Overview
overview
10Static
static
10SpyNote_v6...pi.dll
windows10-2004-x64
1SpyNote_v6...6.html
windows10-2004-x64
1SpyNote_v6...2.html
windows10-2004-x64
1SpyNote_v6...9.html
windows10-2004-x64
1SpyNote_v6...SM.dll
windows10-2004-x64
1SpyNote_v6...SL.exe
windows10-2004-x64
1apktool/apktool.bat
windows10-2004-x64
7apktool/apktool.jar
windows10-2004-x64
7apktool/signapk.jar
windows10-2004-x64
7SpyNote_v6...ub.apk
windows10-2004-x64
3SpyNote_v6...va.jar
windows10-2004-x64
7SpyNote_v6...sS.exe
windows10-2004-x64
1platform-t...pi.dll
windows10-2004-x64
3platform-t...pi.dll
windows10-2004-x64
3platform-t...db.exe
windows10-2004-x64
1platform-t...mp.exe
windows10-2004-x64
1platform-t...ol.exe
windows10-2004-x64
1platform-t...ot.exe
windows10-2004-x64
1platform-t...nv.exe
windows10-2004-x64
1platform-t...c++.so
windows10-2004-x64
3platform-t...-1.dll
windows10-2004-x64
1platform-t...fs.exe
windows10-2004-x64
1platform-t...fs.exe
windows10-2004-x64
1platform-t...e3.exe
windows10-2004-x64
1platform-t...t__.py
windows10-2004-x64
3platform-t...ror.py
windows10-2004-x64
3platform-t...per.py
windows10-2004-x64
3platform-t...est.py
windows10-2004-x64
3platform-t...est.py
windows10-2004-x64
3platform-t..._tests
windows10-2004-x64
1SpyNote_v6...in.exe
windows10-2004-x64
1SpyNote_v6...te.exe
windows10-2004-x64
5Analysis
-
max time kernel
146s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-uk -
resource tags
arch:x64arch:x86image:win10v2004-20240412-uklocale:uk-uaos:windows10-2004-x64systemwindows -
submitted
15-04-2024 14:02
Behavioral task
behavioral1
Sample
SpyNote_v6.4/CoreAudioApi.dll
Resource
win10v2004-20240412-uk
Behavioral task
behavioral2
Sample
SpyNote_v6.4/Resources/Clients/KingB_354051091211537/Settings/2021-11-9--11-07-16.html
Resource
win10v2004-20240412-uk
Behavioral task
behavioral3
Sample
SpyNote_v6.4/Resources/Clients/Vicitim_354051091211537/Apps/2021-27-9--17-10-52.html
Resource
win10v2004-20240412-uk
Behavioral task
behavioral4
Sample
SpyNote_v6.4/Resources/Clients/Vicitim_354051091211537/Settings/2021-27-9--17-12-59.html
Resource
win10v2004-20240412-uk
Behavioral task
behavioral5
Sample
SpyNote_v6.4/Resources/Imports/Gsm/GSM.dll
Resource
win10v2004-20240412-uk
Behavioral task
behavioral6
Sample
SpyNote_v6.4/Resources/Imports/Payload/SL.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral7
Sample
apktool/apktool.bat
Resource
win10v2004-20240412-uk
Behavioral task
behavioral8
Sample
apktool/apktool.jar
Resource
win10v2004-20240412-uk
Behavioral task
behavioral9
Sample
apktool/signapk.jar
Resource
win10v2004-20240412-uk
Behavioral task
behavioral10
Sample
SpyNote_v6.4/Resources/Imports/Payload/stub.apk
Resource
win10v2004-20240412-uk
Behavioral task
behavioral11
Sample
SpyNote_v6.4/Resources/Imports/PlayerJava/PlayerJava.jar
Resource
win10v2004-20240412-uk
Behavioral task
behavioral12
Sample
SpyNote_v6.4/Resources/Imports/T/sS.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral13
Sample
platform-tools/AdbWinApi.dll
Resource
win10v2004-20240412-uk
Behavioral task
behavioral14
Sample
platform-tools/AdbWinUsbApi.dll
Resource
win10v2004-20240412-uk
Behavioral task
behavioral15
Sample
platform-tools/adb.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral16
Sample
platform-tools/dmtracedump.exe
Resource
win10v2004-20240226-uk
Behavioral task
behavioral17
Sample
platform-tools/etc1tool.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral18
Sample
platform-tools/fastboot.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral19
Sample
platform-tools/hprof-conv.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral20
Sample
platform-tools/lib64/libc++.so
Resource
win10v2004-20240412-uk
Behavioral task
behavioral21
Sample
platform-tools/libwinpthread-1.dll
Resource
win10v2004-20240412-uk
Behavioral task
behavioral22
Sample
platform-tools/make_f2fs.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral23
Sample
platform-tools/mke2fs.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral24
Sample
platform-tools/sqlite3.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral25
Sample
platform-tools/systrace/catapult/common/battor/battor/__init__.py
Resource
win10v2004-20240412-uk
Behavioral task
behavioral26
Sample
platform-tools/systrace/catapult/common/battor/battor/battor_error.py
Resource
win10v2004-20240412-uk
Behavioral task
behavioral27
Sample
platform-tools/systrace/catapult/common/battor/battor/battor_wrapper.py
Resource
win10v2004-20240412-uk
Behavioral task
behavioral28
Sample
platform-tools/systrace/catapult/common/battor/battor/battor_wrapper_devicetest.py
Resource
win10v2004-20240412-uk
Behavioral task
behavioral29
Sample
platform-tools/systrace/catapult/common/battor/battor/battor_wrapper_unittest.py
Resource
win10v2004-20240226-uk
Behavioral task
behavioral30
Sample
platform-tools/systrace/catapult/common/battor/bin/run_py_tests
Resource
win10v2004-20240412-uk
Behavioral task
behavioral31
Sample
SpyNote_v6.4/Resources/Imports/platform-tools/plwin.exe
Resource
win10v2004-20240412-uk
Behavioral task
behavioral32
Sample
SpyNote_v6.4/SpyNote.exe
Resource
win10v2004-20240412-uk
General
-
Target
apktool/apktool.bat
-
Size
135B
-
MD5
b02966b106045115fa8ef94a4e67537b
-
SHA1
f901df8bbfe8fe50e560e625a27da1c6c4f0e9b3
-
SHA256
3d8108beb40535e68e7f6421a4309408ea5efab91707fa25d862154e3cc9b6df
-
SHA512
6274a4568285c74985b095d1dd5649044b61cb7c372dc4653c62a2b92833df477f5a5453be0e598622918b4e6c27064a57e5fba1a657dd064e6d9598fe2f94cc
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cmd.exejava.exedescription pid process target process PID 1460 wrote to memory of 4656 1460 cmd.exe java.exe PID 1460 wrote to memory of 4656 1460 cmd.exe java.exe PID 4656 wrote to memory of 780 4656 java.exe icacls.exe PID 4656 wrote to memory of 780 4656 java.exe icacls.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\apktool\apktool.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar -Duser.language=en "C:\Users\Admin\AppData\Local\Temp\apktool\\apktool.jar"2⤵
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:780
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD51de04318ff121d9a56307a9bd961e15e
SHA1a0939418ff97e73ccd601b1971cde582713ab9bb
SHA2567ae6d719e44ad026f68c77cff5c0f0acb65dfb03bdc9cbcb19ac992c07a8bc64
SHA512cf784b7406764fc3456ee50447df36a5ec32308e55a88ba3ec8893bca63cabeddc979231209bfa038e190d3f342dcd3d789ef985ffed235e2072f0cfb7039f81