Overview
overview
7Static
static
7sa-mp-0.3....ll.exe
windows7-x64
3sa-mp-0.3....ll.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...al.ini
windows7-x64
1$PLUGINSDI...al.ini
windows10-2004-x64
1$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7$SYSDIR/d3dx9_25.dll
windows7-x64
3$SYSDIR/d3dx9_25.dll
windows10-2004-x64
3SAMP/SAMP.ide
windows7-x64
3SAMP/SAMP.ide
windows10-2004-x64
3SAMP/SAMP.img
windows7-x64
3SAMP/SAMP.img
windows10-2004-x64
3SAMP/SAMP.ipl
windows7-x64
3SAMP/SAMP.ipl
windows10-2004-x64
3SAMP/SAMPCOL.img
windows7-x64
3SAMP/SAMPCOL.img
windows10-2004-x64
3SAMP/blanktex.txd
windows7-x64
3SAMP/blanktex.txd
windows10-2004-x64
3SAMP/custom.img
windows7-x64
3SAMP/custom.img
windows10-2004-x64
3SAMP/samaps.txd
windows7-x64
3SAMP/samaps.txd
windows10-2004-x64
3SAMPUninstall.exe
windows7-x64
7SAMPUninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...al.ini
windows7-x64
1$PLUGINSDI...al.ini
windows10-2004-x64
1$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02-03-2024 15:33
Behavioral task
behavioral1
Sample
sa-mp-0.3.7-R5-1-install.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sa-mp-0.3.7-R5-1-install.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$SYSDIR/d3dx9_25.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$SYSDIR/d3dx9_25.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
SAMP/SAMP.ide
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
SAMP/SAMP.ide
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
SAMP/SAMP.img
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
SAMP/SAMP.img
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
SAMP/SAMP.ipl
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
SAMP/SAMP.ipl
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
SAMP/SAMPCOL.img
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
SAMP/SAMPCOL.img
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
SAMP/blanktex.txd
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
SAMP/blanktex.txd
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
SAMP/custom.img
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
SAMP/custom.img
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
SAMP/samaps.txd
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
SAMP/samaps.txd
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
SAMPUninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
SAMPUninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240226-en
General
-
Target
SAMP/blanktex.txd
-
Size
32KB
-
MD5
00dc42d499f5ca6059e4683fd761f032
-
SHA1
901fd1c737e95f09c096826eb547849ca1873b85
-
SHA256
724eff1b323771153a172abb35fcf7fbfaa88af7bab906b51181a94e08ef2e67
-
SHA512
4186adf87d23275ef4dde005371b554ce8e1c6141f160033b549e48190e7e3c96d014ef5ed62a88298cad458c6799d0a0baf35b3a32dc34acade7eb3fa5b4772
-
SSDEEP
24:HSvqpPaAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAc:HwW
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.txd rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.txd\ = "txd_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\txd_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\txd_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\txd_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\txd_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\txd_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\txd_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2076 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2076 AcroRd32.exe 2076 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2660 2348 cmd.exe 29 PID 2348 wrote to memory of 2660 2348 cmd.exe 29 PID 2348 wrote to memory of 2660 2348 cmd.exe 29 PID 2660 wrote to memory of 2076 2660 rundll32.exe 30 PID 2660 wrote to memory of 2076 2660 rundll32.exe 30 PID 2660 wrote to memory of 2076 2660 rundll32.exe 30 PID 2660 wrote to memory of 2076 2660 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SAMP\blanktex.txd1⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SAMP\blanktex.txd2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\SAMP\blanktex.txd"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2076
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e226afb24e70aae89bd0b0a9e52a9ea1
SHA1aea8831a14aa33fb6d127fbc783ee13c0e1eae3c
SHA25601a169ff57fbe78173aa3d0f6104bc0a8ca5e0044b7d3011013ab680fc009793
SHA51259b47e36d50c801a74922a342c7ed593a9e4573b3ab91b54a399e2ad29162c59134191fbf50fed2fed4b49048fe026aa88d296eacf24694f357b3f1155f14112