Overview
overview
8Static
static
1SpyShelterSetup.exe
windows11-21h2-x64
8$PLUGINSDIR/INetC.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...gs.dll
windows11-21h2-x64
3$PLUGINSDI...ec.dll
windows11-21h2-x64
3$PLUGINSDIR/sps.dll
windows11-21h2-x64
3SpyShelter.exe
windows11-21h2-x64
4SpyShelter.sys
windows11-21h2-x64
1data/app.so
windows11-21h2-x64
3data/flutt...ify.js
windows11-21h2-x64
3flutter_de...in.dll
windows11-21h2-x64
1flutter_windows.dll
windows11-21h2-x64
1msvcp140.dll
windows11-21h2-x64
1sps/sps.exe
windows11-21h2-x64
1sps_helper.exe
windows11-21h2-x64
1sps_service.exe
windows11-21h2-x64
1tray_manag...in.dll
windows11-21h2-x64
1url_launch...in.dll
windows11-21h2-x64
1vcruntime140.dll
windows11-21h2-x64
1vcruntime140_1.dll
windows11-21h2-x64
1windows_si...in.dll
windows11-21h2-x64
1Analysis
-
max time kernel
145s -
max time network
157s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
14-11-2024 10:18
Static task
static1
Behavioral task
behavioral1
Sample
SpyShelterSetup.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/INetC.dll
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/sps.dll
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
SpyShelter.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
SpyShelter.sys
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
data/app.so
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
data/flutter_assets/packages/fluttertoast/assets/toastify.js
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
flutter_desktop_sleep_plugin.dll
Resource
win11-20241023-en
Behavioral task
behavioral12
Sample
flutter_windows.dll
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
msvcp140.dll
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
sps/sps.exe
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
sps_helper.exe
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
sps_service.exe
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
tray_manager_plugin.dll
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
url_launcher_windows_plugin.dll
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
vcruntime140.dll
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
vcruntime140_1.dll
Resource
win11-20241023-en
Behavioral task
behavioral21
Sample
windows_single_instance_plugin.dll
Resource
win11-20241007-en
General
-
Target
$PLUGINSDIR/System.dll
-
Size
22KB
-
MD5
662740bb61022c673dca1f539692a881
-
SHA1
3c3a6db52874ab31d85da05af8bc5a3e64367033
-
SHA256
7a1f5593fd4090a0cc5028bcd8e4e2b4a1b017f2b98ba8c3f39e5ea38721a77c
-
SHA512
ebfc19bafe09b2480217c02f202e5de46d8c541dc71c32a821f5caf415e9569b40e7b355a5639cd7f9c52605ca1fcbd48cd7184bc2fa55353eef579db1e4f9ca
-
SSDEEP
384:0/Qlt7wiij/lMRv/9V4bvrh6ki2wi34IZzIKFKjqfvGBkSz:0aeiijipUU2boGkKFKcMk
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3284 5972 WerFault.exe 80 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5100 wrote to memory of 5972 5100 rundll32.exe 80 PID 5100 wrote to memory of 5972 5100 rundll32.exe 80 PID 5100 wrote to memory of 5972 5100 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5972 -s 4603⤵
- Program crash
PID:3284
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5972 -ip 59721⤵PID:5368