Overview
overview
10Static
static
10SampDroid ...er.exe
windows7-x64
SampDroid ...er.exe
windows10-2004-x64
$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1SampDroid.exe
windows7-x64
7SampDroid.exe
windows10-2004-x64
7d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1launcher/SA-MP.exe
windows7-x64
3launcher/SA-MP.exe
windows10-2004-x64
3SAMPUninstall.exe
windows7-x64
7SAMPUninstall.exe
windows10-2004-x64
7bass.dll
windows7-x64
1bass.dll
windows10-2004-x64
1rcon.exe
windows7-x64
1rcon.exe
windows10-2004-x64
1samp.dll
windows7-x64
1samp.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1resources/...64.exe
windows7-x64
1Analysis
-
max time kernel
123s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 06:06
Behavioral task
behavioral1
Sample
SampDroid Launcher.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
SampDroid Launcher.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
LICENSES.chromium.html
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
LICENSES.chromium.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
SampDroid.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
SampDroid.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
d3dcompiler_47.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral16
Sample
ffmpeg.dll
Resource
win7-20231215-en
Behavioral task
behavioral17
Sample
ffmpeg.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral18
Sample
launcher/SA-MP.exe
Resource
win7-20231129-en
Behavioral task
behavioral19
Sample
launcher/SA-MP.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral20
Sample
SAMPUninstall.exe
Resource
win7-20231215-en
Behavioral task
behavioral21
Sample
SAMPUninstall.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral22
Sample
bass.dll
Resource
win7-20231215-en
Behavioral task
behavioral23
Sample
bass.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral24
Sample
rcon.exe
Resource
win7-20231215-en
Behavioral task
behavioral25
Sample
rcon.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral26
Sample
samp.dll
Resource
win7-20231215-en
Behavioral task
behavioral27
Sample
samp.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral28
Sample
libEGL.dll
Resource
win7-20231215-en
Behavioral task
behavioral29
Sample
libEGL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral30
Sample
libGLESv2.dll
Resource
win7-20231215-en
Behavioral task
behavioral31
Sample
libGLESv2.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral32
Sample
resources/app.asar.unpacked/node_modules/rcedit/bin/rcedit-x64.exe
Resource
win7-20231215-en
General
-
Target
SampDroid.exe
-
Size
120.4MB
-
MD5
8a4318c2a9f52f8bf99a62a4220d895f
-
SHA1
570a8978c012a390da251ef3d76dfd7364fdd18e
-
SHA256
2a91ed841fcf2c720c33f3fdbd10bd53adf3bdfc2e69f0dd96b1fd45a2ef5350
-
SHA512
7788ae81f663f8586515e9b3210e8bb2b5abcc6d0e31a359f7a751d9846b033ac58fdc2cb4e05c72475ae12d2870e3b0e29d8414f3618dcde0097be0ccc26fa8
-
SSDEEP
1572864:m1f0+Sva7Hdp1Nhn+aCdrvdYrZ/7/lbg8udR8SnuSE49z:basulbg8yTnbEOz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Control Panel\International\Geo\Nation SampDroid.exe Key value queried \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Control Panel\International\Geo\Nation SampDroid.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2560 SampDroid.exe 2544 SampDroid.exe 2868 SampDroid.exe 2868 SampDroid.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2840 2868 SampDroid.exe 28 PID 2868 wrote to memory of 2560 2868 SampDroid.exe 29 PID 2868 wrote to memory of 2560 2868 SampDroid.exe 29 PID 2868 wrote to memory of 2560 2868 SampDroid.exe 29 PID 2868 wrote to memory of 2544 2868 SampDroid.exe 30 PID 2868 wrote to memory of 2544 2868 SampDroid.exe 30 PID 2868 wrote to memory of 2544 2868 SampDroid.exe 30 PID 2868 wrote to memory of 2184 2868 SampDroid.exe 31 PID 2868 wrote to memory of 2184 2868 SampDroid.exe 31 PID 2868 wrote to memory of 2184 2868 SampDroid.exe 31 PID 2868 wrote to memory of 2184 2868 SampDroid.exe 31 PID 2868 wrote to memory of 2184 2868 SampDroid.exe 31 PID 2868 wrote to memory of 2184 2868 SampDroid.exe 31 PID 2868 wrote to memory of 2184 2868 SampDroid.exe 31 PID 2868 wrote to memory of 2184 2868 SampDroid.exe 31 PID 2868 wrote to memory of 2184 2868 SampDroid.exe 31 PID 2868 wrote to memory of 2184 2868 SampDroid.exe 31 PID 2868 wrote to memory of 2184 2868 SampDroid.exe 31 PID 2868 wrote to memory of 2184 2868 SampDroid.exe 31 PID 2868 wrote to memory of 2184 2868 SampDroid.exe 31 PID 2868 wrote to memory of 2184 2868 SampDroid.exe 31 PID 2868 wrote to memory of 2184 2868 SampDroid.exe 31 PID 2868 wrote to memory of 2184 2868 SampDroid.exe 31 PID 2868 wrote to memory of 2184 2868 SampDroid.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\SampDroid.exe"C:\Users\Admin\AppData\Local\Temp\SampDroid.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\SampDroid.exe"C:\Users\Admin\AppData\Local\Temp\SampDroid.exe" --type=gpu-process --field-trial-handle=1008,11260794646139359116,10185477156220366414,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1016 /prefetch:22⤵PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\SampDroid.exe"C:\Users\Admin\AppData\Local\Temp\SampDroid.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1008,11260794646139359116,10185477156220366414,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\SampDroid.exe"C:\Users\Admin\AppData\Local\Temp\SampDroid.exe" --type=renderer --field-trial-handle=1008,11260794646139359116,10185477156220366414,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --node-integration --no-sandbox --no-zygote --enable-remote-module --background-color=#fff --enable-spellcheck --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1468 /prefetch:12⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\SampDroid.exe"C:\Users\Admin\AppData\Local\Temp\SampDroid.exe" --type=gpu-process --field-trial-handle=1008,11260794646139359116,10185477156220366414,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1016 /prefetch:22⤵PID:2184
-