Analysis
-
max time kernel
53s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 12:42
Static task
static1
Behavioral task
behavioral1
Sample
RPGXP_E.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RPGXP_E.exe
Resource
win10v2004-20241007-en
General
-
Target
RPGXP_E.exe
-
Size
27.2MB
-
MD5
4db4691a4f71af97b109b11ee2c70ec9
-
SHA1
ba5eaa22936505df35a10319dbce60ed6e873383
-
SHA256
7f0005d39580ba537d4f9581b47c28adf132a6586d62881a62cd56fa1b24ab27
-
SHA512
2688575f993dd7c2b0bff1634465149103412032bc882d09ccd492033ec94b27c84e4a1655118264728fea358969504ff748a8e6fe73dd313789f2a2d142f15a
-
SSDEEP
786432:F6HKbIBBYy9IMhfpNIubCq9iS2wvX1RA6rxiShm0RML1P:+iI3/9IM6uejAX1RUShT
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
resource yara_rule behavioral1/files/0x0005000000019387-1944.dat aspack_v212_v242 -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RPGXP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate RPGXP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RPGXP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate RPGXP.exe -
Executes dropped EXE 5 IoCs
pid Process 2920 RPGXP_E.tmp 1028 xp_rtp104e.exe 1620 xp_rtp104e.tmp 2624 RPGXP.exe 2948 RPGXP.exe -
Loads dropped DLL 11 IoCs
pid Process 2452 RPGXP_E.exe 2920 RPGXP_E.tmp 2920 RPGXP_E.tmp 2920 RPGXP_E.tmp 2920 RPGXP_E.tmp 2920 RPGXP_E.tmp 1028 xp_rtp104e.exe 1620 xp_rtp104e.tmp 1620 xp_rtp104e.tmp 2624 RPGXP.exe 2948 RPGXP.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 RPGXP.exe File opened for modification \??\PhysicalDrive0 RPGXP.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\is-1TC27.tmp xp_rtp104e.tmp File created C:\Windows\SysWOW64\is-H288H.tmp xp_rtp104e.tmp File created C:\Windows\SysWOW64\is-T5P69.tmp xp_rtp104e.tmp File created C:\Windows\SysWOW64\is-1L9IB.tmp xp_rtp104e.tmp File created C:\Windows\SysWOW64\is-6NE2V.tmp xp_rtp104e.tmp File created C:\Windows\SysWOW64\is-K59RB.tmp xp_rtp104e.tmp -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\SE\is-ADUD8.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\SE\is-D6GAM.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\SE\is-PRSC3.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Icons\is-3PCJI.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Transitions\is-TUTBI.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\SE\is-KKHU3.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\SE\is-VNL3C.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Battlers\is-22S9L.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\SE\is-N49U4.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\SE\is-3VB2O.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Characters\is-7H7VP.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Characters\is-OEFHG.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\ME\is-F3V0U.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\SE\is-DJF9M.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\SE\is-PBTTL.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Battlers\is-7K2L3.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Characters\is-6HRP2.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Fogs\is-D1D2I.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Icons\is-LD192.tmp xp_rtp104e.tmp File opened for modification C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.chm RPGXP_E.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Battlers\is-LLVOL.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Characters\is-FTSUE.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\BGM\is-M52IT.tmp xp_rtp104e.tmp File opened for modification C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\unins000.dat xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Characters\is-I6FIR.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\SE\is-V19JR.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Characters\is-SOBBU.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Fogs\is-0LQPJ.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Icons\is-PKR6N.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\BGM\is-62FJ8.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Transitions\is-GE93S.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Icons\is-VUM3N.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\SE\is-PCLVB.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Battlebacks\is-PK80R.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Characters\is-45B1I.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\ME\is-FCPF5.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\System\Data\is-CQ523.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\SE\is-3Q3G1.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Autotiles\is-04TJL.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Autotiles\is-ICJLP.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Battlers\is-ET5R8.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Battlers\is-JDDL8.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\System\Data\is-Q9N1Q.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\SE\is-ANT99.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Characters\is-4LQC9.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Characters\is-HVCJ4.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Characters\is-HE5M0.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Icons\is-V8BQ8.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\BGM\is-GP616.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\SE\is-T5INI.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Autotiles\is-RKHQ3.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Autotiles\is-NSQKJ.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Characters\is-3HI2G.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Characters\is-824DQ.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Tilesets\is-1PAGG.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Transitions\is-PCPTU.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\BGM\is-TL2LC.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Battlers\is-SEE4L.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Characters\is-92SKV.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Characters\is-DATDV.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\SE\is-GTT27.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Audio\BGM\is-MIEC0.tmp xp_rtp104e.tmp File created C:\Program Files (x86)\Enterbrain\RPGXP\System\is-45MMP.tmp RPGXP_E.tmp File created C:\Program Files (x86)\Common Files\Enterbrain\RGSS\Standard\Graphics\Tilesets\is-9HVMI.tmp xp_rtp104e.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xp_rtp104e.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RPGXP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RPGXP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RPGXP_E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RPGXP_E.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xp_rtp104e.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main RPGXP.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" RPGXP.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main RPGXP.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" RPGXP.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649} RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\lqDnXp = "tPo" RPGXP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rxdata RPGXP_E.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Archive\shell\open RPGXP_E.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key RPGXP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Project\shell\open\command RPGXP_E.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Archive\shell\open\command RPGXP_E.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\Cdzmtm = "ze_DEdOKs_s\x7fOStLH]aU~^" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\cdwcE = "VfNxE^ErkId_cRurs}az" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Project\shell\open\command\ = "\"C:\\Program Files (x86)\\Enterbrain\\RPGXP\\RPGXP.exe\" \"%1\"" RPGXP_E.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Archive\shell RPGXP_E.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\xkzbguuEzoOge = "rhfSd[HCay]kFABAmfX" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Project\DefaultIcon\ = "\"C:\\Program Files (x86)\\Enterbrain\\RPGXP\\RPGXP.exe\",1" RPGXP_E.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\JoinkhhsrqaT = "BTZGiGvuu@cyaxJRjqGn" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\cdwcE = "VfNxE^ErkId_sRurs\x7fQp" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rgssad\ = "RPGXP.Archive" RPGXP_E.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\utGdtGrpucTYm = "WhWZKTUC\\UpR|RsCbR}[" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\lqDnXp = "]zK" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Data\DefaultIcon\ = "\"C:\\Program Files (x86)\\Enterbrain\\RPGXP\\RPGXP.exe\",2" RPGXP_E.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Data\shell\open RPGXP_E.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rgssad RPGXP_E.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\cdwcE = "VfNxE^ErkId_CRurs~ck" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\lqDnXp = "I`p" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\Cdzmtm = "[`\\jcYTOKMPvLRxrClldn{" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\aAwiKjcmiba = "R|oW^SO\\JA`@IdVcWDxypMB" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\InProcServer32\ = "C:\\Windows\\SysWOW64\\ieframe.dll" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\uvtncn = "i\x7fd~QsY\x7fNRjyaY_mwqIiqJuMPd^Oh" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\lqDnXp = "xkv" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\xkzbguuEzoOge = "cBsyzfm|rRTuUZ\\rIHV" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\Cdzmtm = "[`\\fcYTOKMPzLRxrClldn{" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\lqDnXp = "vJi" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\aAwiKjcmiba = "XJkkPCAMKxEdsOoYeAS~rSo" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rxproj\ = "RPGXP.Project" RPGXP_E.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Archive RPGXP_E.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7} RPGXP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\lqDnXp = "`JT" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\Cdzmtm = "[`\\fcYTOKMPzLRxrCllpn{" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Data\ = "RPGXP Data" RPGXP_E.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\JoinkhhsrqaT = "bQicuj^B{^VGRArisrk\\" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\Cdzmtm = "ze_DEdOKs_s\x7fOStLH]aA~^" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\wqpxCzt = "urG^z}JW~mxdoXqi]g[v" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Data\shell\open\command\ = "\"C:\\Program Files (x86)\\Enterbrain\\RPGXP\\RPGXP.exe\" /n \"%1\"" RPGXP_E.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\ = "IE Background Task Scheduler" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Archive\DefaultIcon\ = "\"C:\\Program Files (x86)\\Enterbrain\\RPGXP\\RPGXP.exe\",3" RPGXP_E.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\utGdtGrpucTYm = "UbJiZBhcdaH\\WUVA]yEp" RPGXP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rxproj RPGXP_E.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Data\DefaultIcon RPGXP_E.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\InProcServer32 RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Project\ = "RPGXP Project" RPGXP_E.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Project\shell RPGXP_E.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Project\shell\open RPGXP_E.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\InProcServer32\ThreadingModel = "Apartment" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\wqpxCzt = "B^TUkCt~u~QhlE]VWE|Y" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\bjbovsox = "T_tPRmkrqKUHTCwLXOa}" RPGXP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\{3B3938F7-03CE-13D1-B2E4-0060975B8649}\Cdzmtm = "ze_HEdOKs_ssOStLH]aA~^" RPGXP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\cdwcE = "@J`NvbfOBG^ILgEedA^s" RPGXP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Project RPGXP_E.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RPGXP.Data\shell RPGXP_E.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rxdata\ = "RPGXP.Data" RPGXP_E.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33CC1979-AF01-1C1F-8930-A34DE15A1DA7}\cdwcE = "@J`NvbfOBG^J\\gEedCS{" RPGXP.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2920 RPGXP_E.tmp 2920 RPGXP_E.tmp -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2624 RPGXP.exe Token: SeIncBasePriorityPrivilege 2624 RPGXP.exe Token: 33 2948 RPGXP.exe Token: SeIncBasePriorityPrivilege 2948 RPGXP.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2920 RPGXP_E.tmp 2948 RPGXP.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2624 RPGXP.exe 2624 RPGXP.exe 2624 RPGXP.exe 2948 RPGXP.exe 2948 RPGXP.exe 2948 RPGXP.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2920 2452 RPGXP_E.exe 31 PID 2452 wrote to memory of 2920 2452 RPGXP_E.exe 31 PID 2452 wrote to memory of 2920 2452 RPGXP_E.exe 31 PID 2452 wrote to memory of 2920 2452 RPGXP_E.exe 31 PID 2452 wrote to memory of 2920 2452 RPGXP_E.exe 31 PID 2452 wrote to memory of 2920 2452 RPGXP_E.exe 31 PID 2452 wrote to memory of 2920 2452 RPGXP_E.exe 31 PID 2920 wrote to memory of 1028 2920 RPGXP_E.tmp 33 PID 2920 wrote to memory of 1028 2920 RPGXP_E.tmp 33 PID 2920 wrote to memory of 1028 2920 RPGXP_E.tmp 33 PID 2920 wrote to memory of 1028 2920 RPGXP_E.tmp 33 PID 2920 wrote to memory of 1028 2920 RPGXP_E.tmp 33 PID 2920 wrote to memory of 1028 2920 RPGXP_E.tmp 33 PID 2920 wrote to memory of 1028 2920 RPGXP_E.tmp 33 PID 1028 wrote to memory of 1620 1028 xp_rtp104e.exe 34 PID 1028 wrote to memory of 1620 1028 xp_rtp104e.exe 34 PID 1028 wrote to memory of 1620 1028 xp_rtp104e.exe 34 PID 1028 wrote to memory of 1620 1028 xp_rtp104e.exe 34 PID 1028 wrote to memory of 1620 1028 xp_rtp104e.exe 34 PID 1028 wrote to memory of 1620 1028 xp_rtp104e.exe 34 PID 1028 wrote to memory of 1620 1028 xp_rtp104e.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\RPGXP_E.exe"C:\Users\Admin\AppData\Local\Temp\RPGXP_E.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\is-BIK2U.tmp\RPGXP_E.tmp"C:\Users\Admin\AppData\Local\Temp\is-BIK2U.tmp\RPGXP_E.tmp" /SL5="$30138,28152842,118784,C:\Users\Admin\AppData\Local\Temp\RPGXP_E.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\is-DCN9I.tmp\xp_rtp104e.exe"C:\Users\Admin\AppData\Local\Temp\is-DCN9I.tmp\xp_rtp104e.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\is-7AR3V.tmp\xp_rtp104e.tmp"C:\Users\Admin\AppData\Local\Temp\is-7AR3V.tmp\xp_rtp104e.tmp" /SL5="$3017C,22729139,53248,C:\Users\Admin\AppData\Local\Temp\is-DCN9I.tmp\xp_rtp104e.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1620
-
-
-
-
C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.exe"C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.exe"1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2624
-
C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.exe"C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.exe"1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
740KB
MD571354278675a4deea20fb3cbb5f77170
SHA1073e9f1db6c1be847f186553e985e35e4de03c70
SHA2567b6acb5e2c245b8cfda77fced2cc0e94108384cd1b9ffc8510e7304fcb9feb6c
SHA512e664f02f2d2918c30a6fb75ab7dfe22ab0f2eea8e7ebbcd5b211463062744e51e3956d320127570db0b5dc9c12fb39c6b204bc2967bd4708bccab17d5c980915
-
Filesize
8KB
MD5592adc03e205672e8a4f790f685c658f
SHA170e40b322ad187e9860d3619edac25d30624d17f
SHA256aabb33a465c18dcba522190d57100cf3e07107651084275645785625f3f4ff7e
SHA512c21e1eaee0ced3e57e518bc72c87b9cfa615d84d44081e868dcaa4f5fcb95273028a1ebb7854d7feab098973e066a607d586b537b5ad2ac2a04f88e7048ec03e
-
Filesize
644KB
MD52ecb353c8974f1020d1425dfb8d4f591
SHA164b4196b78b4cdba32d8a5f14391861973dbe676
SHA256614ffaa33a9bf1453dbac9033c941aea534cf12fe89f568344d94217497ac674
SHA5120b079efff3c97d059eeed87df6433fc3929f18542d700bbee5c4f32ba5e2e216c68cc8403c2d9224cae2cc92550c7e668b1152586db6b8579f4ddaa8fbbbb9df
-
Filesize
9KB
MD5ffffdaaf9f1c7c47a4761df64f4ee56b
SHA16a3fd89cf56f9341bd872fad778af56f39a418f2
SHA256c4c87ffce5df52d6acf28a94aa5414fd7305d44825394fe4cb809ca20e6bcf54
SHA512b19ddd75a6a6d1dc44e70c30a01c7474bed5eab02d366786ef063be756a4993896038f0a368a00b5e383d639005ecf1f2e0f1d4223133b0b40340f8d777d0c2d
-
Filesize
10KB
MD5ff708a85d46bc03f24dbf1e5119aadab
SHA139882cb9b2c82f8d1fbcefe1e0b0b41acbff5205
SHA256dba7d3497b93f4752169ea3b19ee9a2727aed3dc0f58f722908d77e315851497
SHA512f1869c1f5f46d8d906cbe142aa4f1b08e21ce388265e80622dbc099ecdc1987709a20546f8b33018cfc4806d8c4eda3e1b4ee1f362a77802bc0eb592e30c3fd4
-
Filesize
4KB
MD57f1b95225ec76ae446a9f149bd6124f5
SHA10c0e5c159facd1a075e1b50b013123fab5ad6706
SHA256a90e6a055e9b38788ca782a0641a247b58e857bdd91364ac6248d67497b1c817
SHA512d914061975c0f1debfabe59a0bca8db00a5ac4af96d3f530cbf0cdd02e6e848bc0cff17cddd9436b7d0159671b3e791770b665fafabba89a642304b2b1cd5965
-
Filesize
3KB
MD582b74e02597c3718e04a5670ca2096fd
SHA1fc26c45ccc67d230ddc7b204166fd32b9c9a8009
SHA2565f536fd583358d5bc7bff05de8a094d82ff9b8be93a269d228b0e206274d0bc7
SHA512796e0636160571cb83bef3e07732f75b50aeddc3a4553defa7ecc60b3f4507e757b2c30359e10c7e23ce0b2e1630775ccd54d2043c29ab1459f502d83cce4ea7
-
Filesize
669KB
MD552950ac9e2b481453082f096120e355a
SHA1159c09db1abcee9114b4f792ffba255c78a6e6c3
SHA25625fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd
SHA5125b61c28bbcaedadb3b6cd3bb8a392d18016c354c4c16e01395930666addc95994333dfc45bea1a1844f6f1585e79c729136d3714ac118b5848becde0bdb182ba
-
Filesize
3.2MB
MD56f6ccdccf5bd0946a2b55a014329bdac
SHA148bbe60410e70a991d7ffea90e3e1279ee456c78
SHA256ecb1f0805161e359adedb28b2fa7f8c4d8586d6d5d69a37dd05757618f9e551f
SHA512092d982773dd62e4d6f3a60c83d7e0f7c8ab07afaca3ecfdf960014452e78d4f6437008e8b110993b8e6a798110a736b9be0189f932c348d5b74b23c6cd7b7e1
-
Filesize
1.1MB
MD563b15124be653dbe589c7981da9d397c
SHA1af8874bdf2ad726f5420e8132c10becc2bbcd93c
SHA25661674b90891ca099d5fee62bf063a948a80863530ab6a31e7f9e06f0e5bc7599
SHA512339b284b5dd7386dcfa86c8fdcf239a0e97cc168229ea9a66fc0c6b26771401fa7f27c2c6a435a836a43ea9c7e634a3e47ec77e0d27985794bbb4416dfc97ac8
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
21.9MB
MD5611881d2a5b8825df189616e7a2760f3
SHA12a907a5371d27dbf80cd9efc399fff76109a3968
SHA256b3bd20ad7f413b40ac233aafd2e061de1dc429c2eadb59d0b3157ba3c47f16b2
SHA512d79d8f57f8219574723239c0091068db64d2304e6b7495187247397491371e8761e711d027cab36bd08cbf86a1bf805dfbfeaff910f6b49458ff9c0c5872af23