Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 06:56

General

  • Target

    System32.exe

  • Size

    5.3MB

  • MD5

    d4817ea043beaf35d19fa6a5adaa179c

  • SHA1

    bf5c75100142731e737c04b55769c4479bef0c01

  • SHA256

    da5844b02ebfa56b4c036ea50136e7766922fa1591d344130f5492e5624fdf5d

  • SHA512

    98d2f67523de2260cad45ce2b3f0e6edd5322ad4d2d78854983c3410398079f1a0dd3f8b3dc69d3e0f052c566de3eb89d1de9a086378f542b1a2096ce0730277

  • SSDEEP

    98304:euP+GgrLRHeOxxsJFoQYVCkOTfOKfKQMZ8htPwCakmxrcTZcV+TQB:l+GgLRJghYckmmKfFMZqtMkicZcV2e

Malware Config

Extracted

Family

redline

Botnet

duc

C2

159.223.34.114:1912

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 6 IoCs
  • Themida packer 15 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Drops file in Windows directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\System32.exe
    "C:\Users\Admin\AppData\Local\Temp\System32.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3628
    • \??\c:\users\admin\appdata\local\temp\system32.exe 
      c:\users\admin\appdata\local\temp\system32.exe 
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1508
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3588
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4804
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4464
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Drops file in System32 directory
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4260
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:3968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\system32.exe 

    Filesize

    300KB

    MD5

    c368cb0e4cc65cbdc012e449de37d973

    SHA1

    ae04d634ff3078e1912dc71d44c893c1dd47c399

    SHA256

    57a8157689acab60874b086408091b4369f3f5f9d62bcc306c9e77ff9f3c5b7e

    SHA512

    e823a91ee1f8901ebc844d16ed1c585bd78fcf6fa143433649c1295f3724ddd29679949ec7b97485505b259e4ce7d012948f971451f0bde6b525cc915e3ed18a

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    5.6MB

    MD5

    7cb5aac1306f6db8e0d69c30d2113318

    SHA1

    cd55ca85d46e24e0c59320f09b7c282e6d12a137

    SHA256

    9ca180e32df731a19cf0e9dbf938342df3d6b32747b30985da5550194165695d

    SHA512

    aa8b985406562e52d28ffc801669be5b2b8896470c33a093dacfe17fe598846e4c21823c4e65383b41c44e46a57a7fbd8d5d416f82d7e292616f174df88a663a

  • C:\Windows\Resources\Themes\icsys.icn.exe

    Filesize

    5.0MB

    MD5

    6a696257bd624ea0cdde713ff447b134

    SHA1

    fa17806195d1fb5a2077a7d43827f58832d57c35

    SHA256

    c2234864d3687f6eb397fc0fe4c81d2c54dbcf74161ab38b48a1150df753c573

    SHA512

    b49ac9b20ab4f1c8b7793f1c007ee7985f9c11c0c5c67cf99436f22275efca504a20480a0d6cf52c793060eb78f090a66d33a5f37bffe678591b16a55d7d94ae

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    5.6MB

    MD5

    ea4146451052cd24e5afa11f6bbbb014

    SHA1

    671dd3202bea3a99c9dee67ae8dbc07e93da346f

    SHA256

    183a57b7ce1a6480a92eca49399bb7d0a2d0df323d08ac2e0dcb24ed09222e77

    SHA512

    c2fd2ce41a9f80330ea819e14c6785605a34740e975b483835aad841ef29d306a8fd3f2b5b6f0f517d197dc21d98a7d19733719c6e1f08b8aeeeff897d65368a

  • C:\Windows\Resources\svchost.exe

    Filesize

    5.6MB

    MD5

    1dbe3c130fddc2210326bb84c2c5238e

    SHA1

    78eb5fff424d927f6d924a8dc174d27feaa58a60

    SHA256

    9c1c20f062025e827c3e747824ba4e849fa9416a44849890fda7cc3c62ba447f

    SHA512

    31f535aad186a462e86eb613a45c91339bf75185e3b0301263b94a33e710ff6552a98d9283332e8e6bf24a3337b06e278cea9d24df45eca2898a9fcdda4b2d92

  • memory/1508-17-0x00000000055C0000-0x00000000056CA000-memory.dmp

    Filesize

    1.0MB

  • memory/1508-19-0x0000000005550000-0x000000000558C000-memory.dmp

    Filesize

    240KB

  • memory/1508-14-0x0000000074840000-0x0000000074FF0000-memory.dmp

    Filesize

    7.7MB

  • memory/1508-15-0x0000000005410000-0x000000000541A000-memory.dmp

    Filesize

    40KB

  • memory/1508-16-0x00000000063D0000-0x00000000069E8000-memory.dmp

    Filesize

    6.1MB

  • memory/1508-12-0x0000000005800000-0x0000000005DA4000-memory.dmp

    Filesize

    5.6MB

  • memory/1508-18-0x00000000054F0000-0x0000000005502000-memory.dmp

    Filesize

    72KB

  • memory/1508-13-0x0000000005250000-0x00000000052E2000-memory.dmp

    Filesize

    584KB

  • memory/1508-20-0x00000000056D0000-0x000000000571C000-memory.dmp

    Filesize

    304KB

  • memory/1508-11-0x0000000000800000-0x0000000000852000-memory.dmp

    Filesize

    328KB

  • memory/1508-23-0x000000007484E000-0x000000007484F000-memory.dmp

    Filesize

    4KB

  • memory/1508-10-0x000000007484E000-0x000000007484F000-memory.dmp

    Filesize

    4KB

  • memory/1508-27-0x0000000074840000-0x0000000074FF0000-memory.dmp

    Filesize

    7.7MB

  • memory/3588-28-0x0000000000400000-0x0000000000FE2000-memory.dmp

    Filesize

    11.9MB

  • memory/3588-65-0x0000000000400000-0x0000000000FE2000-memory.dmp

    Filesize

    11.9MB

  • memory/3628-21-0x0000000000400000-0x0000000000FE2000-memory.dmp

    Filesize

    11.9MB

  • memory/3628-0-0x0000000000400000-0x0000000000FE2000-memory.dmp

    Filesize

    11.9MB

  • memory/3628-64-0x0000000000400000-0x0000000000FE2000-memory.dmp

    Filesize

    11.9MB

  • memory/3628-1-0x00000000777D4000-0x00000000777D6000-memory.dmp

    Filesize

    8KB

  • memory/3968-61-0x0000000000400000-0x0000000000FE2000-memory.dmp

    Filesize

    11.9MB

  • memory/4260-68-0x0000000000400000-0x0000000000FE2000-memory.dmp

    Filesize

    11.9MB

  • memory/4464-45-0x0000000000400000-0x0000000000FE2000-memory.dmp

    Filesize

    11.9MB

  • memory/4464-62-0x0000000000400000-0x0000000000FE2000-memory.dmp

    Filesize

    11.9MB

  • memory/4804-66-0x0000000000400000-0x0000000000FE2000-memory.dmp

    Filesize

    11.9MB

  • memory/4804-80-0x0000000000400000-0x0000000000FE2000-memory.dmp

    Filesize

    11.9MB