sysprep.exe
- File Path:
C:\Windows\system32\Sysprep\sysprep.exe - Description: System Preparation Tool
Screenshot

Hashes
| Type | Hash |
|---|---|
| MD5 | DC3A5AB0D06F19841749657074D475CF |
| SHA1 | 2C6A9FC172AF8F865BE220AE4BAC7C020316D73C |
| SHA256 | 3588BFEBE1D297EE8C240A27413699A1E845436535CDD654A1B7B9D7A96B6D72 |
| SHA384 | 5955E9E5E042CD76419A21BF0F6C89E0E8D529D90A7E828241AE0D251BC68D3394D1A40FB427B3B0E79EE866F2F85486 |
| SHA512 | A64D841132371DAEC58C21C39B1A764906FF7D9EED8E7FFF81F50C0F19C7C01EEF58AD7279FDC21969FFB384D7164DF9B80BFF377C9818893808D3D321EA97CF |
| SSDEEP | 24576:6Z8PDJ5bAFtyUFoFsUQvPEh8OPI7CxG5g+xnVxqwBsR5BqHr:6ZEF5biJj |
| IMP | 2DB59D6B21A44D890E675DCA40D28254 |
| PESHA1 | 2FE19562F0719E6C7E3B6AEE33ED00CDB71CE51F |
| PE256 | E77132E98A5A0FFF7D8A7C2C2EF2E2FFFB5A483DF73827A7C2DCBDDDCE94358D |
Runtime Data
Window Title:
System Preparation Tool 3.14
Open Handles:
| Path | Type |
|---|---|
| (R-D) C:\Windows\Fonts\StaticCache.dat | File |
| (R-D) C:\Windows\System32\Sysprep\en-US\sysprep.exe.mui | File |
| (R-D) C:\Windows\SystemResources\imageres.dll.mun | File |
| (RW-) C:\Users\user\Documents | File |
| (RW-) C:\Windows\System32\Sysprep\Panther\diagerr.xml | File |
| (RW-) C:\Windows\System32\Sysprep\Panther\diagwrn.xml | File |
| (RW-) C:\Windows\System32\Sysprep\Panther\setupact.log | File |
| (RW-) C:\Windows\System32\Sysprep\Panther\setuperr.log | File |
| (RW-) C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.488_none_ca04af081b815d21 | File |
| \BaseNamedObjects\NLS_CodePage_1252_3_2_0_0 | Section |
| \BaseNamedObjects\NLS_CodePage_437_3_2_0_0 | Section |
| \BaseNamedObjects\SetupLogSection | Section |
| \Sessions\1\Windows\Theme1703657751 | Section |
| \Windows\Theme1455388728 | Section |
Loaded Modules:
| Path |
|---|
| C:\Windows\System32\ADVAPI32.dll |
| C:\Windows\System32\combase.dll |
| C:\Windows\System32\GDI32.dll |
| C:\Windows\System32\gdi32full.dll |
| C:\Windows\System32\KERNEL32.DLL |
| C:\Windows\System32\KERNELBASE.dll |
| C:\Windows\System32\msvcp_win.dll |
| C:\Windows\System32\msvcrt.dll |
| C:\Windows\SYSTEM32\ntdll.dll |
| C:\Windows\System32\ole32.dll |
| C:\Windows\System32\RPCRT4.dll |
| C:\Windows\System32\sechost.dll |
| C:\Windows\System32\SHLWAPI.dll |
| C:\Windows\system32\Sysprep\sysprep.exe |
| C:\Windows\System32\ucrtbase.dll |
| C:\Windows\System32\USER32.dll |
| C:\Windows\System32\win32u.dll |
Signature
- Status: Signature verified.
- Serial:
330000026551AE1BBD005CBFBD000000000265 - Thumbprint:
E168609353F30FF2373157B4EB8CD519D07A2BFF - Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
- Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
File Metadata
- Original Filename: sysprep.EXE.MUI
- Product Name: Microsoft Windows Operating System
- Company Name: Microsoft Corporation
- File Version: 10.0.19041.1 (WinBuild.160101.0800)
- Product Version: 10.0.19041.1
- Language: English (United States)
- Legal Copyright: Microsoft Corporation. All rights reserved.
- Machine Type: 64-bit
File Scan
- VirusTotal Detections: 0/68
- VirusTotal Link: https://www.virustotal.com/gui/file/3588bfebe1d297ee8c240a27413699a1e845436535cdd654a1b7b9d7a96b6d72/detection/
Possible Misuse
The following table contains possible examples of sysprep.exe being misused. While sysprep.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
| Source | Source File | Example | License |
|---|---|---|---|
| sigma | proc_creation_win_susp_sysprep_appdata.yml | title: Sysprep on AppData Folder |
DRL 1.0 |
| sigma | proc_creation_win_susp_sysprep_appdata.yml | description: Detects suspicious sysprep process start with AppData folder as target (as used by Trojan Syndicasec in Thrip report by Symantec) |
DRL 1.0 |
| sigma | proc_creation_win_susp_sysprep_appdata.yml | - '\sysprep.exe' |
DRL 1.0 |
| malware-ioc | 2021_T2 | Sysprep |
© ESET 2014-2018 |
| signature-base | apt_codoso.yar | $c3 = “\sysprep\sysprep.exe” fullword wide | CC BY-NC 4.0 |
| signature-base | apt_codoso.yar | $c4 = “\sysprep\CRYPTBASE.dll” fullword wide | CC BY-NC 4.0 |
| signature-base | apt_codoso.yar | $c7 = “\sysprep” fullword wide | CC BY-NC 4.0 |
| signature-base | apt_hellsing_kaspersky.yar | $a9 = “C:\Windows\System32\sysprep\sysprep.exe” wide | CC BY-NC 4.0 |
| signature-base | apt_thrip.yar | $s1 = “C:\WINDOWS\system32\sysprep\cryptbase.dll” fullword ascii | CC BY-NC 4.0 |
| signature-base | apt_thrip.yar | $s2 = “C:\Windows\SysNative\sysprep\cryptbase.dll” fullword ascii | CC BY-NC 4.0 |
| signature-base | apt_thrip.yar | $s2 = “C:\Windows\system32\sysprep\cryptbase.dll” fullword ascii | CC BY-NC 4.0 |
| signature-base | apt_win_plugx.yar | $s3 = “l%s\sysprep\CRYPTBASE.DLL” fullword wide | CC BY-NC 4.0 |
| signature-base | apt_win_plugx.yar | $s7 = “%s\sysprep\sysprep.exe” fullword wide | CC BY-NC 4.0 |
| signature-base | exploit_uac_elevators.yar | $s3 = “%systemroot%\system32\sysprep\sysprep.exe” fullword wide | CC BY-NC 4.0 |
| signature-base | exploit_uac_elevators.yar | $s4 = “/c wusa %ws /extract:%%windir%%\system32\sysprep” fullword wide | CC BY-NC 4.0 |
| signature-base | exploit_uac_elevators.yar | $s6 = “loadFrom="%systemroot%\system32\sysprep\cryptbase.DLL"” fullword ascii | CC BY-NC 4.0 |
MIT License. Copyright (c) 2020-2021 Strontic.