Overview
overview
10Static
static
Kirame.Bui...er.exe
windows10-2004-x64
10Kirame.Hos...st.exe
windows10-2004-x64
7Kirame.Loa...er.exe
windows10-2004-x64
8Panel/RedL...el.exe
windows10-2004-x64
10Panel/RedL...me.exe
windows10-2004-x64
8Panel/RedL...48.exe
windows10-2004-x64
8Panel/RedL...ar.exe
windows10-2004-x64
1Analysis
-
max time kernel
30s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 22:01
Static task
static1
Behavioral task
behavioral1
Sample
Kirame.Builder/Kirame.Builder.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral2
Sample
Kirame.Host/Kirame.Host.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
Kirame.Loader/Kirame.Loader.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
Panel/RedLine20_22/Panel/Panel.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
Panel/RedLine20_22/Tools/Chrome.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral6
Sample
Panel/RedLine20_22/Tools/NetFramework48.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
Panel/RedLine20_22/Tools/WinRar.exe
Resource
win10v2004-20220812-en
General
-
Target
Kirame.Host/Kirame.Host.exe
-
Size
1.6MB
-
MD5
c7085202e7a5620160f9d4fdf1219df2
-
SHA1
abe00b161c2f83ee83133b187262bf6289e88339
-
SHA256
00b2a7341252cef219c7070853a4e7cf4ce086a69de1c10ceee91fe8a6add013
-
SHA512
8f91ba27d9f83be857c12b2b9339ebd83f2f77c11f3d4610347de3f8a54321e25d1ff197596fc952da0920344990738a8de57921250e03c2c4bc340c4b4e7640
-
SSDEEP
24576:eQi2Q9NXw2/wPOjdGxYqfw+Jwz/S/6RZs8nVW6k5JHkARt7DBAqn+/:evTq24GjdGSgw+W7SCRnVQTEQ/BA8+
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Kirame.Host.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Kirame.Host.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Kirame.Host.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Kirame.Host.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 13 ip-api.com 18 icanhazip.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Kirame.Host.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Kirame.Host.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Kirame.Host.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
Kirame.Host.exepid process 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe 2828 Kirame.Host.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Kirame.Host.exemsiexec.exedescription pid process Token: SeDebugPrivilege 2828 Kirame.Host.exe Token: SeSecurityPrivilege 732 msiexec.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
Kirame.Host.execmd.execmd.exedescription pid process target process PID 2828 wrote to memory of 3692 2828 Kirame.Host.exe cmd.exe PID 2828 wrote to memory of 3692 2828 Kirame.Host.exe cmd.exe PID 2828 wrote to memory of 3692 2828 Kirame.Host.exe cmd.exe PID 3692 wrote to memory of 116 3692 cmd.exe chcp.com PID 3692 wrote to memory of 116 3692 cmd.exe chcp.com PID 3692 wrote to memory of 116 3692 cmd.exe chcp.com PID 3692 wrote to memory of 2792 3692 cmd.exe netsh.exe PID 3692 wrote to memory of 2792 3692 cmd.exe netsh.exe PID 3692 wrote to memory of 2792 3692 cmd.exe netsh.exe PID 3692 wrote to memory of 1840 3692 cmd.exe findstr.exe PID 3692 wrote to memory of 1840 3692 cmd.exe findstr.exe PID 3692 wrote to memory of 1840 3692 cmd.exe findstr.exe PID 2828 wrote to memory of 4812 2828 Kirame.Host.exe cmd.exe PID 2828 wrote to memory of 4812 2828 Kirame.Host.exe cmd.exe PID 2828 wrote to memory of 4812 2828 Kirame.Host.exe cmd.exe PID 4812 wrote to memory of 3372 4812 cmd.exe chcp.com PID 4812 wrote to memory of 3372 4812 cmd.exe chcp.com PID 4812 wrote to memory of 3372 4812 cmd.exe chcp.com PID 4812 wrote to memory of 1652 4812 cmd.exe netsh.exe PID 4812 wrote to memory of 1652 4812 cmd.exe netsh.exe PID 4812 wrote to memory of 1652 4812 cmd.exe netsh.exe -
outlook_office_path 1 IoCs
Processes:
Kirame.Host.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Kirame.Host.exe -
outlook_win_path 1 IoCs
Processes:
Kirame.Host.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Kirame.Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Kirame.Host\Kirame.Host.exe"C:\Users\Admin\AppData\Local\Temp\Kirame.Host\Kirame.Host.exe"1⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile3⤵
-
C:\Windows\SysWOW64\findstr.exefindstr All3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid3⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/116-137-0x0000000000000000-mapping.dmp
-
memory/1652-142-0x0000000000000000-mapping.dmp
-
memory/1840-139-0x0000000000000000-mapping.dmp
-
memory/2792-138-0x0000000000000000-mapping.dmp
-
memory/2828-132-0x0000000000250000-0x00000000003E8000-memory.dmpFilesize
1.6MB
-
memory/2828-133-0x0000000004D60000-0x0000000004DC6000-memory.dmpFilesize
408KB
-
memory/2828-134-0x0000000006AE0000-0x0000000006B72000-memory.dmpFilesize
584KB
-
memory/2828-136-0x0000000007130000-0x00000000076D4000-memory.dmpFilesize
5.6MB
-
memory/2828-143-0x00000000064B0000-0x00000000064D2000-memory.dmpFilesize
136KB
-
memory/3372-141-0x0000000000000000-mapping.dmp
-
memory/3692-135-0x0000000000000000-mapping.dmp
-
memory/4812-140-0x0000000000000000-mapping.dmp