Static task
static1
Behavioral task
behavioral1
Sample
RdpSaProxy.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
RdpSaProxy.exe
Resource
win10v2004-20230915-en
General
-
Target
RdpSaProxy.exe
-
Size
32KB
-
MD5
682791cecdd63f33ec364013b20fa41a
-
SHA1
53addbd09640c64993e0782009e11fba0bc605b5
-
SHA256
f8e6d42eaee102b1880b173ac56c091e2962ea4b724f9dde7f01a8f85357600f
-
SHA512
5ca41ebefc9c1eaacf17d270ec604c6ac38d0358ee806e49baef3541e8fc1c3cb47164797dd82cc3ff9e1dbce58948a42c2f93e1d79fc563b5606d75255d932f
-
SSDEEP
768:52lUYIq1QbEFwwBQqOmhYrNeekZoHE50A:52+YT1Q4zQ8YrNCZoHE50
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource RdpSaProxy.exe
Files
-
RdpSaProxy.exe.exe windows:10 windows x86
bc8de7e35e1a808abb6a378720a335f6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
TraceMessage
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
RegisterTraceGuidsW
UnregisterTraceGuids
OpenProcessToken
OpenThreadToken
GetTokenInformation
EqualSid
CreateWellKnownSid
SetSecurityInfo
AddAce
GetAce
AddAccessDeniedAce
InitializeAcl
GetLengthSid
GetSecurityInfo
AddAccessAllowedAce
kernel32
LocalAlloc
GetCurrentThread
GetCurrentProcessId
ProcessIdToSessionId
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
DelayLoadFailureHook
ResolveDelayLoadedAPI
InitializeSRWLock
CloseHandle
GetCurrentProcess
HeapSetInformation
GetModuleHandleExA
GetProcAddress
FreeLibrary
GetLastError
SetProcessMitigationPolicy
LocalFree
user32
GetMessageW
TranslateMessage
DispatchMessageW
PostQuitMessage
msvcrt
memcpy
memmove
_except_handler4_common
_controlfp
?terminate@@YAXXZ
__CxxFrameHandler3
_onexit
??1type_info@@UAE@XZ
_unlock
_lock
_wcmdln
_initterm
__setusermatherr
__p__fmode
_cexit
_exit
?what@exception@@UBEPBDXZ
__set_app_type
__wgetmainargs
_amsg_exit
__p__commode
_XcptFilter
??3@YAXPAX@Z
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@ABQBDH@Z
??0exception@@QAE@ABQBD@Z
_callnewh
malloc
_purecall
??1exception@@UAE@XZ
exit
_CxxThrowException
__dllonexit
memset
ntdll
EtwEventRegister
EtwEventUnregister
api-ms-win-core-com-l1-1-0
CoInitializeEx
CoRevokeClassObject
CoRegisterClassObject
CoUninitialize
CoInitializeSecurity
CoTaskMemFree
CoImpersonateClient
CoRevertToSelf
oleaut32
SysAllocStringByteLen
SysStringByteLen
SysFreeString
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-processthreads-l1-1-0
GetCurrentThreadId
GetStartupInfoW
TerminateProcess
api-ms-win-core-errorhandling-l1-1-0
UnhandledExceptionFilter
SetUnhandledExceptionFilter
api-ms-win-core-libraryloader-l1-2-0
GetModuleHandleW
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0
GetSystemTimeAsFileTime
GetTickCount
api-ms-win-core-path-l1-1-0
PathCchCombine
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ