Analysis

  • max time kernel
    430s
  • max time network
    1154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 23:43

General

  • Target

    Spymax 4.0 Activated/res/Plugins/Android/gen-4.pl

  • Size

    14KB

  • MD5

    33f98552fc39eba4d6db688ed8f34765

  • SHA1

    61389d16fa5e03c44e14ebd301271225b69d254d

  • SHA256

    83fb2d28521c56153835161c2d8a0bdf52f19a98a0d93a8570eac7c265e1cd09

  • SHA512

    479128578f138eb8706429db3b8e9061a15580fe5a38ca7ed83f355d110357239cf814dbe7b7b75de26553b93270560a0d9be73da4ffcd4a67ea313a4f9b0081

  • SSDEEP

    384:q+rHdaDP+mQtETs+ETaw9op0o37cWx9qwKCY1AoVIYgteut:qedk2mQtms+V6op5qPCY1qLH

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Spymax 4.0 Activated\res\Plugins\Android\gen-4.pl"
    1⤵
    • Modifies registry class
    PID:3476
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads