Analysis
-
max time kernel
93s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 07:54
Static task
static1
Behavioral task
behavioral1
Sample
InstaIIer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
InstaIIer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
re86x.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
re86x.dll
Resource
win10v2004-20241007-en
General
-
Target
re86x.dll
-
Size
177.8MB
-
MD5
a17f011e58699c816cb3511fc14a5e3d
-
SHA1
4a69475a7d523239f61d2fca759c35776d256eb0
-
SHA256
be3283d6c64766a6d950a93f42164e82f93d30409697a693a7a6d8759935abdd
-
SHA512
c5d1864bae174a523bc52026107f05de00f64401ea1a0bd037ea4eedba9abcace1e17381b3f33ced4e7ee8d54bba1b9b184750883c3a2a9feacf1dcb8ad62157
-
SSDEEP
24576:VJ1jpSL+6UfDq80kdLx5IyYIfNvLw94Sx7aPuIaWutQrXttq89PZV53rnN7rjRLT:P1jpKNUfDq80kdDIyYIxa4Sx7aP
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3348 2240 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2240 2776 rundll32.exe 85 PID 2776 wrote to memory of 2240 2776 rundll32.exe 85 PID 2776 wrote to memory of 2240 2776 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\re86x.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\re86x.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 6563⤵
- Program crash
PID:3348
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2240 -ip 22401⤵PID:2204