Resubmissions

28-01-2023 03:33

230128-d4c5taea49 10

28-01-2023 03:25

230128-dyre9afd41 10

Analysis

  • max time kernel
    132s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-01-2023 03:33

General

  • Target

    Redline_20_2_crack/Kurome.Loader/Kurome.Loader.exe.xml

  • Size

    186B

  • MD5

    9070d769fd43fb9def7e9954fba4c033

  • SHA1

    de4699cdf9ad03aef060470c856f44d3faa7ea7f

  • SHA256

    cbaf2ae95b1133026c58ab6362af2f7fb2a1871d7ad58b87bd73137598228d9b

  • SHA512

    170028b66c5d2db2b8c90105b77b0b691bf9528dc9f07d4b3983d93e9e37ea1154095aaf264fb8b5e67c167239697337cc9e585e87ef35faa65a969cac1aa518

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Redline_20_2_crack\Kurome.Loader\Kurome.Loader.exe.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Redline_20_2_crack\Kurome.Loader\Kurome.Loader.exe.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3404

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    3c486fb0e6d6c3fc2cfc41d0874a375f

    SHA1

    48a3c684b7b0506d15b4809e64a8bd1e576dd5d5

    SHA256

    ab04fae12e6a7cafbdce3dad263868876efb426e6adecc7d3d5852f5df9b4cb6

    SHA512

    0890911990fdd198966ba9537566beec4f729f421203efc8083c101c4c59399223bf52e98a18ff4fba0d74c88da9428c2cf19068630f9567b6befe9818454546

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    0bdab33ce7ce153f52609e20355ae1e8

    SHA1

    47bd1c2bb3a9058f9a145d5b196bed4856535b50

    SHA256

    86162c6a27c57fa592448cbff98b908fed1dfa31203a86dc86f7c40e15280c2b

    SHA512

    54694711ead92444793e7eac129379dba6b91c4d06597d130e0270e72d26fb104491272d1776be3e0f20686e3eebc3bd1b4a65a30ce7b2517108e145d6c47a37

  • memory/2348-132-0x00007FFA01630000-0x00007FFA01640000-memory.dmp
    Filesize

    64KB

  • memory/2348-133-0x00007FFA01630000-0x00007FFA01640000-memory.dmp
    Filesize

    64KB

  • memory/2348-134-0x00007FFA01630000-0x00007FFA01640000-memory.dmp
    Filesize

    64KB

  • memory/2348-135-0x00007FFA01630000-0x00007FFA01640000-memory.dmp
    Filesize

    64KB

  • memory/2348-136-0x00007FFA01630000-0x00007FFA01640000-memory.dmp
    Filesize

    64KB

  • memory/2348-137-0x00007FFA01630000-0x00007FFA01640000-memory.dmp
    Filesize

    64KB

  • memory/2348-138-0x00007FFA01630000-0x00007FFA01640000-memory.dmp
    Filesize

    64KB

  • memory/2348-139-0x00007FFA01630000-0x00007FFA01640000-memory.dmp
    Filesize

    64KB

  • memory/2348-140-0x00007FFA01630000-0x00007FFA01640000-memory.dmp
    Filesize

    64KB