KingB_354051091211537/Settings/2021-11-9--11-07-16.html
Resource
win10v2004-20240412-uk
Behavioral task
behavioral3
Sample
SpyNote_v6.4/Resources/Clients/Vicitim_354051091211537/Apps/2021-27-9--17-10-52.html
Resource
win10v2004-20240412-uk
Behavioral task
behavioral4
Sample
SpyNote_v6.4/Resources/Clients/Vicitim_354051091211537/Settings/2021-27-9--17-12-59.html
Resource
win10v2004-20240412-uk
Behavioral task
behavioral5
Sample
SpyNote_v6.4/Resources/Imports/Gsm/GSM.dll
Resource
win10v2004-20240412-uk
Behavioral task
behavioral6
Sample
SpyNote_v6.4/Resources/Imports/Payload/SL.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral7
Sample
apktool/apktool.bat
Resource
win10v2004-20240412-uk
Behavioral task
behavioral8
Sample
apktool/apktool.jar
Resource
win10v2004-20240412-uk
Behavioral task
behavioral9
Sample
apktool/signapk.jar
Resource
win10v2004-20240412-uk
Behavioral task
behavioral10
Sample
SpyNote_v6.4/Resources/Imports/Payload/stub.apk
Resource
win10v2004-20240412-uk
Behavioral task
behavioral11
Sample
SpyNote_v6.4/Resources/Imports/PlayerJava/PlayerJava.jar
Resource
win10v2004-20240412-uk
Behavioral task
behavioral12
Sample
SpyNote_v6.4/Resources/Imports/T/sS.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral13
Sample
platform-tools/AdbWinApi.dll
Resource
win10v2004-20240412-uk
Behavioral task
behavioral14
Sample
platform-tools/AdbWinUsbApi.dll
Resource
win10v2004-20240412-uk
Behavioral task
behavioral15
Sample
platform-tools/adb.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral16
Sample
platform-tools/dmtracedump.exe
Resource
win10v2004-20240226-uk
Behavioral task
behavioral17
Sample
platform-tools/etc1tool.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral18
Sample
platform-tools/fastboot.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral19
Sample
platform-tools/hprof-conv.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral20
Sample
platform-tools/lib64/libc++.so
Resource
win10v2004-20240412-uk
Behavioral task
behavioral21
Sample
platform-tools/libwinpthread-1.dll
Resource
win10v2004-20240412-uk
Behavioral task
behavioral22
Sample
platform-tools/make_f2fs.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral23
Sample
platform-tools/mke2fs.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral24
Sample
platform-tools/sqlite3.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral25
Sample
platform-tools/systrace/catapult/common/battor/battor/__init__.py
Resource
win10v2004-20240412-uk
Behavioral task
behavioral26
Sample
platform-tools/systrace/catapult/common/battor/battor/battor_error.py
Resource
win10v2004-20240412-uk
Behavioral task
behavioral27
Sample
platform-tools/systrace/catapult/common/battor/battor/battor_wrapper.py
Resource
win10v2004-20240412-uk
Behavioral task
behavioral28
Sample
platform-tools/systrace/catapult/common/battor/battor/battor_wrapper_devicetest.py
Resource
win10v2004-20240412-uk
Behavioral task
behavioral29
Sample
platform-tools/systrace/catapult/common/battor/battor/battor_wrapper_unittest.py
Resource
win10v2004-20240226-uk
Behavioral task
behavioral30
Sample
platform-tools/systrace/catapult/common/battor/bin/run_py_tests
Resource
win10v2004-20240412-uk
Behavioral task
behavioral31
Sample
SpyNote_v6.4/Resources/Imports/platform-tools/plwin.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral32
Sample
SpyNote_v6.4/SpyNote.exe
Resource
win10v2004-20240412-uk
General
-
Target
platform-tools/AdbWinApi.dll
-
Size
95KB
-
MD5
ed5a809dc0024d83cbab4fb9933d598d
-
SHA1
0bc5a82327f8641d9287101e4cc7041af20bad57
-
SHA256
d60103a5e99bc9888f786ee916f5d6e45493c3247972cb053833803de7e95cf9
-
SHA512
1fdb74ee5912fbdd2c0cba501e998349fecfbef5f4f743c7978c38996aa7e1f38e8ac750f2dc8f84b8094de3dd6fa3f983a29f290b3fa2cdbdaed691748baf17
-
SSDEEP
1536:Jwqdq+3pvspmLh8SCykrpTG7kfGHuNezq02XJqo+iFi1yCP:JwqD3L8Tezq0et+ui1y
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3044 1552 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1060 wrote to memory of 1552 1060 rundll32.exe rundll32.exe PID 1060 wrote to memory of 1552 1060 rundll32.exe rundll32.exe PID 1060 wrote to memory of 1552 1060 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\platform-tools\AdbWinApi.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\platform-tools\AdbWinApi.dll,#12⤵PID:1552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 6163⤵
- Program crash
PID:3044
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1552 -ip 15521⤵PID:1280