Overview
overview
7Static
static
7sa-mp-0.3....ll.exe
windows7-x64
3sa-mp-0.3....ll.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...al.ini
windows7-x64
1$PLUGINSDI...al.ini
windows10-2004-x64
1$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7$SYSDIR/d3dx9_25.dll
windows7-x64
3$SYSDIR/d3dx9_25.dll
windows10-2004-x64
3SAMP/SAMP.ide
windows7-x64
3SAMP/SAMP.ide
windows10-2004-x64
3SAMP/SAMP.img
windows7-x64
3SAMP/SAMP.img
windows10-2004-x64
3SAMP/SAMP.ipl
windows7-x64
3SAMP/SAMP.ipl
windows10-2004-x64
3SAMP/SAMPCOL.img
windows7-x64
3SAMP/SAMPCOL.img
windows10-2004-x64
3SAMP/blanktex.txd
windows7-x64
3SAMP/blanktex.txd
windows10-2004-x64
3SAMP/custom.img
windows7-x64
3SAMP/custom.img
windows10-2004-x64
3SAMP/samaps.txd
windows7-x64
3SAMP/samaps.txd
windows10-2004-x64
3SAMPUninstall.exe
windows7-x64
7SAMPUninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...al.ini
windows7-x64
1$PLUGINSDI...al.ini
windows10-2004-x64
1$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-03-2024 15:33
Behavioral task
behavioral1
Sample
sa-mp-0.3.7-R5-1-install.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sa-mp-0.3.7-R5-1-install.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$SYSDIR/d3dx9_25.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$SYSDIR/d3dx9_25.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
SAMP/SAMP.ide
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
SAMP/SAMP.ide
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
SAMP/SAMP.img
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
SAMP/SAMP.img
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
SAMP/SAMP.ipl
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
SAMP/SAMP.ipl
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
SAMP/SAMPCOL.img
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
SAMP/SAMPCOL.img
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
SAMP/blanktex.txd
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
SAMP/blanktex.txd
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
SAMP/custom.img
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
SAMP/custom.img
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
SAMP/samaps.txd
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
SAMP/samaps.txd
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
SAMPUninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
SAMPUninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240226-en
General
-
Target
SAMP/SAMP.ide
-
Size
87KB
-
MD5
9fc8a6769f18d3daceabbbed8632c68e
-
SHA1
5aef67fcfe871e3828b4686553c9471cf9b72497
-
SHA256
dd66aa822943526dffe0f80af88547615672c9bb6e9f3fcfde6d6f8b860f93f5
-
SHA512
17bad517167dd4fb1d70158dfe58015d2fa7760b3c005626d65a6b5280c29b3a92073ba856175b7e4b74cd2dea4e02b7b4ed83487163bbd2b0cbfda32b2190ee
-
SSDEEP
768:vYnhu2+hTAugR8SQHRcg7B3BOPxsmbPOfypzNEkuCm5UTsJE629iWnKjcGmjpEUB:ABNPxsMjzNwM6HkKEEUmfoqWtn
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\ide_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\ide_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.ide rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.ide\ = "ide_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\ide_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\ide_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\ide_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\ide_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2808 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2808 AcroRd32.exe 2808 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2540 2060 cmd.exe 29 PID 2060 wrote to memory of 2540 2060 cmd.exe 29 PID 2060 wrote to memory of 2540 2060 cmd.exe 29 PID 2540 wrote to memory of 2808 2540 rundll32.exe 30 PID 2540 wrote to memory of 2808 2540 rundll32.exe 30 PID 2540 wrote to memory of 2808 2540 rundll32.exe 30 PID 2540 wrote to memory of 2808 2540 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SAMP\SAMP.ide1⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SAMP\SAMP.ide2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\SAMP\SAMP.ide"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54fe95598e2e51a1aa343f8a5507c9e28
SHA15dee1e08f476b030c9bbb619f75533f34595dc60
SHA256a65db003634664de98a0d88aa8d050e0a5fc93045ecf67d8f85f18fb74029485
SHA5128adb68b1a019398a83c1350d853f5534592dc38dbf6e47150de57f7e6c8fadbc798bdd193bf23fafcca342100bd3aeac567fa28c424c3460df906fe728d2da1b