ServiceMain
SvchostPushServiceGlobals
Static task
static1
Behavioral task
behavioral1
Sample
SuperRDP.dll
Resource
win10-20230831-en
Behavioral task
behavioral2
Sample
SuperRDP.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral3
Sample
SuperRDP2.exe
Resource
win10-20230831-en
Behavioral task
behavioral4
Sample
SuperRDP2.exe
Resource
win10v2004-20230831-en
Target
SuperRDP2.zip
Size
13.7MB
MD5
4d29550edaafcaa5df9142e4179bd879
SHA1
4dd4101a2f64d4e012ddecdb74203fda8cc7eef1
SHA256
f3a70d019e343871ddc494ebaff5c5d2a87529fa27ab4a672e49b41dc28a061a
SHA512
866d83078ee7e407fbe557c6aa04fb847f3cbc32530af4d8a1bdc7654d7aafe80f7ab35eead259d945fdad0c60c0a6fd119b681e1a567b1d2dea8014f1a564ac
SSDEEP
393216:tCE+g5xQOsppTPpjIALN5SkSm1bK5E9AqLjOktn:oE+g5mbpljIwSkSE25EOq3Okp
Checks for missing Authenticode signature.
resource |
---|
unpack001/SuperRDP.dll |
unpack001/SuperRDP2.exe |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
RtlUnwindEx
RtlPcToFileHeader
__C_specific_handler
__chkstk
memmove
strrchr
memcmp
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
memset
memcpy
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
FindNextFileW
FindFirstFileExW
FindClose
EncodePointer
InterlockedFlushSList
InitializeSListHead
QueryPerformanceCounter
HeapReAlloc
CreateFileW
GetFileSize
CloseHandle
ReadFile
SetLastError
WriteProcessMemory
GetCurrentProcess
GetModuleFileNameW
GetSystemDirectoryW
LoadLibraryW
GetProcAddress
ReadProcessMemory
WriteFile
OutputDebugStringA
SetFilePointer
GetModuleHandleExW
GetCurrentThreadId
GetCurrentProcessId
CreateToolhelp32Snapshot
Thread32First
OpenThread
ResumeThread
SuspendThread
Thread32Next
GetModuleHandleW
FindResourceW
LoadResource
LoadLibraryExW
GetLastError
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
WideCharToMultiByte
HeapFree
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetStdHandle
GetFileType
GetStartupInfoW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
FreeLibrary
LCMapStringW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
MultiByteToWideChar
GetProcessHeap
SetFilePointerEx
SetStdHandle
ExitProcess
GetConsoleOutputCP
GetConsoleMode
FlushFileBuffers
RaiseException
WriteConsoleW
HeapSize
wsprintfA
PathRemoveExtensionW
PathAppendW
ServiceMain
SvchostPushServiceGlobals
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
memcpy
shutdown
GetVersionExW
GetSystemTimeAsFileTime
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
TranslateAcceleratorW
GetUserObjectInformationW
GetProcessWindowStation
GetUserObjectInformationW
CreateCompatibleBitmap
TransparentBlt
DocumentPropertiesW
ControlService
SHGetSpecialFolderLocation
InitCommonControlsEx
PathFileExistsW
GetThemePartSize
CLSIDFromProgID
SafeArrayDestroy
OleUIBusyW
GdipDrawImageRectI
SymInitialize
DestroyEnvironmentBlock
VerQueryValueW
CertCloseStore
LresultFromObject
ImmGetContext
PlaySoundW
ord27
WTSSendMessageW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ