Analysis

  • max time kernel
    97s
  • max time network
    145s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    20-12-2024 13:39

General

  • Target

    SpyNote v7.0‌‌/Resources/Imports/Payload/apktool.zip

  • Size

    8.6MB

  • MD5

    604ab3c9829f3f9f89c11cb39ee444db

  • SHA1

    b2bac6f9d3dd9837ae8f593e63706280c2be945d

  • SHA256

    3910604a99275579f07313caee2b3f04915999245a40772eeb942088d60c410b

  • SHA512

    5de6594071f9e711c578081c8b3a175b3b36ce25e5577b724b41f0388ec24e1f575f6a63cb455593109575d78ea921443e29cc64564573dfce9482b2d3dc8831

  • SSDEEP

    196608:DddtxPFyJqinxYndWH1yBEPF4vUqvvDYIObO5gB:D7bynxYnMHcBNvUqvvDY4gB

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\SpyNote v7.0‌‌\Resources\Imports\Payload\apktool.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:5076

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads