Overview
overview
8Static
static
1SpyShelterSetup.exe
windows11-21h2-x64
8$PLUGINSDIR/INetC.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...gs.dll
windows11-21h2-x64
3$PLUGINSDI...ec.dll
windows11-21h2-x64
3$PLUGINSDIR/sps.dll
windows11-21h2-x64
3SpyShelter.exe
windows11-21h2-x64
4SpyShelter.sys
windows11-21h2-x64
1data/app.so
windows11-21h2-x64
3data/flutt...ify.js
windows11-21h2-x64
3flutter_de...in.dll
windows11-21h2-x64
1flutter_windows.dll
windows11-21h2-x64
1msvcp140.dll
windows11-21h2-x64
1sps/sps.exe
windows11-21h2-x64
1sps_helper.exe
windows11-21h2-x64
1sps_service.exe
windows11-21h2-x64
1tray_manag...in.dll
windows11-21h2-x64
1url_launch...in.dll
windows11-21h2-x64
1vcruntime140.dll
windows11-21h2-x64
1vcruntime140_1.dll
windows11-21h2-x64
1windows_si...in.dll
windows11-21h2-x64
1Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
14-11-2024 10:18
Static task
static1
Behavioral task
behavioral1
Sample
SpyShelterSetup.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/INetC.dll
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/sps.dll
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
SpyShelter.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
SpyShelter.sys
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
data/app.so
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
data/flutter_assets/packages/fluttertoast/assets/toastify.js
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
flutter_desktop_sleep_plugin.dll
Resource
win11-20241023-en
Behavioral task
behavioral12
Sample
flutter_windows.dll
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
msvcp140.dll
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
sps/sps.exe
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
sps_helper.exe
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
sps_service.exe
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
tray_manager_plugin.dll
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
url_launcher_windows_plugin.dll
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
vcruntime140.dll
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
vcruntime140_1.dll
Resource
win11-20241023-en
Behavioral task
behavioral21
Sample
windows_single_instance_plugin.dll
Resource
win11-20241007-en
General
-
Target
$PLUGINSDIR/nsDialogs.dll
-
Size
19KB
-
MD5
31e9d33a51ec14b061b13a07357d5597
-
SHA1
a0c457597b90dc7d1166430c9583e75d25bd0087
-
SHA256
d90e03598b0cd62da697e0eabea712e4d277ac179cfacad5b9ca0c753368dcd9
-
SHA512
bf2bb86a27a5e8cf5d3ce19bda7d121fd6025f97f0ea626b986cb304db5e1ec203b9106ef023ba608f10f4d8a348cf24de92d117c70a8a7686b09950d042bc30
-
SSDEEP
384:DA7k8985U30WAw0hGIFcZ6ki2wi3YmxSCSKFKjqfvGBkSS:ENi5U3/Aw0g62b7SKFKcMkn
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2220 4288 WerFault.exe 80 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 240 wrote to memory of 4288 240 rundll32.exe 80 PID 240 wrote to memory of 4288 240 rundll32.exe 80 PID 240 wrote to memory of 4288 240 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsDialogs.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsDialogs.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4288 -s 5523⤵
- Program crash
PID:2220
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 4288 -ip 42881⤵PID:3520