Analysis

  • max time kernel
    304s
  • max time network
    273s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-07-2024 09:48

General

  • Target

    RPGXP_E.exe

  • Size

    27.2MB

  • MD5

    4db4691a4f71af97b109b11ee2c70ec9

  • SHA1

    ba5eaa22936505df35a10319dbce60ed6e873383

  • SHA256

    7f0005d39580ba537d4f9581b47c28adf132a6586d62881a62cd56fa1b24ab27

  • SHA512

    2688575f993dd7c2b0bff1634465149103412032bc882d09ccd492033ec94b27c84e4a1655118264728fea358969504ff748a8e6fe73dd313789f2a2d142f15a

  • SSDEEP

    786432:F6HKbIBBYy9IMhfpNIubCq9iS2wvX1RA6rxiShm0RML1P:+iI3/9IM6uejAX1RUShT

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 16 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RPGXP_E.exe
    "C:\Users\Admin\AppData\Local\Temp\RPGXP_E.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:512
    • C:\Users\Admin\AppData\Local\Temp\is-M4FS9.tmp\RPGXP_E.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-M4FS9.tmp\RPGXP_E.tmp" /SL5="$301F4,28152842,118784,C:\Users\Admin\AppData\Local\Temp\RPGXP_E.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4648
      • C:\Users\Admin\AppData\Local\Temp\is-E16HC.tmp\xp_rtp104e.exe
        "C:\Users\Admin\AppData\Local\Temp\is-E16HC.tmp\xp_rtp104e.exe"
        3⤵
        • Executes dropped EXE
        PID:1172
        • C:\Users\Admin\AppData\Local\Temp\is-G4RVC.tmp\xp_rtp104e.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-G4RVC.tmp\xp_rtp104e.tmp" /SL5="$100068,22729139,53248,C:\Users\Admin\AppData\Local\Temp\is-E16HC.tmp\xp_rtp104e.exe"
          4⤵
          • Drops file in System32 directory
          • Drops file in Program Files directory
          PID:1488
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService
    1⤵
      PID:2196
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4196,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=4624 /prefetch:8
      1⤵
        PID:2560
      • C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.exe
        "C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.exe"
        1⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1800
      • C:\Windows\System32\GameBarPresenceWriter.exe
        "C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer
        1⤵
          PID:3260
        • C:\Windows\system32\OpenWith.exe
          C:\Windows\system32\OpenWith.exe -Embedding
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:1532
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
          1⤵
          • Drops desktop.ini file(s)
          • Checks processor information in registry
          • Modifies registry class
          PID:5060
        • C:\Windows\SysWOW64\werfault.exe
          werfault.exe /h /shared Global\f4c9625f0cdf46e2b29647ca993a27ec /t 2160 /p 1800
          1⤵
            PID:972
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
            1⤵
            • Checks processor information in registry
            • Modifies registry class
            PID:4916
          • C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.exe
            "C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.exe"
            1⤵
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:3404
          • C:\Windows\System32\GameBarPresenceWriter.exe
            "C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer
            1⤵
              PID:60
            • C:\Windows\system32\OpenWith.exe
              C:\Windows\system32\OpenWith.exe -Embedding
              1⤵
              • Suspicious use of SetWindowsHookEx
              PID:3008
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
              1⤵
              • Checks processor information in registry
              • Modifies registry class
              PID:4892
            • C:\Windows\SysWOW64\werfault.exe
              werfault.exe /h /shared Global\ee0255f00e7f4f5ea222d778a2a2056f /t 464 /p 3404
              1⤵
                PID:3900
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
                1⤵
                • Checks processor information in registry
                PID:1700
              • C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.exe
                "C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.exe"
                1⤵
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Modifies Internet Explorer settings
                • Modifies registry class
                • Suspicious use of SetWindowsHookEx
                PID:4516
              • C:\Windows\system32\OpenWith.exe
                C:\Windows\system32\OpenWith.exe -Embedding
                1⤵
                • Suspicious use of SetWindowsHookEx
                PID:3728
              • C:\Windows\System32\rundll32.exe
                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                1⤵
                  PID:3480
                • C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.exe
                  "C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.exe"
                  1⤵
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Modifies Internet Explorer settings
                  • Modifies registry class
                  • Suspicious use of SetWindowsHookEx
                  PID:2276
                • C:\Windows\system32\OpenWith.exe
                  C:\Windows\system32\OpenWith.exe -Embedding
                  1⤵
                  • Suspicious use of SetWindowsHookEx
                  PID:4852
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
                  1⤵
                    PID:4944

                  Network

                  MITRE ATT&CK Matrix ATT&CK v13

                  Defense Evasion

                  Modify Registry

                  1
                  T1112

                  Discovery

                  Query Registry

                  3
                  T1012

                  System Information Discovery

                  3
                  T1082

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Program Files (x86)\Enterbrain\RPGXP\RPGXP.exe
                    Filesize

                    3.2MB

                    MD5

                    6f6ccdccf5bd0946a2b55a014329bdac

                    SHA1

                    48bbe60410e70a991d7ffea90e3e1279ee456c78

                    SHA256

                    ecb1f0805161e359adedb28b2fa7f8c4d8586d6d5d69a37dd05757618f9e551f

                    SHA512

                    092d982773dd62e4d6f3a60c83d7e0f7c8ab07afaca3ecfdf960014452e78d4f6437008e8b110993b8e6a798110a736b9be0189f932c348d5b74b23c6cd7b7e1

                  • C:\Program Files (x86)\Enterbrain\RPGXP\drm\drm-activate.png
                    Filesize

                    8KB

                    MD5

                    592adc03e205672e8a4f790f685c658f

                    SHA1

                    70e40b322ad187e9860d3619edac25d30624d17f

                    SHA256

                    aabb33a465c18dcba522190d57100cf3e07107651084275645785625f3f4ff7e

                    SHA512

                    c21e1eaee0ced3e57e518bc72c87b9cfa615d84d44081e868dcaa4f5fcb95273028a1ebb7854d7feab098973e066a607d586b537b5ad2ac2a04f88e7048ec03e

                  • C:\Program Files (x86)\Enterbrain\RPGXP\drm\drm-background.png
                    Filesize

                    644KB

                    MD5

                    2ecb353c8974f1020d1425dfb8d4f591

                    SHA1

                    64b4196b78b4cdba32d8a5f14391861973dbe676

                    SHA256

                    614ffaa33a9bf1453dbac9033c941aea534cf12fe89f568344d94217497ac674

                    SHA512

                    0b079efff3c97d059eeed87df6433fc3929f18542d700bbee5c4f32ba5e2e216c68cc8403c2d9224cae2cc92550c7e668b1152586db6b8579f4ddaa8fbbbb9df

                  • C:\Program Files (x86)\Enterbrain\RPGXP\drm\drm-buy-now.png
                    Filesize

                    9KB

                    MD5

                    ffffdaaf9f1c7c47a4761df64f4ee56b

                    SHA1

                    6a3fd89cf56f9341bd872fad778af56f39a418f2

                    SHA256

                    c4c87ffce5df52d6acf28a94aa5414fd7305d44825394fe4cb809ca20e6bcf54

                    SHA512

                    b19ddd75a6a6d1dc44e70c30a01c7474bed5eab02d366786ef063be756a4993896038f0a368a00b5e383d639005ecf1f2e0f1d4223133b0b40340f8d777d0c2d

                  • C:\Program Files (x86)\Enterbrain\RPGXP\drm\drm-continue.png
                    Filesize

                    10KB

                    MD5

                    ff708a85d46bc03f24dbf1e5119aadab

                    SHA1

                    39882cb9b2c82f8d1fbcefe1e0b0b41acbff5205

                    SHA256

                    dba7d3497b93f4752169ea3b19ee9a2727aed3dc0f58f722908d77e315851497

                    SHA512

                    f1869c1f5f46d8d906cbe142aa4f1b08e21ce388265e80622dbc099ecdc1987709a20546f8b33018cfc4806d8c4eda3e1b4ee1f362a77802bc0eb592e30c3fd4

                  • C:\Program Files (x86)\Enterbrain\RPGXP\drm\drm-key-box.png
                    Filesize

                    4KB

                    MD5

                    7f1b95225ec76ae446a9f149bd6124f5

                    SHA1

                    0c0e5c159facd1a075e1b50b013123fab5ad6706

                    SHA256

                    a90e6a055e9b38788ca782a0641a247b58e857bdd91364ac6248d67497b1c817

                    SHA512

                    d914061975c0f1debfabe59a0bca8db00a5ac4af96d3f530cbf0cdd02e6e848bc0cff17cddd9436b7d0159671b3e791770b665fafabba89a642304b2b1cd5965

                  • C:\Users\Admin\AppData\Local\Temp\3B3938F7.TMP
                    Filesize

                    136B

                    MD5

                    a07fc8d93e284c277e85d244de843b85

                    SHA1

                    6e88a8e69f95048251f49aa58c661959ebedf7af

                    SHA256

                    2e0e3be0f10aff26efcb760cab630fecf8a42a39893d21b1a384ac8c4e80e775

                    SHA512

                    bec9d6e1e5406a6c6047a4c9b11dd4350c799298f4e5749fcfe67da4d22bab071ae8781444d2c150d2b0567c1449f3e451ea3301b5df2ff3e8e2d64fbcf2eafe

                  • C:\Users\Admin\AppData\Local\Temp\3B3938F7.TMP
                    Filesize

                    136B

                    MD5

                    4f554ae411dd5f2e0fd576d57f5203a0

                    SHA1

                    b3f1e1cdbd265532c60036993b5146094accabe4

                    SHA256

                    25886efd10b8b7262aee633d8204153a83585ea64d5082f97ba2c85df7e043e8

                    SHA512

                    d790209b0cefc0457c93006253a9016f0b3e35df1a8c4d741c073d6a8657639b27454cf7c02683f0398938b1d8e72e1fd9df722387e8af53f7bd3c197e57035b

                  • C:\Users\Admin\AppData\Local\Temp\HTM856D.tmp
                    Filesize

                    3KB

                    MD5

                    7741ca655eae3de3edd79b3ff5c09091

                    SHA1

                    e51c78456b97069163d2151bb05b47be9d9063cc

                    SHA256

                    88e77e4d914a55963121af6ebdeb47adac43ffd5997beb0cfeb20047bb9f6cfc

                    SHA512

                    8bc9e1e0432942d97d3cb301c5138bf10107ca91d9a613747a645af9a22525ca1d135d64984d7cd4ff7764894cc7b9929dc86ddf4e43ce53156ddf02f23cfabb

                  • C:\Users\Admin\AppData\Local\Temp\is-E16HC.tmp\xp_rtp104e.exe
                    Filesize

                    21.9MB

                    MD5

                    611881d2a5b8825df189616e7a2760f3

                    SHA1

                    2a907a5371d27dbf80cd9efc399fff76109a3968

                    SHA256

                    b3bd20ad7f413b40ac233aafd2e061de1dc429c2eadb59d0b3157ba3c47f16b2

                    SHA512

                    d79d8f57f8219574723239c0091068db64d2304e6b7495187247397491371e8761e711d027cab36bd08cbf86a1bf805dfbfeaff910f6b49458ff9c0c5872af23

                  • C:\Users\Admin\AppData\Local\Temp\is-M4FS9.tmp\RPGXP_E.tmp
                    Filesize

                    1.1MB

                    MD5

                    63b15124be653dbe589c7981da9d397c

                    SHA1

                    af8874bdf2ad726f5420e8132c10becc2bbcd93c

                    SHA256

                    61674b90891ca099d5fee62bf063a948a80863530ab6a31e7f9e06f0e5bc7599

                    SHA512

                    339b284b5dd7386dcfa86c8fdcf239a0e97cc168229ea9a66fc0c6b26771401fa7f27c2c6a435a836a43ea9c7e634a3e47ec77e0d27985794bbb4416dfc97ac8

                  • C:\Users\Admin\AppData\Local\Temp\is-SROAJ.tmp\_isetup\_shfoldr.dll
                    Filesize

                    22KB

                    MD5

                    92dc6ef532fbb4a5c3201469a5b5eb63

                    SHA1

                    3e89ff837147c16b4e41c30d6c796374e0b8e62c

                    SHA256

                    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                    SHA512

                    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                  • C:\Users\Admin\Videos\Captures\desktop.ini
                    Filesize

                    190B

                    MD5

                    b0d27eaec71f1cd73b015f5ceeb15f9d

                    SHA1

                    62264f8b5c2f5034a1e4143df6e8c787165fbc2f

                    SHA256

                    86d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2

                    SHA512

                    7b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c

                  • memory/512-0-0x0000000000400000-0x0000000000427000-memory.dmp
                    Filesize

                    156KB

                  • memory/512-2-0x0000000000401000-0x0000000000412000-memory.dmp
                    Filesize

                    68KB

                  • memory/512-1926-0x0000000000400000-0x0000000000427000-memory.dmp
                    Filesize

                    156KB

                  • memory/512-12-0x0000000000400000-0x0000000000427000-memory.dmp
                    Filesize

                    156KB

                  • memory/1172-1922-0x0000000000400000-0x0000000000414000-memory.dmp
                    Filesize

                    80KB

                  • memory/1172-1881-0x0000000000400000-0x0000000000414000-memory.dmp
                    Filesize

                    80KB

                  • memory/1488-1921-0x0000000000400000-0x00000000004B6000-memory.dmp
                    Filesize

                    728KB

                  • memory/1488-1884-0x0000000000400000-0x00000000004B6000-memory.dmp
                    Filesize

                    728KB

                  • memory/1800-1964-0x0000000000400000-0x000000000099A000-memory.dmp
                    Filesize

                    5.6MB

                  • memory/1800-1931-0x0000000005B00000-0x0000000005D04000-memory.dmp
                    Filesize

                    2.0MB

                  • memory/1800-1939-0x0000000005B00000-0x0000000005D04000-memory.dmp
                    Filesize

                    2.0MB

                  • memory/1800-1930-0x0000000000400000-0x000000000099A000-memory.dmp
                    Filesize

                    5.6MB

                  • memory/1800-1961-0x0000000005B00000-0x0000000005D04000-memory.dmp
                    Filesize

                    2.0MB

                  • memory/1800-1935-0x0000000005B00000-0x0000000005D04000-memory.dmp
                    Filesize

                    2.0MB

                  • memory/3404-1967-0x0000000005990000-0x0000000005B94000-memory.dmp
                    Filesize

                    2.0MB

                  • memory/3404-1982-0x0000000000400000-0x000000000099A000-memory.dmp
                    Filesize

                    5.6MB

                  • memory/4516-2000-0x0000000000400000-0x000000000099A000-memory.dmp
                    Filesize

                    5.6MB

                  • memory/4648-13-0x0000000000400000-0x000000000052B000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/4648-15-0x0000000000400000-0x000000000052B000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/4648-21-0x0000000000400000-0x000000000052B000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/4648-101-0x0000000000400000-0x000000000052B000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/4648-7-0x0000000000400000-0x000000000052B000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/4648-1925-0x0000000000400000-0x000000000052B000-memory.dmp
                    Filesize

                    1.2MB