Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Kirame.Bui...er.exe
windows7-x64
10Kirame.Bui...er.exe
windows10-2004-x64
10Kirame.Bui...db.dll
windows7-x64
1Kirame.Bui...db.dll
windows10-2004-x64
1Kirame.Bui...db.dll
windows7-x64
1Kirame.Bui...db.dll
windows10-2004-x64
1Kirame.Bui...ks.dll
windows7-x64
1Kirame.Bui...ks.dll
windows10-2004-x64
1Kirame.Bui...il.dll
windows7-x64
1Kirame.Bui...il.dll
windows10-2004-x64
1Kirame.Hos...st.exe
windows7-x64
10Kirame.Hos...st.exe
windows10-2004-x64
10Kirame.Hos...me.dll
windows7-x64
1Kirame.Hos...me.dll
windows10-2004-x64
1Kirame.Loa...er.exe
windows7-x64
7Kirame.Loa...er.exe
windows10-2004-x64
7Panel/RedL...el.exe
windows7-x64
10Panel/RedL...el.exe
windows10-2004-x64
10Panel/RedL...me.exe
windows7-x64
6Panel/RedL...me.exe
windows10-2004-x64
6Panel/RedL...48.exe
windows7-x64
7Panel/RedL...48.exe
windows10-2004-x64
7Panel/RedL...ar.exe
windows7-x64
1Panel/RedL...ar.exe
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/11/2024, 23:22
Behavioral task
behavioral1
Sample
Kirame.Builder/Kirame.Builder.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Kirame.Builder/Kirame.Builder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Kirame.Builder/Mono.Cecil.Mdb.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Kirame.Builder/Mono.Cecil.Mdb.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Kirame.Builder/Mono.Cecil.Pdb.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Kirame.Builder/Mono.Cecil.Pdb.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Kirame.Builder/Mono.Cecil.Rocks.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Kirame.Builder/Mono.Cecil.Rocks.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Kirame.Builder/Mono.Cecil.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Kirame.Builder/Mono.Cecil.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Kirame.Host/Kirame.Host.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Kirame.Host/Kirame.Host.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Kirame.Host/Kirame.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Kirame.Host/Kirame.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Kirame.Loader/Kirame.Loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Kirame.Loader/Kirame.Loader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Panel/RedLine20_22/Panel/Panel.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Panel/RedLine20_22/Panel/Panel.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Panel/RedLine20_22/Tools/Chrome.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
Panel/RedLine20_22/Tools/Chrome.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Panel/RedLine20_22/Tools/NetFramework48.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Panel/RedLine20_22/Tools/NetFramework48.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Panel/RedLine20_22/Tools/WinRar.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
Panel/RedLine20_22/Tools/WinRar.exe
Resource
win10v2004-20241007-en
General
-
Target
Kirame.Loader/Kirame.Loader.exe
-
Size
779KB
-
MD5
341544d48dffd2ea814db70b1ab59868
-
SHA1
27eb7de97fd9aa568cab1c23483058c7ff78cc70
-
SHA256
88d9c1fde490e92f60b2ec1a3b31f73358449edc3f4a91702d206204be848fdc
-
SHA512
26adaea9fdc82e30cdd871bd6fa9e39aeb00f31a99449b1313235724a11fae928ae7602f8d61975a128d658b966cb4c735f5585197b7d23c7d5c82b7e427dc45
-
SSDEEP
6144:6rxmnlXOdKHVE+1KEVmYVZDbrsVLKxWe/s9qfvowhaAMV3eXgfQULGb3WOaZGwbi:eml1OAUYeKxWe0eJueQffLG7rPWoi89
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 336 YQJDS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 624 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2820 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1924 Kirame.Loader.exe Token: SeDebugPrivilege 336 YQJDS.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2376 1924 Kirame.Loader.exe 30 PID 1924 wrote to memory of 2376 1924 Kirame.Loader.exe 30 PID 1924 wrote to memory of 2376 1924 Kirame.Loader.exe 30 PID 2376 wrote to memory of 624 2376 cmd.exe 32 PID 2376 wrote to memory of 624 2376 cmd.exe 32 PID 2376 wrote to memory of 624 2376 cmd.exe 32 PID 2376 wrote to memory of 336 2376 cmd.exe 33 PID 2376 wrote to memory of 336 2376 cmd.exe 33 PID 2376 wrote to memory of 336 2376 cmd.exe 33 PID 336 wrote to memory of 2904 336 YQJDS.exe 34 PID 336 wrote to memory of 2904 336 YQJDS.exe 34 PID 336 wrote to memory of 2904 336 YQJDS.exe 34 PID 2904 wrote to memory of 2820 2904 cmd.exe 36 PID 2904 wrote to memory of 2820 2904 cmd.exe 36 PID 2904 wrote to memory of 2820 2904 cmd.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Kirame.Loader\Kirame.Loader.exe"C:\Users\Admin\AppData\Local\Temp\Kirame.Loader\Kirame.Loader.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpB423.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:624
-
-
C:\ProgramData\Cheat\YQJDS.exe"C:\ProgramData\Cheat\YQJDS.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "YQJDS" /tr "C:\ProgramData\Cheat\YQJDS.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "YQJDS" /tr "C:\ProgramData\Cheat\YQJDS.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:2820
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779KB
MD5341544d48dffd2ea814db70b1ab59868
SHA127eb7de97fd9aa568cab1c23483058c7ff78cc70
SHA25688d9c1fde490e92f60b2ec1a3b31f73358449edc3f4a91702d206204be848fdc
SHA51226adaea9fdc82e30cdd871bd6fa9e39aeb00f31a99449b1313235724a11fae928ae7602f8d61975a128d658b966cb4c735f5585197b7d23c7d5c82b7e427dc45
-
Filesize
139B
MD55c7f76b7e1118966a47a06e4f48e60ab
SHA17996e4ccc27350fb01500f1143eb34f63a31aa3d
SHA25639819faedf04c930268db4db3044ad9d0ee03c1db3cce6438b8e8efb00d34b75
SHA5125ac79511213359e320fc3c965b13e80e483076f8bd5ab61fd1f36c12b54d4c060575d4e726ab43657b0fb3e90fdaf2b84e419fe4ddaa603c12023d8bad705828