Overview
overview
10Static
static
10SpyNote_v6...pi.dll
windows7-x64
1SpyNote_v6...6.html
windows7-x64
1SpyNote_v6...2.html
windows7-x64
1SpyNote_v6...9.html
windows7-x64
1SpyNote_v6...SM.dll
windows7-x64
1SpyNote_v6...SL.exe
windows7-x64
1apktool/apktool.bat
windows7-x64
1apktool/apktool.jar
windows7-x64
1apktool/signapk.jar
windows7-x64
1SpyNote_v6...ub.apk
windows7-x64
3SpyNote_v6...va.jar
windows7-x64
1SpyNote_v6...sS.exe
windows7-x64
1platform-t...pi.dll
windows7-x64
3platform-t...pi.dll
windows7-x64
1platform-t...db.exe
windows7-x64
1platform-t...mp.exe
windows7-x64
1platform-t...ol.exe
windows7-x64
1platform-t...ot.exe
windows7-x64
1platform-t...nv.exe
windows7-x64
1platform-t...c++.so
windows7-x64
3platform-t...-1.dll
windows7-x64
1platform-t...fs.exe
windows7-x64
1platform-t...fs.exe
windows7-x64
1platform-t...e3.exe
windows7-x64
1platform-t...t__.py
windows7-x64
3platform-t...ror.py
windows7-x64
3platform-t...per.py
windows7-x64
3platform-t...est.py
windows7-x64
3platform-t...est.py
windows7-x64
3platform-t..._tests
windows7-x64
1SpyNote_v6...in.exe
windows7-x64
1SpyNote_v6...te.exe
windows7-x64
5Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 08:47
Behavioral task
behavioral1
Sample
SpyNote_v6.4/CoreAudioApi.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SpyNote_v6.4/Resources/Clients/KingB_354051091211537/Settings/2021-11-9--11-07-16.html
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
SpyNote_v6.4/Resources/Clients/Vicitim_354051091211537/Apps/2021-27-9--17-10-52.html
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
SpyNote_v6.4/Resources/Clients/Vicitim_354051091211537/Settings/2021-27-9--17-12-59.html
Resource
win7-20240419-en
Behavioral task
behavioral5
Sample
SpyNote_v6.4/Resources/Imports/Gsm/GSM.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
SpyNote_v6.4/Resources/Imports/Payload/SL.exe
Resource
win7-20231129-en
Behavioral task
behavioral7
Sample
apktool/apktool.bat
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
apktool/apktool.jar
Resource
win7-20240508-en
Behavioral task
behavioral9
Sample
apktool/signapk.jar
Resource
win7-20240419-en
Behavioral task
behavioral10
Sample
SpyNote_v6.4/Resources/Imports/Payload/stub.apk
Resource
win7-20231129-en
Behavioral task
behavioral11
Sample
SpyNote_v6.4/Resources/Imports/PlayerJava/PlayerJava.jar
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
SpyNote_v6.4/Resources/Imports/T/sS.exe
Resource
win7-20240221-en
Behavioral task
behavioral13
Sample
platform-tools/AdbWinApi.dll
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
platform-tools/AdbWinUsbApi.dll
Resource
win7-20240508-en
Behavioral task
behavioral15
Sample
platform-tools/adb.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
platform-tools/dmtracedump.exe
Resource
win7-20240508-en
Behavioral task
behavioral17
Sample
platform-tools/etc1tool.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
platform-tools/fastboot.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
platform-tools/hprof-conv.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
platform-tools/lib64/libc++.so
Resource
win7-20240215-en
Behavioral task
behavioral21
Sample
platform-tools/libwinpthread-1.dll
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
platform-tools/make_f2fs.exe
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
platform-tools/mke2fs.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
platform-tools/sqlite3.exe
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
platform-tools/systrace/catapult/common/battor/battor/__init__.py
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
platform-tools/systrace/catapult/common/battor/battor/battor_error.py
Resource
win7-20240419-en
Behavioral task
behavioral27
Sample
platform-tools/systrace/catapult/common/battor/battor/battor_wrapper.py
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
platform-tools/systrace/catapult/common/battor/battor/battor_wrapper_devicetest.py
Resource
win7-20240508-en
Behavioral task
behavioral29
Sample
platform-tools/systrace/catapult/common/battor/battor/battor_wrapper_unittest.py
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
platform-tools/systrace/catapult/common/battor/bin/run_py_tests
Resource
win7-20240221-en
Behavioral task
behavioral31
Sample
SpyNote_v6.4/Resources/Imports/platform-tools/plwin.exe
Resource
win7-20240215-en
Behavioral task
behavioral32
Sample
SpyNote_v6.4/SpyNote.exe
Resource
win7-20240508-en
General
-
Target
SpyNote_v6.4/Resources/Imports/Payload/stub.apk
-
Size
730KB
-
MD5
0c0290abde03555f3c66c81eba860a3d
-
SHA1
939a8e6d0ed4bd8c9f491405ecf069df7bddb7cc
-
SHA256
7b20a276931c8625b39ebc46017c7e4d4a7bdf319b9f451231d777b078b0cd6a
-
SHA512
441922d41856ec246d1cb29e3b290b62b2d3bc4ca54f896af1df72263e67a320f1b3b85f4d5bd129fa32b4633a1b9f74a63783791f1ea1cb1ca97a8a26b8ea48
-
SSDEEP
12288:CJc+EIBvAvcKIth8eGz3zaR9QHqd8gmw+/goe13VvqX:CJc+EIO0K4KeGTzaR+imz/goeHvqX
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\apk_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\apk_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\apk_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\apk_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\apk_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.apk rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.apk\ = "apk_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\apk_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2588 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2588 AcroRd32.exe 2588 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 1620 wrote to memory of 320 1620 cmd.exe rundll32.exe PID 1620 wrote to memory of 320 1620 cmd.exe rundll32.exe PID 1620 wrote to memory of 320 1620 cmd.exe rundll32.exe PID 320 wrote to memory of 2588 320 rundll32.exe AcroRd32.exe PID 320 wrote to memory of 2588 320 rundll32.exe AcroRd32.exe PID 320 wrote to memory of 2588 320 rundll32.exe AcroRd32.exe PID 320 wrote to memory of 2588 320 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SpyNote_v6.4\Resources\Imports\Payload\stub.apk1⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SpyNote_v6.4\Resources\Imports\Payload\stub.apk2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\SpyNote_v6.4\Resources\Imports\Payload\stub.apk"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56ff59cf558997806cf25eda8f0cb08fe
SHA142ca72ed3dbbda301a4ccddaedfe05ba344ca624
SHA256ac6d443824add6b344c904119764866e3fcdb7abba5eb43eb8a5bbdec804eaa3
SHA512393d0d9cde63480c04db8bac605de7ea694b547d4ea3172dd2082497c5335b1e9b13e0d01960127a12aae553c8af8026e9a137e0df55e390c965682da8737139