Analysis

  • max time kernel
    359s
  • max time network
    360s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 02:24

General

  • Target

    RLTool.runtimeconfig.json

  • Size

    386B

  • MD5

    186a65581e2f29258f54d396660409fa

  • SHA1

    6f998d3be2e85cb5419205f867135874f27c0a3a

  • SHA256

    e1e0974d0e8833375024eb7c78521b3b5cad4228aad22b23d506cbe702445844

  • SHA512

    7dea87b523aab01ea3c794779b71bc0b52179e1d5e7b9a45539ddd39c775969ef22853c4c193699aec1e3fa3cbe26e90e3a4881226c52a3aacae1eac260ff896

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\RLTool.runtimeconfig.json
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\RLTool.runtimeconfig.json
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1644
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\RLTool.runtimeconfig.json"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    4a81d4b0d46202398053e832f1a1d1ce

    SHA1

    d67a892fef342febd04403a22773c73d347c7f13

    SHA256

    b3f1851dbc7508fc811939d2baf050acb5151bee244b49c54bc3f559b992e3a6

    SHA512

    e9699e4cc3fae9f7cd1caa14fbad69699d0d8f912610e2a0c16c45e21d2c32fd79d8a0221c46542ca80aad334d76159af14a75f9b3fcf3ae70335fb37d3fa04a