Overview
overview
10Static
static
3net8.0-windows.rar
windows7-x64
3net8.0-windows.rar
windows10-2004-x64
10RLTool.deps.json
windows7-x64
3RLTool.deps.json
windows10-2004-x64
3RLTool.exe
windows7-x64
1RLTool.exe
windows10-2004-x64
1RLTool.exe
windows7-x64
1RLTool.exe
windows10-2004-x64
1RLTool.pdb
windows7-x64
3RLTool.pdb
windows10-2004-x64
3RLTool.run...g.json
windows7-x64
3RLTool.run...g.json
windows10-2004-x64
3Analysis
-
max time kernel
480s -
max time network
485s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 02:24
Static task
static1
Behavioral task
behavioral1
Sample
net8.0-windows.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
net8.0-windows.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
RLTool.deps.json
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
RLTool.deps.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
RLTool.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
RLTool.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
RLTool.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
RLTool.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
RLTool.pdb
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
RLTool.pdb
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
RLTool.runtimeconfig.json
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
RLTool.runtimeconfig.json
Resource
win10v2004-20240802-en
General
-
Target
net8.0-windows.rar
-
Size
69KB
-
MD5
f5c0cace207517b9cb2d92a1f6a2fa9c
-
SHA1
262b21de4b8a0b1c34269e65cba66215520d4983
-
SHA256
2aba1393ad9d161d34c473e633196be971ac8d13a988fb4206568d739a8b5cfb
-
SHA512
e53b510ac48352eb437943b0cbafd5de3f2ca22afc5d58d54af0a639d1d927a71fe3d5b6f65b476536d9f66a2639bd1ebaf482b07ab6d796d6df4c5d31a4243c
-
SSDEEP
1536:ZUHUX4uLyZy2Jd9PEBiKx2qfE65xSXZrfjzgjepCrdQeGm:0Uou32rFEBiK8qsU0XFd+Gm
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1668 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1088 wrote to memory of 1668 1088 cmd.exe 30 PID 1088 wrote to memory of 1668 1088 cmd.exe 30 PID 1088 wrote to memory of 1668 1088 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\net8.0-windows.rar1⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\net8.0-windows.rar2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:1668
-