Overview
overview
10Static
static
10SampDroid ...er.exe
windows7-x64
SampDroid ...er.exe
windows10-2004-x64
$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1SampDroid.exe
windows7-x64
7SampDroid.exe
windows10-2004-x64
7d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1launcher/SA-MP.exe
windows7-x64
3launcher/SA-MP.exe
windows10-2004-x64
3SAMPUninstall.exe
windows7-x64
7SAMPUninstall.exe
windows10-2004-x64
7bass.dll
windows7-x64
1bass.dll
windows10-2004-x64
1rcon.exe
windows7-x64
1rcon.exe
windows10-2004-x64
1samp.dll
windows7-x64
1samp.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1resources/...64.exe
windows7-x64
1Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 06:06
Behavioral task
behavioral1
Sample
SampDroid Launcher.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
SampDroid Launcher.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
LICENSES.chromium.html
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
LICENSES.chromium.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
SampDroid.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
SampDroid.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
d3dcompiler_47.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral16
Sample
ffmpeg.dll
Resource
win7-20231215-en
Behavioral task
behavioral17
Sample
ffmpeg.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral18
Sample
launcher/SA-MP.exe
Resource
win7-20231129-en
Behavioral task
behavioral19
Sample
launcher/SA-MP.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral20
Sample
SAMPUninstall.exe
Resource
win7-20231215-en
Behavioral task
behavioral21
Sample
SAMPUninstall.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral22
Sample
bass.dll
Resource
win7-20231215-en
Behavioral task
behavioral23
Sample
bass.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral24
Sample
rcon.exe
Resource
win7-20231215-en
Behavioral task
behavioral25
Sample
rcon.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral26
Sample
samp.dll
Resource
win7-20231215-en
Behavioral task
behavioral27
Sample
samp.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral28
Sample
libEGL.dll
Resource
win7-20231215-en
Behavioral task
behavioral29
Sample
libEGL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral30
Sample
libGLESv2.dll
Resource
win7-20231215-en
Behavioral task
behavioral31
Sample
libGLESv2.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral32
Sample
resources/app.asar.unpacked/node_modules/rcedit/bin/rcedit-x64.exe
Resource
win7-20231215-en
General
-
Target
SAMPUninstall.exe
-
Size
56KB
-
MD5
bffa504cd63305418858b150faa8f408
-
SHA1
86886fd2378aa33935cf684f056454859713aed4
-
SHA256
d00f8bf2eaa1994b0064d7b14fc987b0aab9b3c440a4177257ee2d3217fe6d3b
-
SHA512
6b8958a4ccffce02ba8e4390f66121a02116e2b2ef9c4baa2eea62b8acfe380d0c0dd5e773f83b7062467a34019612d3f8a531e1a4ffcefb769de964cbf02019
-
SSDEEP
1536:HLXB65939tY6HBg4sXJOgdLeAyN/dIM6su:HLk395hYXJOceAlMM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1704 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 1704 Au_.exe -
Loads dropped DLL 5 IoCs
pid Process 1916 SAMPUninstall.exe 1704 Au_.exe 1704 Au_.exe 1704 Au_.exe 1704 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral20/files/0x0033000000015c70-2.dat nsis_installer_1 behavioral20/files/0x0033000000015c70-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1704 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1704 1916 SAMPUninstall.exe 28 PID 1916 wrote to memory of 1704 1916 SAMPUninstall.exe 28 PID 1916 wrote to memory of 1704 1916 SAMPUninstall.exe 28 PID 1916 wrote to memory of 1704 1916 SAMPUninstall.exe 28 PID 1916 wrote to memory of 1704 1916 SAMPUninstall.exe 28 PID 1916 wrote to memory of 1704 1916 SAMPUninstall.exe 28 PID 1916 wrote to memory of 1704 1916 SAMPUninstall.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\SAMPUninstall.exe"C:\Users\Admin\AppData\Local\Temp\SAMPUninstall.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538B
MD557306d647251980383208ca3c402f51c
SHA164cc30945353c2799aa552d1fde9fca9b850573d
SHA2566b46647db4af556e72c1fdac72436f80fa2c3ba5a436196178e895e4e0699df6
SHA5129370e8b570b6ebe8049469b9e9daf4d7c259ce332c60ac7829053a331952815ffebc2861253e8b97ccd3e44039b923a9c15987e9c1d095f1d495d57c351f4966
-
Filesize
577B
MD576a886991debf28edb13216826b66823
SHA10a88f0db2289ec48d1cf7a6fa33c5a72e649b108
SHA2562fac33f63d2752658f10c079b073d0dea774deee25125fbaf9f4b423780dc130
SHA512af36dc4d91ec7f58552fe1e4fc25a37b56c113d0c7cd09dab7e041e46b00575385a1ccca91c16f2880c5167e448402bbcb3cda8838a4322c0e4bd13d0f8167b4
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
56KB
MD5bffa504cd63305418858b150faa8f408
SHA186886fd2378aa33935cf684f056454859713aed4
SHA256d00f8bf2eaa1994b0064d7b14fc987b0aab9b3c440a4177257ee2d3217fe6d3b
SHA5126b8958a4ccffce02ba8e4390f66121a02116e2b2ef9c4baa2eea62b8acfe380d0c0dd5e773f83b7062467a34019612d3f8a531e1a4ffcefb769de964cbf02019