Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 03:30
Behavioral task
behavioral1
Sample
4f3b59864c18a8d1a8add12e29dfd6293d67c07ecbd0bf9b4ae9e34294bc2668.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4f3b59864c18a8d1a8add12e29dfd6293d67c07ecbd0bf9b4ae9e34294bc2668.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Smart Binder v2.0 By Th3 Exploiter.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Smart Binder v2.0 By Th3 Exploiter.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
SpyNet.exe
Resource
win7-20240903-en
General
-
Target
SpyNet.exe
-
Size
2.0MB
-
MD5
98de7bcad1ba2caf74007bd97bc2b505
-
SHA1
8a79d06159a339313b810f23835b8417429dd356
-
SHA256
e4b3b3e72bd3bf4052a3136cb811ea54923bc2d7807709992e0345743d49ced8
-
SHA512
ef57cc4f0ad4bf1f54baaf7213bf868c418eebfb0eee3c32ff376b67d5d5337c35a94a1418951d82aae371820ce37eade7cf0a74ce54a4198e18327bd232a35d
-
SSDEEP
49152:GhwHJZqdp7orGOA0jhE6wSZCTIzY7wXSxQ5E+X6Oftn/Z9s0K:GhwHJZUp7orG90NE6KIM7wXr5EI6OR/7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation SpyNet.exe -
resource yara_rule behavioral6/memory/3668-0-0x0000000000400000-0x0000000000957000-memory.dmp upx behavioral6/memory/3668-1055-0x0000000000400000-0x0000000000957000-memory.dmp upx behavioral6/memory/3668-1057-0x0000000000400000-0x0000000000957000-memory.dmp upx behavioral6/memory/3668-1071-0x0000000000400000-0x0000000000957000-memory.dmp upx behavioral6/memory/3668-1072-0x0000000000400000-0x0000000000957000-memory.dmp upx behavioral6/memory/3668-1073-0x0000000000400000-0x0000000000957000-memory.dmp upx behavioral6/memory/3668-1074-0x0000000000400000-0x0000000000957000-memory.dmp upx behavioral6/memory/3668-1075-0x0000000000400000-0x0000000000957000-memory.dmp upx behavioral6/memory/3668-1076-0x0000000000400000-0x0000000000957000-memory.dmp upx behavioral6/memory/3668-1077-0x0000000000400000-0x0000000000957000-memory.dmp upx behavioral6/memory/3668-1078-0x0000000000400000-0x0000000000957000-memory.dmp upx behavioral6/memory/3668-1079-0x0000000000400000-0x0000000000957000-memory.dmp upx behavioral6/memory/3668-1080-0x0000000000400000-0x0000000000957000-memory.dmp upx behavioral6/memory/3668-1081-0x0000000000400000-0x0000000000957000-memory.dmp upx behavioral6/memory/3668-1082-0x0000000000400000-0x0000000000957000-memory.dmp upx behavioral6/memory/3668-1083-0x0000000000400000-0x0000000000957000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpyNet.exe -
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags SpyNet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 SpyNet.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags SpyNet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 SpyNet.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom SpyNet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 SpyNet.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom SpyNet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 SpyNet.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SpyNet.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SpyNet.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3668 SpyNet.exe 3668 SpyNet.exe 3668 SpyNet.exe 3668 SpyNet.exe 3668 SpyNet.exe 3668 SpyNet.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 3668 SpyNet.exe 3668 SpyNet.exe 3668 SpyNet.exe 3668 SpyNet.exe 3668 SpyNet.exe 3668 SpyNet.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3668 wrote to memory of 4448 3668 SpyNet.exe 84 PID 3668 wrote to memory of 4448 3668 SpyNet.exe 84 PID 3668 wrote to memory of 4448 3668 SpyNet.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\SpyNet.exe"C:\Users\Admin\AppData\Local\Temp\SpyNet.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\cscript.exe"C:\Windows\system32\cscript.exe" "C:\Users\Admin\AppData\Local\Temp\teste.vbs"2⤵
- System Location Discovery: System Language Discovery
PID:4448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD587cd77691f63f9ce90837d925a54abe7
SHA1072ab97d97c3d82fdb94af317b7202fcdba554e7
SHA25622437e05b518850284ef417734febe46a81af48c2b732cbf04ff58a4fa09da5a
SHA512587db1b084fab69d1ad863e3147d9019de77ed92b81a46417628bfef399f06d717bff51caa514094af559c14d491fac31ed9b695312afd739199ebb4bee4f340
-
Filesize
14KB
MD5ee9826fd3883b9756896baed5d076cc6
SHA1d1c829cabcb967410e03489723d9e51b9549d6f6
SHA256e06ff3e2b4cf78d6147d00dbfd00066751d1d6680b3dd672e861574741a894d9
SHA512404cfe3632fc3614a0e686504a2edcdf984aab20afc8fc4c7785d76bd52bf466078e756838c2ce5350439ad128756e55e1c3b12f3badd70fba8e74d171a05538
-
Filesize
1KB
MD5448a49c2d7253c927e820056e9e7ea8b
SHA1c7171c7b597beea4bb584319ddac80eadee5d3be
SHA256afcc1b53d0e2ef177754d4f6ae9ab391e7115e39fc73caaabcb3cd585c2e4c7c
SHA51254dc9c1eba0154aa648ec317c51642fd88d7dcd50b4e5f1eea5c67e1c7db91a7e8cb97d0b538e4a280d91a65fea8baa888734960fbf636b7067ac407840a5224
-
Filesize
2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d
-
Filesize
841B
MD5615964e5ab63a70f0e205a476c48e356
SHA1292620321db69d57ba23fa98d2a89484ddcf83d0
SHA25638a2c0e90a7c86eb5355710dd205f22f84dbba59e688cd3da6394af8c924a102
SHA51269886825baf2075f8e6cdc50b0b34f92d5d06d42db4586396fb3db806fef79986ba5754c7b1251b007cde4f943efe9e3d27800dd7e15f8084fd7e7e6046c3ccc