Overview
overview
10Static
static
10Spymax 4.0....0.exe
windows10-2004-x64
3Spymax 4.0...ld.exe
windows10-2004-x64
3Spymax 4.0...SM.dll
windows10-2004-x64
1Spymax 4.0...n-1.pl
windows10-2004-x64
3Spymax 4.0...n-2.pl
windows10-2004-x64
3Spymax 4.0...n-3.pl
windows10-2004-x64
3Spymax 4.0...n-4.pl
windows10-2004-x64
3Spymax 4.0...n-5.pl
windows10-2004-x64
3Spymax 4.0...n-6.pl
windows10-2004-x64
3Spymax 4.0...n-7.pl
windows10-2004-x64
3Spymax 4.0...n-8.pl
windows10-2004-x64
3Analysis
-
max time kernel
1148s -
max time network
1144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 23:43
Behavioral task
behavioral1
Sample
Spymax 4.0 Activated/SpyMax 4.0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Spymax 4.0 Activated/res/Lib/Build.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Spymax 4.0 Activated/res/Lib/LibGSM.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Spymax 4.0 Activated/res/Plugins/Android/gen-1.pl
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Spymax 4.0 Activated/res/Plugins/Android/gen-2.pl
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
Spymax 4.0 Activated/res/Plugins/Android/gen-3.pl
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Spymax 4.0 Activated/res/Plugins/Android/gen-4.pl
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
Spymax 4.0 Activated/res/Plugins/Android/gen-5.pl
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Spymax 4.0 Activated/res/Plugins/Android/gen-6.pl
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
Spymax 4.0 Activated/res/Plugins/Android/gen-7.pl
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Spymax 4.0 Activated/res/Plugins/Android/gen-8.pl
Resource
win10v2004-20241007-en
General
-
Target
Spymax 4.0 Activated/res/Plugins/Android/gen-7.pl
-
Size
5KB
-
MD5
a9f48543cf1571322f575724a0e8de35
-
SHA1
edaaf35c07045f0d0376202700d1d3213e42c246
-
SHA256
3a36e9b32c7bee100d590a31b8e622a229c6168e2fcd95dbd9fa934025e6787b
-
SHA512
0b7f72c4b68e78f2c73485387a3d6e0d2dc92a2298bf0f737ccf1d4bf508db1e96a164550ed7a3a0a74f99cc89d989e1d28ecd986c4f164a0b22e9760dadadc1
-
SSDEEP
96:2Pm57cUV8+pZmIjZ9gZdXarsspyqU0H16DN1kvZFgfqYTfTvPNLMrnSkCXeYH/:2OduEmIj8ZdKrQ0HkzkvZFO31YdCuI/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4540 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Spymax 4.0 Activated\res\Plugins\Android\gen-7.pl"1⤵
- Modifies registry class
PID:1368
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4540