Overview
overview
10Static
static
10Redline_20...er.exe
windows7-x64
1Redline_20...er.exe
windows10-2004-x64
1Redline_20...db.dll
windows7-x64
1Redline_20...db.dll
windows10-2004-x64
1Redline_20...db.dll
windows7-x64
1Redline_20...db.dll
windows10-2004-x64
1Redline_20...ks.dll
windows7-x64
1Redline_20...ks.dll
windows10-2004-x64
1Redline_20...il.dll
windows7-x64
1Redline_20...il.dll
windows10-2004-x64
1Redline_20...ld.exe
windows7-x64
10Redline_20...ld.exe
windows10-2004-x64
10Redline_20...ub.exe
windows7-x64
10Redline_20...ub.exe
windows10-2004-x64
10Redline_20...st.exe
windows7-x64
1Redline_20...st.exe
windows10-2004-x64
1Redline_20...CF.dll
windows7-x64
1Redline_20...CF.dll
windows10-2004-x64
1Redline_20...er.exe
windows7-x64
4Redline_20...er.exe
windows10-2004-x64
4Redline_20...xe.xml
windows7-x64
1Redline_20...xe.xml
windows10-2004-x64
1Redline_20...).docx
windows7-x64
4Redline_20...).docx
windows10-2004-x64
1Redline_20...).docx
windows7-x64
4Redline_20...).docx
windows10-2004-x64
1Redline_20...el.exe
windows7-x64
10Redline_20...el.exe
windows10-2004-x64
10Redline_20...me.exe
windows7-x64
8Redline_20...me.exe
windows10-2004-x64
8Redline_20...48.exe
windows7-x64
8Redline_20...48.exe
windows10-2004-x64
8Analysis
-
max time kernel
90s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-01-2023 03:12
Behavioral task
behavioral1
Sample
Redline_20_2_crack/Kurome.Builder/Kurome.Builder.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Redline_20_2_crack/Kurome.Builder/Kurome.Builder.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
Redline_20_2_crack/Kurome.Builder/Mono.Cecil.Mdb.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Redline_20_2_crack/Kurome.Builder/Mono.Cecil.Mdb.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
Redline_20_2_crack/Kurome.Builder/Mono.Cecil.Pdb.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
Redline_20_2_crack/Kurome.Builder/Mono.Cecil.Pdb.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
Redline_20_2_crack/Kurome.Builder/Mono.Cecil.Rocks.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
Redline_20_2_crack/Kurome.Builder/Mono.Cecil.Rocks.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
Redline_20_2_crack/Kurome.Builder/Mono.Cecil.dll
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
Redline_20_2_crack/Kurome.Builder/Mono.Cecil.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
Redline_20_2_crack/Kurome.Builder/build.exe
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
Redline_20_2_crack/Kurome.Builder/build.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
Redline_20_2_crack/Kurome.Builder/stub.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
Redline_20_2_crack/Kurome.Builder/stub.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
Redline_20_2_crack/Kurome.Host/Kurome.Host.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
Redline_20_2_crack/Kurome.Host/Kurome.Host.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral17
Sample
Redline_20_2_crack/Kurome.Host/Kurome.WCF.dll
Resource
win7-20221111-en
Behavioral task
behavioral18
Sample
Redline_20_2_crack/Kurome.Host/Kurome.WCF.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
Redline_20_2_crack/Kurome.Loader/Kurome.Loader.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
Redline_20_2_crack/Kurome.Loader/Kurome.Loader.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
Redline_20_2_crack/Kurome.Loader/Kurome.Loader.exe.xml
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
Redline_20_2_crack/Kurome.Loader/Kurome.Loader.exe.xml
Resource
win10v2004-20220901-en
Behavioral task
behavioral23
Sample
Redline_20_2_crack/Panel/RedLine_20_2/FAQ (English).docx
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
Redline_20_2_crack/Panel/RedLine_20_2/FAQ (English).docx
Resource
win10v2004-20221111-en
Behavioral task
behavioral25
Sample
Redline_20_2_crack/Panel/RedLine_20_2/FAQ(RUS).docx
Resource
win7-20221111-en
Behavioral task
behavioral26
Sample
Redline_20_2_crack/Panel/RedLine_20_2/FAQ(RUS).docx
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
Redline_20_2_crack/Panel/RedLine_20_2/Panel/Panel.exe
Resource
win7-20221111-en
Behavioral task
behavioral28
Sample
Redline_20_2_crack/Panel/RedLine_20_2/Panel/Panel.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
Redline_20_2_crack/Panel/RedLine_20_2/Tools/Chrome.exe
Resource
win7-20221111-en
Behavioral task
behavioral30
Sample
Redline_20_2_crack/Panel/RedLine_20_2/Tools/Chrome.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
Redline_20_2_crack/Panel/RedLine_20_2/Tools/NetFramework48.exe
Resource
win7-20221111-en
Behavioral task
behavioral32
Sample
Redline_20_2_crack/Panel/RedLine_20_2/Tools/NetFramework48.exe
Resource
win10v2004-20221111-en
General
-
Target
Redline_20_2_crack/Kurome.Loader/Kurome.Loader.exe.xml
-
Size
186B
-
MD5
9070d769fd43fb9def7e9954fba4c033
-
SHA1
de4699cdf9ad03aef060470c856f44d3faa7ea7f
-
SHA256
cbaf2ae95b1133026c58ab6362af2f7fb2a1871d7ad58b87bd73137598228d9b
-
SHA512
170028b66c5d2db2b8c90105b77b0b691bf9528dc9f07d4b3983d93e9e37ea1154095aaf264fb8b5e67c167239697337cc9e585e87ef35faa65a969cac1aa518
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fbec07815684004d899a318f710de6af00000000020000000000106600000001000020000000fdf246aec385acb40f55ae7e251dd50ee1729157d1c5f344001c2c5ae58f1cbf000000000e8000000002000020000000195a30735918cdf190802f3d12ef8eaa2dbe43aa2a6303ac52b67060193b039c200000003f20a3f5e88c364b44e3799127558d00a7bf723bb1729c4449dfb16553a85feb40000000ac867b56cc95e2cc8afae732b1d3a3c16a68360a8ddec4fe2506f1f98394c0e361410c7b4f59d21bddadfe21be44ae03ab40f289e16d0a7cf942ff1db08109f1 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9021bbe8ce32d901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1317B431-9EC2-11ED-8639-62E10F117DDC} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "381644166" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 1340 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid process 1340 IEXPLORE.EXE 1340 IEXPLORE.EXE 1640 IEXPLORE.EXE 1640 IEXPLORE.EXE 1640 IEXPLORE.EXE 1640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
MSOXMLED.EXEiexplore.exeIEXPLORE.EXEdescription pid process target process PID 2044 wrote to memory of 1576 2044 MSOXMLED.EXE iexplore.exe PID 2044 wrote to memory of 1576 2044 MSOXMLED.EXE iexplore.exe PID 2044 wrote to memory of 1576 2044 MSOXMLED.EXE iexplore.exe PID 2044 wrote to memory of 1576 2044 MSOXMLED.EXE iexplore.exe PID 1576 wrote to memory of 1340 1576 iexplore.exe IEXPLORE.EXE PID 1576 wrote to memory of 1340 1576 iexplore.exe IEXPLORE.EXE PID 1576 wrote to memory of 1340 1576 iexplore.exe IEXPLORE.EXE PID 1576 wrote to memory of 1340 1576 iexplore.exe IEXPLORE.EXE PID 1340 wrote to memory of 1640 1340 IEXPLORE.EXE IEXPLORE.EXE PID 1340 wrote to memory of 1640 1340 IEXPLORE.EXE IEXPLORE.EXE PID 1340 wrote to memory of 1640 1340 IEXPLORE.EXE IEXPLORE.EXE PID 1340 wrote to memory of 1640 1340 IEXPLORE.EXE IEXPLORE.EXE
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Redline_20_2_crack\Kurome.Loader\Kurome.Loader.exe.xml"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1340 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7M330EX5.txtFilesize
605B
MD54d6ed1d32720ef839259d4e16f36799b
SHA187e561ed680028b3dd03b059b83a1310f77ffba4
SHA2561f0265a467d84d02993c6728153da212c9782ee96c801db60b2e65d84dd0fa95
SHA512ac9e54e8ebd2e191f711eb668f6331fff29789081e4bc5b4fa9508518de0a1e2269f467bcbd5e03c8821418a47680af8e95704e294cd70d62db8593ea38705f2
-
memory/2044-54-0x00000000767F1000-0x00000000767F3000-memory.dmpFilesize
8KB