Static task
static1
Behavioral task
behavioral1
Sample
RdpSa.exe
Resource
win10v2004-20231020-en
General
-
Target
RdpSa.exe
-
Size
38KB
-
MD5
25049592e0f21d6dc63569731c3dd244
-
SHA1
dabcdc53ed62044a77edd378c7375a343e8f3418
-
SHA256
9cb261a036e78918845f37942f8f13cf2e25476d2df5c9bc9ee2d5f4c8c12331
-
SHA512
de338f840efc3dbeb076cd43beb0b2fa307bf78032cd667505f325717137c3f5a7aa27eb2d75a35a3d2edeca61fe512764b408937d987069ae152f0a2d77631a
-
SSDEEP
384:bE28bmDnHPoFT8i8MlhsXD5Ge3XS3YvWh4bW4DlZrxYvXq0gEbNB7u49E7WFJW/V:F8AnvuoDMoDv3XyT4hfrxpYREOIV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource RdpSa.exe
Files
-
RdpSa.exe.exe windows:10 windows x86
a3a4d9445be1b9a0888c64afae7927b9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
TraceMessage
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
RegisterTraceGuidsW
UnregisterTraceGuids
OpenProcessToken
RegOpenKeyExW
RegNotifyChangeKeyValue
RegGetValueW
SetSecurityInfo
AddAce
GetAce
AddAccessDeniedAce
InitializeAcl
GetLengthSid
GetSecurityInfo
GetTokenInformation
kernel32
CreateEventW
Sleep
WaitForSingleObject
MapViewOfFile
SetEvent
UnmapViewOfFile
FormatMessageW
LocalFree
HeapFree
GetProcessHeap
LocalAlloc
TerminateProcess
UnhandledExceptionFilter
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoW
HeapAlloc
FreeLibrary
GetProcAddress
GetModuleHandleExA
GetLastError
HeapReAlloc
HeapSetInformation
GetCurrentProcess
GetCurrentProcessId
ProcessIdToSessionId
CloseHandle
user32
DestroyWindow
KillTimer
CreateWindowExW
RegisterClassExW
SetWindowLongW
GetWindowLongW
DefWindowProcW
SetTimer
GetMessageW
TranslateMessage
DispatchMessageW
PostQuitMessage
LoadStringW
msvcrt
_unlock
_lock
_wcmdln
_initterm
__setusermatherr
__p__fmode
__dllonexit
_exit
exit
__set_app_type
__wgetmainargs
_amsg_exit
__p__commode
_XcptFilter
free
_callnewh
malloc
_purecall
_vsnwprintf
_onexit
?terminate@@YAXXZ
memcmp
_controlfp
_except_handler4_common
_cexit
memset
ws2_32
FreeAddrInfoW
GetNameInfoW
GetAddrInfoW
ole32
CoInitializeSecurity
CoInitializeEx
CreateBindCtx
MkParseDisplayName
CoCreateInstance
CoUninitialize
ntdll
EtwEventWriteFull
EtwEventRegister
EtwEventUnregister
oleaut32
SysAllocString
SysStringLen
SysAllocStringByteLen
SysFreeString
winsta
WinStationShadowStop2
WinStationSendMessageW
api-ms-win-core-com-l1-1-1
CoTaskMemFree
StringFromCLSID
sspicli
GetUserNameExW
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ