Analysis
-
max time kernel
111s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 13:39
Static task
static1
Behavioral task
behavioral1
Sample
RPGXP_E.exe
Resource
win7-20240221-en
Errors
General
-
Target
RPGXP_E.exe
-
Size
27.2MB
-
MD5
4db4691a4f71af97b109b11ee2c70ec9
-
SHA1
ba5eaa22936505df35a10319dbce60ed6e873383
-
SHA256
7f0005d39580ba537d4f9581b47c28adf132a6586d62881a62cd56fa1b24ab27
-
SHA512
2688575f993dd7c2b0bff1634465149103412032bc882d09ccd492033ec94b27c84e4a1655118264728fea358969504ff748a8e6fe73dd313789f2a2d142f15a
-
SSDEEP
786432:F6HKbIBBYy9IMhfpNIubCq9iS2wvX1RA6rxiShm0RML1P:+iI3/9IM6uejAX1RUShT
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Processes:
resource yara_rule behavioral1/files/0x0006000000016dbe-180.dat aspack_v212_v242 -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
RPGXP.exeRPGXP.exeRPGXP.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate RPGXP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RPGXP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate RPGXP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RPGXP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate RPGXP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RPGXP.exe -
Executes dropped EXE 4 IoCs
Processes:
RPGXP_E.tmpRPGXP.exeRPGXP.exeRPGXP.exepid Process 2456 RPGXP_E.tmp 1276 RPGXP.exe 1084 RPGXP.exe 1652 RPGXP.exe -
Loads dropped DLL 7 IoCs
Processes:
RPGXP_E.exeRPGXP_E.tmpRPGXP.exeRPGXP.exepid Process 2156 RPGXP_E.exe 2456 RPGXP_E.tmp 2456 RPGXP_E.tmp 2456 RPGXP_E.tmp 2456 RPGXP_E.tmp 1084 RPGXP.exe 1652 RPGXP.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
RPGXP.exeRPGXP.exedescription ioc Process File opened for modification \??\PhysicalDrive0 RPGXP.exe File opened for modification \??\PhysicalDrive0 RPGXP.exe -
Drops file in Program Files directory 38 IoCs
Processes:
RPGXP_E.tmpdescription ioc Process File created C:\Program Files (x86)\Enterbrain\RPGXP\System\Data\is-RP9D3.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\is-JDUDN.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\System\Data\is-6GGPF.tmp RPGXP_E.tmp File opened for modification C:\Program Files (x86)\Enterbrain\RPGXP\RGSS104E.dll RPGXP_E.tmp File opened for modification C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.exe RPGXP_E.tmp File opened for modification C:\Program Files (x86)\Enterbrain\RPGXP\System\Game.exe RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\drm\is-6M1DQ.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\drm\is-0GI7C.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\is-CSLJ5.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\System\Data\is-MNK6G.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\System\Data\is-IQQFR.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\is-0PUL1.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\is-C4324.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\drm\is-OP4FS.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\drm\is-DDGL0.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\drm\is-Q0VGT.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\System\is-1COIN.tmp RPGXP_E.tmp File opened for modification C:\Program Files (x86)\Enterbrain\RPGXP\SciLexer.dll RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\drm\is-O2CHQ.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\drm\is-PG716.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\System\Data\is-RR692.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\is-2I24T.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\System\Data\is-EL9A1.tmp RPGXP_E.tmp File opened for modification C:\Program Files (x86)\Enterbrain\RPGXP\unins000.dat RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\System\Data\is-EMQMP.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\System\Data\is-RN4CL.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\System\Data\is-VAM6J.tmp RPGXP_E.tmp File opened for modification C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.chm RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\unins000.dat RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\drm\is-9RUTU.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\System\Data\is-9TBN7.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\System\Data\is-KM9QT.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\System\Data\is-KT6DF.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\drm\is-H1QKJ.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\System\Data\is-G6TUF.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\System\Data\is-A5III.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\System\Data\is-GLQ8N.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\System\Data\is-4POS2.tmp RPGXP_E.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
RPGXP.exeRPGXP.exeRPGXP.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" RPGXP.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" RPGXP.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main RPGXP.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch RPGXP.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main RPGXP.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" RPGXP.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch RPGXP.exe -
Modifies registry class 64 IoCs
Processes:
RPGXP_E.tmpRPGXP.exeRPGXP.exeRPGXP.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Project\DefaultIcon RPGXP_E.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Project\shell\open RPGXP_E.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\mzaj = "YI[jCaBWGjNZZXTSw@~aXN|xfd" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\KyqSsjhwwun = "d]kWX\x7fvgNchy_^MCFml" RPGXP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Archive\shell\open RPGXP_E.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rgssad RPGXP_E.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\mzaj = "jmudcdqs[GfmTFAmDyFZAMpJGa" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\oRDUl = "^tAdOKn^rKKStLV\\cEz^" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\CtwnynyyVA = "pCk_VBAytEUH{sFCW{NO`bSpDH|aj`g" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\oRDUl = "^tAd_Kn^rKKStLV\\cEz^" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\FssU = "TQ~QyFKnJlr|XEMpI\x7fLXBvaZnIfkCNJO" RPGXP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rxproj RPGXP_E.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rxdata RPGXP_E.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\KyqSsjhwwun = "wVzifV}tgokdsaGadBz" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\kjcawDVyoxp = "v`n[_\\`aL" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\mzaj = "jmudcdqs[GfmTFamDyFZAMPJGa" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\CtwnynyyVA = "pCk_VBAytEUH{sFCW{NO`bSpDH|aj`g" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\pahnYhailecN = "}cEhys@IicP_xpViWr@xt_jX" RPGXP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Archive\shell RPGXP_E.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\InprocHandler32 RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\mzaj = "jmudcdqs[GfmTFQmDyFZAM`JGa" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Data\DefaultIcon\ = "\"C:\\Program Files (x86)\\Enterbrain\\RPGXP\\RPGXP.exe\",2" RPGXP_E.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\InprocHandler32\ = "ole32.dll" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\kjcawDVyoxp = "ZNXhc\x7f]H@" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\KyqSsjhwwun = "wVzifV}tgokdsaGanBz" RPGXP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Project\shell RPGXP_E.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7} RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\kjcawDVyoxp = "ZNXjwDRu@" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rxproj\ = "RPGXP.Project" RPGXP_E.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Data\shell\open\command\ = "\"C:\\Program Files (x86)\\Enterbrain\\RPGXP\\RPGXP.exe\" /n \"%1\"" RPGXP_E.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\LocalServer32 RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\oRDUl = "]VgYTOVLQNHRxr]mn`j{" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\kjcawDVyoxp = "v`nY]bawx" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\ = "Outlook Form Factory" RPGXP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Archive\shell\open\command RPGXP_E.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Data\ = "RPGXP Data" RPGXP_E.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Archive\shell\open\command\ = "\"C:\\Program Files (x86)\\Enterbrain\\RPGXP\\RPGXP.exe\" /n \"%1\"" RPGXP_E.tmp Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649} RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\kjcawDVyoxp = "ZNXknQ\x7fW@" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\KyqSsjhwwun = "wVzifV}tgokdsaGa`Bz" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\kjcawDVyoxp = "v`nT[uu\x7fp" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Archive\DefaultIcon\ = "\"C:\\Program Files (x86)\\Enterbrain\\RPGXP\\RPGXP.exe\",3" RPGXP_E.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rgssad\ = "RPGXP.Archive" RPGXP_E.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\FssU = "T_@\\\\]lVy{QJTCwNYoMXS}`NXSE}WRbg" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\mzaj = "YI[jCaBWGjNZZXdSw@~aXNLxfd" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\KyqSsjhwwun = "d]kWX\x7fvgNchy_^MCDml" RPGXP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Data\shell\open RPGXP_E.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\kjcawDVyoxp = "v`nUSHjzP" RPGXP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Data\DefaultIcon RPGXP_E.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\FssU = "T_@\\\\]lVy{QJTCwNYoMXS}`NXSE}WRbg" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\DcngbQ = "UbUhXFlcdah]XaYaqToE^r" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Project\DefaultIcon\ = "\"C:\\Program Files (x86)\\Enterbrain\\RPGXP\\RPGXP.exe\",1" RPGXP_E.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Archive\DefaultIcon RPGXP_E.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\FssU = "TQ~QyFKnJlr|XEMpI\x7fLXBvaZnIfkCNJO" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\mzaj = "jmudcdqs[GfmTFQmDyFZAM`JGa" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\mzaj = "YI[jCaBWGjNZZXdSw@~aXNLxfd" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\KyqSsjhwwun = "d]kWX\x7fvgNchy_^MCCml" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\DcngbQ = "WhH[IPQC\\UPSsf|cN\x7fWni^" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\kjcawDVyoxp = "ZNXfokWS\\" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\mzaj = "YI[jCaBWGjNZZXtSw@~aXN\\xfd" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\oRDUl = "]VgYDOVLQNHRxr]mn`j{" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\KyqSsjhwwun = "d]kWX\x7fvgNchy_^MCHml" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rxdata\ = "RPGXP.Data" RPGXP_E.tmp -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
RPGXP_E.tmppid Process 2456 RPGXP_E.tmp 2456 RPGXP_E.tmp -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
RPGXP.exeRPGXP.exeRPGXP.exedescription pid Process Token: 33 1276 RPGXP.exe Token: SeIncBasePriorityPrivilege 1276 RPGXP.exe Token: 33 1084 RPGXP.exe Token: SeIncBasePriorityPrivilege 1084 RPGXP.exe Token: 33 1652 RPGXP.exe Token: SeIncBasePriorityPrivilege 1652 RPGXP.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
RPGXP_E.tmppid Process 2456 RPGXP_E.tmp -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
RPGXP.exeRPGXP.exeRPGXP.exepid Process 1276 RPGXP.exe 1276 RPGXP.exe 1276 RPGXP.exe 1276 RPGXP.exe 1084 RPGXP.exe 1084 RPGXP.exe 1084 RPGXP.exe 1652 RPGXP.exe 1652 RPGXP.exe 1652 RPGXP.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
RPGXP_E.exedescription pid Process procid_target PID 2156 wrote to memory of 2456 2156 RPGXP_E.exe 28 PID 2156 wrote to memory of 2456 2156 RPGXP_E.exe 28 PID 2156 wrote to memory of 2456 2156 RPGXP_E.exe 28 PID 2156 wrote to memory of 2456 2156 RPGXP_E.exe 28 PID 2156 wrote to memory of 2456 2156 RPGXP_E.exe 28 PID 2156 wrote to memory of 2456 2156 RPGXP_E.exe 28 PID 2156 wrote to memory of 2456 2156 RPGXP_E.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\RPGXP_E.exe"C:\Users\Admin\AppData\Local\Temp\RPGXP_E.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\is-NJ3V0.tmp\RPGXP_E.tmp"C:\Users\Admin\AppData\Local\Temp\is-NJ3V0.tmp\RPGXP_E.tmp" /SL5="$5001C,28152842,118784,C:\Users\Admin\AppData\Local\Temp\RPGXP_E.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2456
-
-
C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.exe"C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.exe"1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1276
-
C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.exe"C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.exe"1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1084
-
C:\Windows\system32\DeviceDisplayObjectProvider.exeC:\Windows\system32\DeviceDisplayObjectProvider.exe -Embedding1⤵PID:792
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:2856
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:2680
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:2704
-
C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.exe"C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.exe"1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1652
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1416
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5592adc03e205672e8a4f790f685c658f
SHA170e40b322ad187e9860d3619edac25d30624d17f
SHA256aabb33a465c18dcba522190d57100cf3e07107651084275645785625f3f4ff7e
SHA512c21e1eaee0ced3e57e518bc72c87b9cfa615d84d44081e868dcaa4f5fcb95273028a1ebb7854d7feab098973e066a607d586b537b5ad2ac2a04f88e7048ec03e
-
Filesize
644KB
MD52ecb353c8974f1020d1425dfb8d4f591
SHA164b4196b78b4cdba32d8a5f14391861973dbe676
SHA256614ffaa33a9bf1453dbac9033c941aea534cf12fe89f568344d94217497ac674
SHA5120b079efff3c97d059eeed87df6433fc3929f18542d700bbee5c4f32ba5e2e216c68cc8403c2d9224cae2cc92550c7e668b1152586db6b8579f4ddaa8fbbbb9df
-
Filesize
9KB
MD5ffffdaaf9f1c7c47a4761df64f4ee56b
SHA16a3fd89cf56f9341bd872fad778af56f39a418f2
SHA256c4c87ffce5df52d6acf28a94aa5414fd7305d44825394fe4cb809ca20e6bcf54
SHA512b19ddd75a6a6d1dc44e70c30a01c7474bed5eab02d366786ef063be756a4993896038f0a368a00b5e383d639005ecf1f2e0f1d4223133b0b40340f8d777d0c2d
-
Filesize
8KB
MD5f09d55b8cf19610a2627e06dd0952856
SHA1f8835c697d15c03efeb30cd14fe707ec30fb2675
SHA256d7fe0116348622b63511cd0527c00914797ac4689e1ac5473b585ed9760aaf14
SHA5127807cb81efa99c328e5eaf138a1d4d17d15c1f103645ced91cd3afaddc38316d9c71d4b1fc61ece995d6e61c7f37b458c6f78c32d692bb58c69c79e8382756c9
-
Filesize
10KB
MD5ff708a85d46bc03f24dbf1e5119aadab
SHA139882cb9b2c82f8d1fbcefe1e0b0b41acbff5205
SHA256dba7d3497b93f4752169ea3b19ee9a2727aed3dc0f58f722908d77e315851497
SHA512f1869c1f5f46d8d906cbe142aa4f1b08e21ce388265e80622dbc099ecdc1987709a20546f8b33018cfc4806d8c4eda3e1b4ee1f362a77802bc0eb592e30c3fd4
-
Filesize
4KB
MD57f1b95225ec76ae446a9f149bd6124f5
SHA10c0e5c159facd1a075e1b50b013123fab5ad6706
SHA256a90e6a055e9b38788ca782a0641a247b58e857bdd91364ac6248d67497b1c817
SHA512d914061975c0f1debfabe59a0bca8db00a5ac4af96d3f530cbf0cdd02e6e848bc0cff17cddd9436b7d0159671b3e791770b665fafabba89a642304b2b1cd5965
-
Filesize
9KB
MD5874f7d1c5dbc62eca93226a0a0d1b69e
SHA1f991c2694e7ad66fef7fedfaf9d5570b06ca52fa
SHA2569e79ac74da3139c652e8008255d8a19e13c85d0e0347cb173c31d2765e831810
SHA512fc88aafe33f09022afe9caabe7d749526444f9f000f0f8ab0998cc395959d0057f8209e1ad520c5be829b0f2e1d0fb3cc4db3892ac987205ef11828d3afa8403
-
Filesize
136B
MD5c507d9b9d1d9d26c9bb777e28d2fe6a7
SHA175050c2af19a64646a18908d866f4e069f24eee4
SHA25657975936e20349cbc05fa92924eab8214b4144e3d7ed6ded974c0f73770a954c
SHA5121924245d8a00e2d1d2b66d71c4e1373a68382a58e4f585ca0e20f5525424bd32139e7b76b16e29c7a2176d5f4d29a2b684a5c410f1c8376f86d184105451b04f
-
Filesize
3KB
MD5d47b668e67c6e9343f382ac0e00fbc53
SHA164f4d221ec75116046f49bd032d8e81af8f0ae04
SHA256ff7f3918d3408e9af97cfa83c93fc0f14c1f248f2ebf9884141afba789f2e678
SHA512d769d0a0a78961ec6af2b99cfdd73da9195d05fd2349a6f928a7fef1b7e0f09bd1de6c29ab2b26acfdb0b2b5b0b9c82b562dcd450df8dab00e24301275e6e02d
-
Filesize
3KB
MD5acc185e37b1b6e96166dac57977fceb5
SHA1462c226353c8ac5cb78029b034173673427411db
SHA256f973c2d4eefa79ce8ea3783b169a5e9e0846923c5041ff80011c420a836257fe
SHA51253a8c8593704cd578466f48251f392c32bb26070b3294007e898702f8b4c61be323bba9653566b14d584d059491b152329e916fd5c90be58c21283e15aff312d
-
Filesize
740KB
MD571354278675a4deea20fb3cbb5f77170
SHA1073e9f1db6c1be847f186553e985e35e4de03c70
SHA2567b6acb5e2c245b8cfda77fced2cc0e94108384cd1b9ffc8510e7304fcb9feb6c
SHA512e664f02f2d2918c30a6fb75ab7dfe22ab0f2eea8e7ebbcd5b211463062744e51e3956d320127570db0b5dc9c12fb39c6b204bc2967bd4708bccab17d5c980915
-
Filesize
3.2MB
MD56f6ccdccf5bd0946a2b55a014329bdac
SHA148bbe60410e70a991d7ffea90e3e1279ee456c78
SHA256ecb1f0805161e359adedb28b2fa7f8c4d8586d6d5d69a37dd05757618f9e551f
SHA512092d982773dd62e4d6f3a60c83d7e0f7c8ab07afaca3ecfdf960014452e78d4f6437008e8b110993b8e6a798110a736b9be0189f932c348d5b74b23c6cd7b7e1
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
1.1MB
MD563b15124be653dbe589c7981da9d397c
SHA1af8874bdf2ad726f5420e8132c10becc2bbcd93c
SHA25661674b90891ca099d5fee62bf063a948a80863530ab6a31e7f9e06f0e5bc7599
SHA512339b284b5dd7386dcfa86c8fdcf239a0e97cc168229ea9a66fc0c6b26771401fa7f27c2c6a435a836a43ea9c7e634a3e47ec77e0d27985794bbb4416dfc97ac8