Overview
overview
4Static
static
3PING.exe
windows10-2004-x64
3PackagedCW...er.exe
windows10-2004-x64
1PasswordOn...ut.exe
windows10-2004-x64
1PickerHost.exe
windows10-2004-x64
1PinEnrollm...er.exe
windows10-2004-x64
1PkgMgr.exe
windows10-2004-x64
1PktMon.exe
windows10-2004-x64
1PnPUnattend.exe
windows10-2004-x64
1PresentationHost.exe
windows10-2004-x64
1PrintIsola...st.exe
windows10-2004-x64
1ProximityUxHost.exe
windows10-2004-x64
1RMActivate.exe
windows10-2004-x64
1RMActivate_isv.exe
windows10-2004-x64
1RMActivate_ssp.exe
windows10-2004-x64
1RMActivate...sv.exe
windows10-2004-x64
1ROUTE.exe
windows10-2004-x64
1RdpSa.exe
windows10-2004-x64
1RdpSaProxy.exe
windows10-2004-x64
1RdpSaUacHelper.exe
windows10-2004-x64
1ReAgentc.exe
windows10-2004-x64
4RecoveryDrive.exe
windows10-2004-x64
1Register-C...er.exe
windows10-2004-x64
1RelPost.exe
windows10-2004-x64
1RemotePosWorker.exe
windows10-2004-x64
1ResetEngine.exe
windows10-2004-x64
1RmClient.exe
windows10-2004-x64
1Robocopy.exe
windows10-2004-x64
1RpcPing.exe
windows10-2004-x64
3RunLegacyC...ed.exe
windows10-2004-x64
1RuntimeBroker.exe
windows10-2004-x64
1SIHClient.exe
windows10-2004-x64
1SearchFilterHost.exe
windows10-2004-x64
1Resubmissions
23/08/2024, 16:00
240823-tf47dsteqe 623/08/2024, 15:32
240823-sy293sseld 423/08/2024, 15:18
240823-sp1d5athqk 823/08/2024, 14:12
240823-rjcv7sydnd 723/08/2024, 02:33
240823-c17dta1cpd 723/08/2024, 02:11
240823-cmbpzszelg 423/08/2024, 02:00
240823-ce59mazbnh 423/08/2024, 01:37
240823-b1992a1dmm 523/08/2024, 01:24
240823-bsm5jazhpp 523/08/2024, 00:51
240823-a7p21awhld 6Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 15:32
Static task
static1
Behavioral task
behavioral1
Sample
PING.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
PackagedCWALauncher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
PasswordOnWakeSettingFlyout.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
PickerHost.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
PinEnrollmentBroker.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
PkgMgr.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
PktMon.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
PnPUnattend.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
PresentationHost.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
PrintIsolationHost.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
ProximityUxHost.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
RMActivate.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
RMActivate_isv.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
RMActivate_ssp.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
RMActivate_ssp_isv.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
ROUTE.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
RdpSa.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
RdpSaProxy.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
RdpSaUacHelper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
ReAgentc.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
RecoveryDrive.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
Register-CimProvider.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
RelPost.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
RemotePosWorker.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
ResetEngine.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
RmClient.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Robocopy.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
RpcPing.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
RunLegacyCPLElevated.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
RuntimeBroker.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
SIHClient.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
SearchFilterHost.exe
Resource
win10v2004-20240802-en
General
-
Target
RdpSaUacHelper.exe
-
Size
56KB
-
MD5
4ac9a3d3d12da0ef45c00779dc18d40f
-
SHA1
f0e4a3247f265abc5ba93c64e47d23f6f2cad7d7
-
SHA256
e06b5a8e82100d8bfd5acf5a429bf4b4c38f2f51b779cbaca9340a8f1daca824
-
SHA512
9007aa2f049ef768dfb7758ca6261112efa34ec9f1a5415f85833848f0c96cf5baed3398d78ba309903e82b0a7ea6bd05eb7a6e87c545e782630c843fb1b9e43
-
SSDEEP
768:N/P4JjdINwnubT4fN6NAFxJ43vG5wjF9VgXZj5Z2Tnw:NX6pjuQfN6NAfJuG+HOXLZ2Tn
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3300 RdpSaUacHelper.exe 3300 RdpSaUacHelper.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4272 wrote to memory of 3244 4272 RdpSaProxy.exe 88 PID 4272 wrote to memory of 3244 4272 RdpSaProxy.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\RdpSaUacHelper.exe"C:\Users\Admin\AppData\Local\Temp\RdpSaUacHelper.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:3300
-
C:\Windows\system32\RdpSaProxy.exeC:\Windows\system32\RdpSaProxy.exe -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\system32\RdpSa.exe"C:\Windows\system32\RdpSa.exe"2⤵PID:3244
-