Resubmissions
14-10-2023 12:19
231014-phacksdh3s 314-10-2023 12:17
231014-pf2daafh27 314-10-2023 12:13
231014-pd9a4sfg86 3Analysis
-
max time kernel
67s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 12:19
Behavioral task
behavioral1
Sample
RPGMV-DECRYPTOR.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
RPGMV-DECRYPTOR.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
gui.pyc
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
gui.pyc
Resource
win10v2004-20230915-en
General
-
Target
RPGMV-DECRYPTOR.exe
-
Size
1.2MB
-
MD5
1bdedbe20afb89236a7902804906aeda
-
SHA1
bf9c619e4e672ee1bcb02139d938d8291f3aa1ce
-
SHA256
f8df4d44bd5491dadfcf25353e38b192b629e4af2500bdc9a3816739d7bbd510
-
SHA512
bfc75d03bd782d0d2d947b93d8c462a193e3e5bd22f42dc81e3fd1d490a6a9bce0564b756b4f43018b795bc9ec52b99c71d227bc7edfe353c90e39053a232464
-
SSDEEP
24576:Z/0PTG+usn0/nCocageeHQ6i4W1RH0N7wqHrU26dPFJ9:Z/UTG9umnCoca+w6DW1+iMUzdPFJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3020 chrome.exe 3020 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2628 3020 chrome.exe 31 PID 3020 wrote to memory of 2628 3020 chrome.exe 31 PID 3020 wrote to memory of 2628 3020 chrome.exe 31 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2668 3020 chrome.exe 33 PID 3020 wrote to memory of 2412 3020 chrome.exe 34 PID 3020 wrote to memory of 2412 3020 chrome.exe 34 PID 3020 wrote to memory of 2412 3020 chrome.exe 34 PID 3020 wrote to memory of 2960 3020 chrome.exe 35 PID 3020 wrote to memory of 2960 3020 chrome.exe 35 PID 3020 wrote to memory of 2960 3020 chrome.exe 35 PID 3020 wrote to memory of 2960 3020 chrome.exe 35 PID 3020 wrote to memory of 2960 3020 chrome.exe 35 PID 3020 wrote to memory of 2960 3020 chrome.exe 35 PID 3020 wrote to memory of 2960 3020 chrome.exe 35 PID 3020 wrote to memory of 2960 3020 chrome.exe 35 PID 3020 wrote to memory of 2960 3020 chrome.exe 35 PID 3020 wrote to memory of 2960 3020 chrome.exe 35 PID 3020 wrote to memory of 2960 3020 chrome.exe 35 PID 3020 wrote to memory of 2960 3020 chrome.exe 35 PID 3020 wrote to memory of 2960 3020 chrome.exe 35 PID 3020 wrote to memory of 2960 3020 chrome.exe 35 PID 3020 wrote to memory of 2960 3020 chrome.exe 35 PID 3020 wrote to memory of 2960 3020 chrome.exe 35 PID 3020 wrote to memory of 2960 3020 chrome.exe 35 PID 3020 wrote to memory of 2960 3020 chrome.exe 35 PID 3020 wrote to memory of 2960 3020 chrome.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\RPGMV-DECRYPTOR.exe"C:\Users\Admin\AppData\Local\Temp\RPGMV-DECRYPTOR.exe"1⤵PID:2984
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7389758,0x7fef7389768,0x7fef73897782⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1120 --field-trial-handle=1320,i,3360423873527777831,6785432773232413263,131072 /prefetch:22⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1320,i,3360423873527777831,6785432773232413263,131072 /prefetch:82⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1644 --field-trial-handle=1320,i,3360423873527777831,6785432773232413263,131072 /prefetch:82⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2316 --field-trial-handle=1320,i,3360423873527777831,6785432773232413263,131072 /prefetch:12⤵PID:1892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2324 --field-trial-handle=1320,i,3360423873527777831,6785432773232413263,131072 /prefetch:12⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1628 --field-trial-handle=1320,i,3360423873527777831,6785432773232413263,131072 /prefetch:22⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3224 --field-trial-handle=1320,i,3360423873527777831,6785432773232413263,131072 /prefetch:12⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3392 --field-trial-handle=1320,i,3360423873527777831,6785432773232413263,131072 /prefetch:82⤵PID:968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3616 --field-trial-handle=1320,i,3360423873527777831,6785432773232413263,131072 /prefetch:82⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3908 --field-trial-handle=1320,i,3360423873527777831,6785432773232413263,131072 /prefetch:82⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3928 --field-trial-handle=1320,i,3360423873527777831,6785432773232413263,131072 /prefetch:12⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3740 --field-trial-handle=1320,i,3360423873527777831,6785432773232413263,131072 /prefetch:12⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1812
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n /f "C:\Users\Admin\Desktop\TraceFormat.dotx"1⤵PID:700
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199KB
MD5eeb62b6472430976c26747c258433d46
SHA11902f9275156178e9a1a856bac6e6116e7c9b08e
SHA2567238d1fb44a9cf85cd6aca79da7eb35fc01639cf218fa29e8829a4965fdab789
SHA512c2e77c57fb0a08b20fb6c2b885838f2754931f07d2f21cb575eff6bcad95321d573c590c8b8c37f5e4ff17bd3619ad21465359af8feb818468ec92fa49eba9a9
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD5ec1da6ecd3f58a4ac167f47c3e18d729
SHA100a5f29bd52d856a68b2eacc36e11d8ffc19f65a
SHA256436b44d603474548077db4d90980e73e613b75b73defa3836c5e381eaf257787
SHA512e5134d625d2b2521dccefa4b4ed6401a1a97f7d063138a2e72309c0ab38acf8fdc7a3c9380642adff338d559b9295803bc2bbf16ae4a9cf9aedacda812d5ddfb
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
199KB
MD5042efe60ff2889701c7deebaa76eb105
SHA13062671e4a66b5c251079c7f4112d3f1c809eee5
SHA2562cb330c0f6584c94d1dcc161f3b97895657c600a2bf0d6686c9393fbc91a5f35
SHA5125d77b3227cdc1b29109685ed4675b93a205585075d52defd1f6985421f4186280102c8af834deaf53f7f3c318376d2809d4181a2b5aca00edec71c5e1e6deb16