Overview
overview
10Static
static
3net8.0-windows.rar
windows7-x64
3net8.0-windows.rar
windows10-2004-x64
10RLTool.deps.json
windows7-x64
3RLTool.deps.json
windows10-2004-x64
3RLTool.exe
windows7-x64
1RLTool.exe
windows10-2004-x64
1RLTool.exe
windows7-x64
1RLTool.exe
windows10-2004-x64
1RLTool.pdb
windows7-x64
3RLTool.pdb
windows10-2004-x64
3RLTool.run...g.json
windows7-x64
3RLTool.run...g.json
windows10-2004-x64
3Analysis
-
max time kernel
359s -
max time network
360s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 02:24
Static task
static1
Behavioral task
behavioral1
Sample
net8.0-windows.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
net8.0-windows.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
RLTool.deps.json
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
RLTool.deps.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
RLTool.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
RLTool.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
RLTool.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
RLTool.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
RLTool.pdb
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
RLTool.pdb
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
RLTool.runtimeconfig.json
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
RLTool.runtimeconfig.json
Resource
win10v2004-20240802-en
General
-
Target
RLTool.runtimeconfig.json
-
Size
386B
-
MD5
186a65581e2f29258f54d396660409fa
-
SHA1
6f998d3be2e85cb5419205f867135874f27c0a3a
-
SHA256
e1e0974d0e8833375024eb7c78521b3b5cad4228aad22b23d506cbe702445844
-
SHA512
7dea87b523aab01ea3c794779b71bc0b52179e1d5e7b9a45539ddd39c775969ef22853c4c193699aec1e3fa3cbe26e90e3a4881226c52a3aacae1eac260ff896
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\.json rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\json_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\json_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2708 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2708 AcroRd32.exe 2708 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1644 2528 cmd.exe 32 PID 2528 wrote to memory of 1644 2528 cmd.exe 32 PID 2528 wrote to memory of 1644 2528 cmd.exe 32 PID 1644 wrote to memory of 2708 1644 rundll32.exe 33 PID 1644 wrote to memory of 2708 1644 rundll32.exe 33 PID 1644 wrote to memory of 2708 1644 rundll32.exe 33 PID 1644 wrote to memory of 2708 1644 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\RLTool.runtimeconfig.json1⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\RLTool.runtimeconfig.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\RLTool.runtimeconfig.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54a81d4b0d46202398053e832f1a1d1ce
SHA1d67a892fef342febd04403a22773c73d347c7f13
SHA256b3f1851dbc7508fc811939d2baf050acb5151bee244b49c54bc3f559b992e3a6
SHA512e9699e4cc3fae9f7cd1caa14fbad69699d0d8f912610e2a0c16c45e21d2c32fd79d8a0221c46542ca80aad334d76159af14a75f9b3fcf3ae70335fb37d3fa04a