Analysis
-
max time kernel
94s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2024 11:11
Static task
static1
Behavioral task
behavioral1
Sample
InstaIIer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
InstaIIer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
re86x.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
re86x.dll
Resource
win10v2004-20241007-en
General
-
Target
re86x.dll
-
Size
177.8MB
-
MD5
a17f011e58699c816cb3511fc14a5e3d
-
SHA1
4a69475a7d523239f61d2fca759c35776d256eb0
-
SHA256
be3283d6c64766a6d950a93f42164e82f93d30409697a693a7a6d8759935abdd
-
SHA512
c5d1864bae174a523bc52026107f05de00f64401ea1a0bd037ea4eedba9abcace1e17381b3f33ced4e7ee8d54bba1b9b184750883c3a2a9feacf1dcb8ad62157
-
SSDEEP
24576:VJ1jpSL+6UfDq80kdLx5IyYIfNvLw94Sx7aPuIaWutQrXttq89PZV53rnN7rjRLT:P1jpKNUfDq80kdDIyYIxa4Sx7aP
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4656 5104 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3848 wrote to memory of 5104 3848 rundll32.exe rundll32.exe PID 3848 wrote to memory of 5104 3848 rundll32.exe rundll32.exe PID 3848 wrote to memory of 5104 3848 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\re86x.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\re86x.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 6523⤵
- Program crash
PID:4656
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5104 -ip 51041⤵PID:1488