Overview
overview
8Static
static
1SpyShelterSetup.exe
windows11-21h2-x64
8$PLUGINSDIR/INetC.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...gs.dll
windows11-21h2-x64
3$PLUGINSDI...ec.dll
windows11-21h2-x64
3$PLUGINSDIR/sps.dll
windows11-21h2-x64
3SpyShelter.exe
windows11-21h2-x64
4SpyShelter.sys
windows11-21h2-x64
1data/app.so
windows11-21h2-x64
3data/flutt...ify.js
windows11-21h2-x64
3flutter_de...in.dll
windows11-21h2-x64
1flutter_windows.dll
windows11-21h2-x64
1msvcp140.dll
windows11-21h2-x64
1sps/sps.exe
windows11-21h2-x64
1sps_helper.exe
windows11-21h2-x64
1sps_service.exe
windows11-21h2-x64
1tray_manag...in.dll
windows11-21h2-x64
1url_launch...in.dll
windows11-21h2-x64
1vcruntime140.dll
windows11-21h2-x64
1vcruntime140_1.dll
windows11-21h2-x64
1windows_si...in.dll
windows11-21h2-x64
1Analysis
-
max time kernel
90s -
max time network
97s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
14-11-2024 10:18
Static task
static1
Behavioral task
behavioral1
Sample
SpyShelterSetup.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/INetC.dll
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/sps.dll
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
SpyShelter.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
SpyShelter.sys
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
data/app.so
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
data/flutter_assets/packages/fluttertoast/assets/toastify.js
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
flutter_desktop_sleep_plugin.dll
Resource
win11-20241023-en
Behavioral task
behavioral12
Sample
flutter_windows.dll
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
msvcp140.dll
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
sps/sps.exe
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
sps_helper.exe
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
sps_service.exe
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
tray_manager_plugin.dll
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
url_launcher_windows_plugin.dll
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
vcruntime140.dll
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
vcruntime140_1.dll
Resource
win11-20241023-en
Behavioral task
behavioral21
Sample
windows_single_instance_plugin.dll
Resource
win11-20241007-en
General
-
Target
$PLUGINSDIR/sps.dll
-
Size
95KB
-
MD5
f14021caecb24dc2f24854174ed1a58a
-
SHA1
50e9520c001eefbc68ba06e99c9f039ff20afd7b
-
SHA256
47ffacc6c155105138f6409765558a927b3cabc6c5c9cef587e22ffcc46102f2
-
SHA512
4153dd2f8b318d4dae2c32e7a11e6b3298419bf4d2f40cad88e055e87222783d697b00ba780187a33e39d8eb77564abc3e7f1e921483c9ad2ec5d679195344ac
-
SSDEEP
1536:wJHHw5hJZ+1XflXKJt6xsblCFOIYoVg/SQsWmcdm61gijj6igIQ52xIr:wJHQjJZ+1PO6xsJEg/Lm6Gijj6FIKUI
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 5088 3736 WerFault.exe 80 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3940 wrote to memory of 3736 3940 rundll32.exe 80 PID 3940 wrote to memory of 3736 3940 rundll32.exe 80 PID 3940 wrote to memory of 3736 3940 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\sps.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\sps.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3736 -s 4763⤵
- Program crash
PID:5088
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 3736 -ip 37361⤵PID:3568