Analysis

  • max time kernel
    153s
  • max time network
    161s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    09/03/2024, 10:51

General

  • Target

    InstaIIer.exe

  • Size

    150.4MB

  • MD5

    466d10b112ac7e5a7227601a93b945b7

  • SHA1

    d8de554a497b97edfc5b85132d9f8bf2df06fd19

  • SHA256

    bea6f749e878032e55c6cff812802f28225ae836009ad55a7f94c521daf919e6

  • SHA512

    0e93e18009afb436a46d61dea9e2346e270344890afc748caf94c0d888e981f70e4e6941ae0074cc9c8b8a42a6aaa23906ae7963a6050f8b7c7eb5cc034d47ed

  • SSDEEP

    1572864:f9sIp9dePx3boQ9zPx3veCvI+RJjaWIxdaJgAOB3i3wFO6Bj3yTEQjB4UR9OEm3:je15JHHgw9m

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\InstaIIer.exe
    "C:\Users\Admin\AppData\Local\Temp\InstaIIer.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4256
    • C:\Users\Admin\AppData\Local\Temp\InstaIIer.exe
      "C:\Users\Admin\AppData\Local\Temp\InstaIIer.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\InstaIIer" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1704,i,17892715016918664252,490056309651504890,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
        PID:5092
      • C:\Users\Admin\AppData\Local\Temp\InstaIIer.exe
        "C:\Users\Admin\AppData\Local\Temp\InstaIIer.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\InstaIIer" --mojo-platform-channel-handle=2012 --field-trial-handle=1704,i,17892715016918664252,490056309651504890,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
        2⤵
          PID:4060
        • C:\Users\Admin\AppData\Local\Temp\InstaIIer.exe
          "C:\Users\Admin\AppData\Local\Temp\InstaIIer.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\InstaIIer" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2252 --field-trial-handle=1704,i,17892715016918664252,490056309651504890,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
          2⤵
            PID:3904
          • C:\Users\Admin\AppData\Local\Temp\InstaIIer.exe
            "C:\Users\Admin\AppData\Local\Temp\InstaIIer.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --user-data-dir="C:\Users\Admin\AppData\Roaming\InstaIIer" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1704,i,17892715016918664252,490056309651504890,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:5068

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Roaming\InstaIIer\Network\Network Persistent State

                Filesize

                495B

                MD5

                237f0ab4ae6885e8772e578c1b558d86

                SHA1

                92216aa1f15c11ae5e36a33f2466a3033f4926e0

                SHA256

                0c66c20013b095b6c6dba1e2845ebd434383b27965b6d92d6df2d0ca974962eb

                SHA512

                0d794e62f965a5917b1979e0d1f3f5fa278ae11309cb8e7cdbb38eea9719379b6512d00cfcb2e6beec8f3b233b0f5ea2a2666fffbe140f537dcfa202cb9cae05

              • C:\Users\Admin\AppData\Roaming\InstaIIer\Network\Network Persistent State~RFe58f46d.TMP

                Filesize

                59B

                MD5

                2800881c775077e1c4b6e06bf4676de4

                SHA1

                2873631068c8b3b9495638c865915be822442c8b

                SHA256

                226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                SHA512

                e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

              • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                Filesize

                2B

                MD5

                f3b25701fe362ec84616a93a45ce9998

                SHA1

                d62636d8caec13f04e28442a0a6fa1afeb024bbb

                SHA256

                b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                SHA512

                98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

              • memory/5068-87-0x00000168ECF60000-0x00000168ECF61000-memory.dmp

                Filesize

                4KB

              • memory/5068-86-0x00000168ECF60000-0x00000168ECF61000-memory.dmp

                Filesize

                4KB

              • memory/5068-88-0x00000168ECF60000-0x00000168ECF61000-memory.dmp

                Filesize

                4KB

              • memory/5068-92-0x00000168ECF60000-0x00000168ECF61000-memory.dmp

                Filesize

                4KB

              • memory/5068-94-0x00000168ECF60000-0x00000168ECF61000-memory.dmp

                Filesize

                4KB

              • memory/5068-95-0x00000168ECF60000-0x00000168ECF61000-memory.dmp

                Filesize

                4KB

              • memory/5068-96-0x00000168ECF60000-0x00000168ECF61000-memory.dmp

                Filesize

                4KB

              • memory/5068-98-0x00000168ECF60000-0x00000168ECF61000-memory.dmp

                Filesize

                4KB

              • memory/5068-97-0x00000168ECF60000-0x00000168ECF61000-memory.dmp

                Filesize

                4KB

              • memory/5068-99-0x00000168ECF60000-0x00000168ECF61000-memory.dmp

                Filesize

                4KB

              • memory/5092-62-0x000001F3138A0000-0x000001F313C18000-memory.dmp

                Filesize

                3.5MB

              • memory/5092-2-0x00007FFEDAFA0000-0x00007FFEDAFA1000-memory.dmp

                Filesize

                4KB