Overview
overview
10Static
static
10SpyNote_v6...pi.dll
windows10-2004-x64
1SpyNote_v6...6.html
windows10-2004-x64
1SpyNote_v6...2.html
windows10-2004-x64
1SpyNote_v6...9.html
windows10-2004-x64
1SpyNote_v6...SM.dll
windows10-2004-x64
1SpyNote_v6...SL.exe
windows10-2004-x64
1apktool/apktool.bat
windows10-2004-x64
7apktool/apktool.jar
windows10-2004-x64
7apktool/signapk.jar
windows10-2004-x64
7SpyNote_v6...ub.apk
windows10-2004-x64
3SpyNote_v6...va.jar
windows10-2004-x64
7SpyNote_v6...sS.exe
windows10-2004-x64
1platform-t...pi.dll
windows10-2004-x64
3platform-t...pi.dll
windows10-2004-x64
3platform-t...db.exe
windows10-2004-x64
1platform-t...mp.exe
windows10-2004-x64
1platform-t...ol.exe
windows10-2004-x64
1platform-t...ot.exe
windows10-2004-x64
1platform-t...nv.exe
windows10-2004-x64
1platform-t...c++.so
windows10-2004-x64
3platform-t...-1.dll
windows10-2004-x64
1platform-t...fs.exe
windows10-2004-x64
1platform-t...fs.exe
windows10-2004-x64
1platform-t...e3.exe
windows10-2004-x64
1platform-t...t__.py
windows10-2004-x64
3platform-t...ror.py
windows10-2004-x64
3platform-t...per.py
windows10-2004-x64
3platform-t...est.py
windows10-2004-x64
3platform-t...est.py
windows10-2004-x64
3platform-t..._tests
windows10-2004-x64
1SpyNote_v6...in.exe
windows10-2004-x64
1SpyNote_v6...te.exe
windows10-2004-x64
5Analysis
-
max time kernel
145s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-uk -
resource tags
arch:x64arch:x86image:win10v2004-20240412-uklocale:uk-uaos:windows10-2004-x64systemwindows -
submitted
15-04-2024 14:02
Behavioral task
behavioral1
Sample
SpyNote_v6.4/CoreAudioApi.dll
Resource
win10v2004-20240412-uk
Behavioral task
behavioral2
Sample
SpyNote_v6.4/Resources/Clients/KingB_354051091211537/Settings/2021-11-9--11-07-16.html
Resource
win10v2004-20240412-uk
Behavioral task
behavioral3
Sample
SpyNote_v6.4/Resources/Clients/Vicitim_354051091211537/Apps/2021-27-9--17-10-52.html
Resource
win10v2004-20240412-uk
Behavioral task
behavioral4
Sample
SpyNote_v6.4/Resources/Clients/Vicitim_354051091211537/Settings/2021-27-9--17-12-59.html
Resource
win10v2004-20240412-uk
Behavioral task
behavioral5
Sample
SpyNote_v6.4/Resources/Imports/Gsm/GSM.dll
Resource
win10v2004-20240412-uk
Behavioral task
behavioral6
Sample
SpyNote_v6.4/Resources/Imports/Payload/SL.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral7
Sample
apktool/apktool.bat
Resource
win10v2004-20240412-uk
Behavioral task
behavioral8
Sample
apktool/apktool.jar
Resource
win10v2004-20240412-uk
Behavioral task
behavioral9
Sample
apktool/signapk.jar
Resource
win10v2004-20240412-uk
Behavioral task
behavioral10
Sample
SpyNote_v6.4/Resources/Imports/Payload/stub.apk
Resource
win10v2004-20240412-uk
Behavioral task
behavioral11
Sample
SpyNote_v6.4/Resources/Imports/PlayerJava/PlayerJava.jar
Resource
win10v2004-20240412-uk
Behavioral task
behavioral12
Sample
SpyNote_v6.4/Resources/Imports/T/sS.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral13
Sample
platform-tools/AdbWinApi.dll
Resource
win10v2004-20240412-uk
Behavioral task
behavioral14
Sample
platform-tools/AdbWinUsbApi.dll
Resource
win10v2004-20240412-uk
Behavioral task
behavioral15
Sample
platform-tools/adb.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral16
Sample
platform-tools/dmtracedump.exe
Resource
win10v2004-20240226-uk
Behavioral task
behavioral17
Sample
platform-tools/etc1tool.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral18
Sample
platform-tools/fastboot.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral19
Sample
platform-tools/hprof-conv.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral20
Sample
platform-tools/lib64/libc++.so
Resource
win10v2004-20240412-uk
Behavioral task
behavioral21
Sample
platform-tools/libwinpthread-1.dll
Resource
win10v2004-20240412-uk
Behavioral task
behavioral22
Sample
platform-tools/make_f2fs.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral23
Sample
platform-tools/mke2fs.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral24
Sample
platform-tools/sqlite3.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral25
Sample
platform-tools/systrace/catapult/common/battor/battor/__init__.py
Resource
win10v2004-20240412-uk
Behavioral task
behavioral26
Sample
platform-tools/systrace/catapult/common/battor/battor/battor_error.py
Resource
win10v2004-20240412-uk
Behavioral task
behavioral27
Sample
platform-tools/systrace/catapult/common/battor/battor/battor_wrapper.py
Resource
win10v2004-20240412-uk
Behavioral task
behavioral28
Sample
platform-tools/systrace/catapult/common/battor/battor/battor_wrapper_devicetest.py
Resource
win10v2004-20240412-uk
Behavioral task
behavioral29
Sample
platform-tools/systrace/catapult/common/battor/battor/battor_wrapper_unittest.py
Resource
win10v2004-20240226-uk
Behavioral task
behavioral30
Sample
platform-tools/systrace/catapult/common/battor/bin/run_py_tests
Resource
win10v2004-20240412-uk
Behavioral task
behavioral31
Sample
SpyNote_v6.4/Resources/Imports/platform-tools/plwin.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral32
Sample
SpyNote_v6.4/SpyNote.exe
Resource
win10v2004-20240412-uk
General
-
Target
platform-tools/systrace/catapult/common/battor/battor/battor_wrapper.py
-
Size
15KB
-
MD5
d2a93ab365251001f39f0a71feac5275
-
SHA1
1bf9854bad16f14de0b74eb7efcd2671b0b8db7c
-
SHA256
fbacb34ebd9b4af177f818f5cd0724c91c4ed1085cf1bd70eee9ae4115d112c9
-
SHA512
bbafd95d57ccabd4f11c15a3264761d329554ca429219dd855353a4a8dd9cef53fe20819bded5f8f4dbaf2b04dd9bf5930852aa3a33521362b0b751e66cab825
-
SSDEEP
384:SzxnQF5rr+ZTADM6uJE0x96JQNo3OUBete/rU72hT:UxnQF5zDB77ele/b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
OpenWith.execmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 1456 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\platform-tools\systrace\catapult\common\battor\battor\battor_wrapper.py1⤵
- Modifies registry class
PID:3996
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1456