Overview
overview
10Static
static
10SampDroid ...er.exe
windows7-x64
SampDroid ...er.exe
windows10-2004-x64
$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1SampDroid.exe
windows7-x64
7SampDroid.exe
windows10-2004-x64
7d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1launcher/SA-MP.exe
windows7-x64
3launcher/SA-MP.exe
windows10-2004-x64
3SAMPUninstall.exe
windows7-x64
7SAMPUninstall.exe
windows10-2004-x64
7bass.dll
windows7-x64
1bass.dll
windows10-2004-x64
1rcon.exe
windows7-x64
1rcon.exe
windows10-2004-x64
1samp.dll
windows7-x64
1samp.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1resources/...64.exe
windows7-x64
1Analysis
-
max time kernel
144s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 06:06
Behavioral task
behavioral1
Sample
SampDroid Launcher.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
SampDroid Launcher.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
LICENSES.chromium.html
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
LICENSES.chromium.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
SampDroid.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
SampDroid.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
d3dcompiler_47.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral16
Sample
ffmpeg.dll
Resource
win7-20231215-en
Behavioral task
behavioral17
Sample
ffmpeg.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral18
Sample
launcher/SA-MP.exe
Resource
win7-20231129-en
Behavioral task
behavioral19
Sample
launcher/SA-MP.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral20
Sample
SAMPUninstall.exe
Resource
win7-20231215-en
Behavioral task
behavioral21
Sample
SAMPUninstall.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral22
Sample
bass.dll
Resource
win7-20231215-en
Behavioral task
behavioral23
Sample
bass.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral24
Sample
rcon.exe
Resource
win7-20231215-en
Behavioral task
behavioral25
Sample
rcon.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral26
Sample
samp.dll
Resource
win7-20231215-en
Behavioral task
behavioral27
Sample
samp.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral28
Sample
libEGL.dll
Resource
win7-20231215-en
Behavioral task
behavioral29
Sample
libEGL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral30
Sample
libGLESv2.dll
Resource
win7-20231215-en
Behavioral task
behavioral31
Sample
libGLESv2.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral32
Sample
resources/app.asar.unpacked/node_modules/rcedit/bin/rcedit-x64.exe
Resource
win7-20231215-en
General
-
Target
SampDroid.exe
-
Size
120.4MB
-
MD5
8a4318c2a9f52f8bf99a62a4220d895f
-
SHA1
570a8978c012a390da251ef3d76dfd7364fdd18e
-
SHA256
2a91ed841fcf2c720c33f3fdbd10bd53adf3bdfc2e69f0dd96b1fd45a2ef5350
-
SHA512
7788ae81f663f8586515e9b3210e8bb2b5abcc6d0e31a359f7a751d9846b033ac58fdc2cb4e05c72475ae12d2870e3b0e29d8414f3618dcde0097be0ccc26fa8
-
SSDEEP
1572864:m1f0+Sva7Hdp1Nhn+aCdrvdYrZ/7/lbg8udR8SnuSE49z:basulbg8yTnbEOz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation SampDroid.exe Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation SampDroid.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3484 SampDroid.exe 3484 SampDroid.exe 852 SampDroid.exe 852 SampDroid.exe 2368 SampDroid.exe 2368 SampDroid.exe 2368 SampDroid.exe 2368 SampDroid.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 2132 4696 SampDroid.exe 83 PID 4696 wrote to memory of 3484 4696 SampDroid.exe 84 PID 4696 wrote to memory of 3484 4696 SampDroid.exe 84 PID 4696 wrote to memory of 852 4696 SampDroid.exe 85 PID 4696 wrote to memory of 852 4696 SampDroid.exe 85 PID 4696 wrote to memory of 2368 4696 SampDroid.exe 95 PID 4696 wrote to memory of 2368 4696 SampDroid.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\SampDroid.exe"C:\Users\Admin\AppData\Local\Temp\SampDroid.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\SampDroid.exe"C:\Users\Admin\AppData\Local\Temp\SampDroid.exe" --type=gpu-process --field-trial-handle=1568,14688294571451079340,16112037173881711975,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1600 /prefetch:22⤵PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\SampDroid.exe"C:\Users\Admin\AppData\Local\Temp\SampDroid.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1568,14688294571451079340,16112037173881711975,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2072 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
C:\Users\Admin\AppData\Local\Temp\SampDroid.exe"C:\Users\Admin\AppData\Local\Temp\SampDroid.exe" --type=renderer --field-trial-handle=1568,14688294571451079340,16112037173881711975,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --node-integration --no-sandbox --no-zygote --enable-remote-module --background-color=#fff --enable-spellcheck --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2272 /prefetch:12⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\SampDroid.exe"C:\Users\Admin\AppData\Local\Temp\SampDroid.exe" --type=gpu-process --field-trial-handle=1568,14688294571451079340,16112037173881711975,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=2852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84