Analysis

  • max time kernel
    144s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-02-2024 06:06

General

  • Target

    SampDroid.exe

  • Size

    120.4MB

  • MD5

    8a4318c2a9f52f8bf99a62a4220d895f

  • SHA1

    570a8978c012a390da251ef3d76dfd7364fdd18e

  • SHA256

    2a91ed841fcf2c720c33f3fdbd10bd53adf3bdfc2e69f0dd96b1fd45a2ef5350

  • SHA512

    7788ae81f663f8586515e9b3210e8bb2b5abcc6d0e31a359f7a751d9846b033ac58fdc2cb4e05c72475ae12d2870e3b0e29d8414f3618dcde0097be0ccc26fa8

  • SSDEEP

    1572864:m1f0+Sva7Hdp1Nhn+aCdrvdYrZ/7/lbg8udR8SnuSE49z:basulbg8yTnbEOz

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SampDroid.exe
    "C:\Users\Admin\AppData\Local\Temp\SampDroid.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Users\Admin\AppData\Local\Temp\SampDroid.exe
      "C:\Users\Admin\AppData\Local\Temp\SampDroid.exe" --type=gpu-process --field-trial-handle=1568,14688294571451079340,16112037173881711975,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1600 /prefetch:2
      2⤵
        PID:2132
      • C:\Users\Admin\AppData\Local\Temp\SampDroid.exe
        "C:\Users\Admin\AppData\Local\Temp\SampDroid.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1568,14688294571451079340,16112037173881711975,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2072 /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3484
      • C:\Users\Admin\AppData\Local\Temp\SampDroid.exe
        "C:\Users\Admin\AppData\Local\Temp\SampDroid.exe" --type=renderer --field-trial-handle=1568,14688294571451079340,16112037173881711975,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --node-integration --no-sandbox --no-zygote --enable-remote-module --background-color=#fff --enable-spellcheck --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2272 /prefetch:1
        2⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        PID:852
      • C:\Users\Admin\AppData\Local\Temp\SampDroid.exe
        "C:\Users\Admin\AppData\Local\Temp\SampDroid.exe" --type=gpu-process --field-trial-handle=1568,14688294571451079340,16112037173881711975,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=2852 /prefetch:2
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2368
    • C:\Windows\System32\CompPkgSrv.exe
      C:\Windows\System32\CompPkgSrv.exe -Embedding
      1⤵
        PID:4588

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.exc
        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • memory/2132-2-0x00007FF97CFE0000-0x00007FF97CFE1000-memory.dmp
        Filesize

        4KB

      • memory/2132-48-0x0000012CF7BB0000-0x0000012CF7CDA000-memory.dmp
        Filesize

        1.2MB

      • memory/2132-50-0x0000012CF7BB0000-0x0000012CF7CDA000-memory.dmp
        Filesize

        1.2MB

      • memory/2132-53-0x0000012CF7BB0000-0x0000012CF7CDA000-memory.dmp
        Filesize

        1.2MB

      • memory/2132-54-0x0000012CF7BB0000-0x0000012CF7CDA000-memory.dmp
        Filesize

        1.2MB

      • memory/2132-62-0x0000012CF7BB0000-0x0000012CF7CDA000-memory.dmp
        Filesize

        1.2MB