Overview
overview
7Static
static
7sa-mp-0.3....ll.exe
windows7-x64
3sa-mp-0.3....ll.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...al.ini
windows7-x64
1$PLUGINSDI...al.ini
windows10-2004-x64
1$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7$SYSDIR/d3dx9_25.dll
windows7-x64
3$SYSDIR/d3dx9_25.dll
windows10-2004-x64
3SAMP/SAMP.ide
windows7-x64
3SAMP/SAMP.ide
windows10-2004-x64
3SAMP/SAMP.img
windows7-x64
3SAMP/SAMP.img
windows10-2004-x64
3SAMP/SAMP.ipl
windows7-x64
3SAMP/SAMP.ipl
windows10-2004-x64
3SAMP/SAMPCOL.img
windows7-x64
3SAMP/SAMPCOL.img
windows10-2004-x64
3SAMP/blanktex.txd
windows7-x64
3SAMP/blanktex.txd
windows10-2004-x64
3SAMP/custom.img
windows7-x64
3SAMP/custom.img
windows10-2004-x64
3SAMP/samaps.txd
windows7-x64
3SAMP/samaps.txd
windows10-2004-x64
3SAMPUninstall.exe
windows7-x64
7SAMPUninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...al.ini
windows7-x64
1$PLUGINSDI...al.ini
windows10-2004-x64
1$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-03-2024 15:33
Behavioral task
behavioral1
Sample
sa-mp-0.3.7-R5-1-install.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sa-mp-0.3.7-R5-1-install.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$SYSDIR/d3dx9_25.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$SYSDIR/d3dx9_25.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
SAMP/SAMP.ide
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
SAMP/SAMP.ide
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
SAMP/SAMP.img
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
SAMP/SAMP.img
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
SAMP/SAMP.ipl
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
SAMP/SAMP.ipl
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
SAMP/SAMPCOL.img
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
SAMP/SAMPCOL.img
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
SAMP/blanktex.txd
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
SAMP/blanktex.txd
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
SAMP/custom.img
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
SAMP/custom.img
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
SAMP/samaps.txd
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
SAMP/samaps.txd
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
SAMPUninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
SAMPUninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240226-en
General
-
Target
SAMP/SAMP.ipl
-
Size
2KB
-
MD5
f5fc70efa49b43fc48fc71e3c680b50e
-
SHA1
32d5cc60c1b56d62f0a4d5503ac1f60b1a1c97f1
-
SHA256
a0c31a4593de2ffe6dc734eae06c3794dcec985f53a4e985f6b895789847a26d
-
SHA512
ebee62161e512339e91d224b540c0e316e374dc4b9b8243d28395a1a4da0ec69daf99a14b5bc65c92a725698fd033d464dea4831637f3fb98fcad3e63cea0f5f
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\ipl_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.ipl\ = "ipl_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\ipl_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\ipl_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\ipl_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\ipl_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.ipl rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\ipl_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2612 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2612 AcroRd32.exe 2612 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2704 1808 cmd.exe 29 PID 1808 wrote to memory of 2704 1808 cmd.exe 29 PID 1808 wrote to memory of 2704 1808 cmd.exe 29 PID 2704 wrote to memory of 2612 2704 rundll32.exe 30 PID 2704 wrote to memory of 2612 2704 rundll32.exe 30 PID 2704 wrote to memory of 2612 2704 rundll32.exe 30 PID 2704 wrote to memory of 2612 2704 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SAMP\SAMP.ipl1⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SAMP\SAMP.ipl2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\SAMP\SAMP.ipl"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2612
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5532250634a8e14736ccc2da0f046f2fe
SHA18cb28fa81478202868505b77158f108aaef44be0
SHA256f6e17a084df1893d93d188f6989a944e3f70664f6dd54f2a33979ef1d3923f7b
SHA512e7c73a6b54ad3857f6200017aad8e43679bb8f90ecfa6052a9cb53a21227fc72febc50c17e3dc8b7f239832cde56d81a62c43d08363f666b35ffbe7ea0aae757