Overview
overview
10Static
static
10Kirame.Bui...er.exe
windows7-x64
10Kirame.Bui...er.exe
windows10-2004-x64
10Kirame.Bui...db.dll
windows7-x64
1Kirame.Bui...db.dll
windows10-2004-x64
1Kirame.Bui...db.dll
windows7-x64
1Kirame.Bui...db.dll
windows10-2004-x64
1Kirame.Bui...ks.dll
windows7-x64
1Kirame.Bui...ks.dll
windows10-2004-x64
1Kirame.Bui...il.dll
windows7-x64
1Kirame.Bui...il.dll
windows10-2004-x64
1Kirame.Hos...st.exe
windows7-x64
10Kirame.Hos...st.exe
windows10-2004-x64
10Kirame.Hos...me.dll
windows7-x64
1Kirame.Hos...me.dll
windows10-2004-x64
1Kirame.Loa...er.exe
windows7-x64
7Kirame.Loa...er.exe
windows10-2004-x64
7Panel/RedL...el.exe
windows7-x64
10Panel/RedL...el.exe
windows10-2004-x64
10Panel/RedL...me.exe
windows7-x64
6Panel/RedL...me.exe
windows10-2004-x64
6Panel/RedL...48.exe
windows7-x64
7Panel/RedL...48.exe
windows10-2004-x64
7Panel/RedL...ar.exe
windows7-x64
1Panel/RedL...ar.exe
windows10-2004-x64
1Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 23:22
Behavioral task
behavioral1
Sample
Kirame.Builder/Kirame.Builder.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Kirame.Builder/Kirame.Builder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Kirame.Builder/Mono.Cecil.Mdb.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Kirame.Builder/Mono.Cecil.Mdb.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Kirame.Builder/Mono.Cecil.Pdb.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Kirame.Builder/Mono.Cecil.Pdb.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Kirame.Builder/Mono.Cecil.Rocks.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Kirame.Builder/Mono.Cecil.Rocks.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Kirame.Builder/Mono.Cecil.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Kirame.Builder/Mono.Cecil.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Kirame.Host/Kirame.Host.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Kirame.Host/Kirame.Host.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Kirame.Host/Kirame.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Kirame.Host/Kirame.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Kirame.Loader/Kirame.Loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Kirame.Loader/Kirame.Loader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Panel/RedLine20_22/Panel/Panel.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Panel/RedLine20_22/Panel/Panel.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Panel/RedLine20_22/Tools/Chrome.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
Panel/RedLine20_22/Tools/Chrome.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Panel/RedLine20_22/Tools/NetFramework48.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Panel/RedLine20_22/Tools/NetFramework48.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Panel/RedLine20_22/Tools/WinRar.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
Panel/RedLine20_22/Tools/WinRar.exe
Resource
win10v2004-20241007-en
General
-
Target
Kirame.Loader/Kirame.Loader.exe
-
Size
779KB
-
MD5
341544d48dffd2ea814db70b1ab59868
-
SHA1
27eb7de97fd9aa568cab1c23483058c7ff78cc70
-
SHA256
88d9c1fde490e92f60b2ec1a3b31f73358449edc3f4a91702d206204be848fdc
-
SHA512
26adaea9fdc82e30cdd871bd6fa9e39aeb00f31a99449b1313235724a11fae928ae7602f8d61975a128d658b966cb4c735f5585197b7d23c7d5c82b7e427dc45
-
SSDEEP
6144:6rxmnlXOdKHVE+1KEVmYVZDbrsVLKxWe/s9qfvowhaAMV3eXgfQULGb3WOaZGwbi:eml1OAUYeKxWe0eJueQffLG7rPWoi89
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation YQJDS.exe -
Executes dropped EXE 1 IoCs
pid Process 3384 YQJDS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4288 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1100 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2088 Kirame.Loader.exe Token: SeDebugPrivilege 3384 YQJDS.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2088 wrote to memory of 3668 2088 Kirame.Loader.exe 85 PID 2088 wrote to memory of 3668 2088 Kirame.Loader.exe 85 PID 3668 wrote to memory of 4288 3668 cmd.exe 87 PID 3668 wrote to memory of 4288 3668 cmd.exe 87 PID 3668 wrote to memory of 3384 3668 cmd.exe 93 PID 3668 wrote to memory of 3384 3668 cmd.exe 93 PID 3384 wrote to memory of 2984 3384 YQJDS.exe 95 PID 3384 wrote to memory of 2984 3384 YQJDS.exe 95 PID 2984 wrote to memory of 1100 2984 cmd.exe 97 PID 2984 wrote to memory of 1100 2984 cmd.exe 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Kirame.Loader\Kirame.Loader.exe"C:\Users\Admin\AppData\Local\Temp\Kirame.Loader\Kirame.Loader.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA1FD.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4288
-
-
C:\ProgramData\Cheat\YQJDS.exe"C:\ProgramData\Cheat\YQJDS.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "YQJDS" /tr "C:\ProgramData\Cheat\YQJDS.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "YQJDS" /tr "C:\ProgramData\Cheat\YQJDS.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:1100
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779KB
MD5341544d48dffd2ea814db70b1ab59868
SHA127eb7de97fd9aa568cab1c23483058c7ff78cc70
SHA25688d9c1fde490e92f60b2ec1a3b31f73358449edc3f4a91702d206204be848fdc
SHA51226adaea9fdc82e30cdd871bd6fa9e39aeb00f31a99449b1313235724a11fae928ae7602f8d61975a128d658b966cb4c735f5585197b7d23c7d5c82b7e427dc45
-
Filesize
139B
MD592ed03d297064b93a9014be200f29dba
SHA183394aa3556046898f1ba2276bff51948ef318a3
SHA256af96a2f55b7d22f19531a958f0c0b80bc0038aa816923a57b3b661b55cf93fc6
SHA512c69d065512df1802718a240dbff56d6b75d8e6e3e1fc634c0575ea9a32fa2afb9940226856207e6c06f28dd4ef4c7368aaab76985603fa18144709bcf1c3e156