Overview
overview
7Static
static
7sa-mp-0.3....ll.exe
windows7-x64
3sa-mp-0.3....ll.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...al.ini
windows7-x64
1$PLUGINSDI...al.ini
windows10-2004-x64
1$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7$SYSDIR/d3dx9_25.dll
windows7-x64
3$SYSDIR/d3dx9_25.dll
windows10-2004-x64
3SAMP/SAMP.ide
windows7-x64
3SAMP/SAMP.ide
windows10-2004-x64
3SAMP/SAMP.img
windows7-x64
3SAMP/SAMP.img
windows10-2004-x64
3SAMP/SAMP.ipl
windows7-x64
3SAMP/SAMP.ipl
windows10-2004-x64
3SAMP/SAMPCOL.img
windows7-x64
3SAMP/SAMPCOL.img
windows10-2004-x64
3SAMP/blanktex.txd
windows7-x64
3SAMP/blanktex.txd
windows10-2004-x64
3SAMP/custom.img
windows7-x64
3SAMP/custom.img
windows10-2004-x64
3SAMP/samaps.txd
windows7-x64
3SAMP/samaps.txd
windows10-2004-x64
3SAMPUninstall.exe
windows7-x64
7SAMPUninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...al.ini
windows7-x64
1$PLUGINSDI...al.ini
windows10-2004-x64
1$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-03-2024 15:33
Behavioral task
behavioral1
Sample
sa-mp-0.3.7-R5-1-install.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sa-mp-0.3.7-R5-1-install.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$SYSDIR/d3dx9_25.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$SYSDIR/d3dx9_25.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
SAMP/SAMP.ide
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
SAMP/SAMP.ide
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
SAMP/SAMP.img
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
SAMP/SAMP.img
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
SAMP/SAMP.ipl
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
SAMP/SAMP.ipl
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
SAMP/SAMPCOL.img
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
SAMP/SAMPCOL.img
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
SAMP/blanktex.txd
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
SAMP/blanktex.txd
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
SAMP/custom.img
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
SAMP/custom.img
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
SAMP/samaps.txd
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
SAMP/samaps.txd
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
SAMPUninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
SAMPUninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240226-en
General
-
Target
SAMP/samaps.txd
-
Size
640KB
-
MD5
e0fdfd9fbe272baa9284e275fb426610
-
SHA1
d64ba932095df01aec31255147078d8820f500df
-
SHA256
d7a10e2d6497865377f61061abc13c5b7d1c81f8471410c80191640e04948285
-
SHA512
81f1c09b649776c935559d420214e9543c1e7a9690a79de43a06df03af6dd54151755e010ea9d06a33058ab5743b30a27816d35f6729657439c6251ee19f1122
-
SSDEEP
12288:RVghsoZfX3GnUKMiFnGWOKPzP0Intv+LecSVNjIaS4MzB8wdqhPmbxE1fJ:7UZuiikWOKRtGLecqIntB8wFsR
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\txd_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.txd\ = "txd_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\txd_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\txd_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\txd_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\txd_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.txd rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\txd_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2616 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2616 AcroRd32.exe 2616 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2584 2184 cmd.exe 29 PID 2184 wrote to memory of 2584 2184 cmd.exe 29 PID 2184 wrote to memory of 2584 2184 cmd.exe 29 PID 2584 wrote to memory of 2616 2584 rundll32.exe 30 PID 2584 wrote to memory of 2616 2584 rundll32.exe 30 PID 2584 wrote to memory of 2616 2584 rundll32.exe 30 PID 2584 wrote to memory of 2616 2584 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SAMP\samaps.txd1⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SAMP\samaps.txd2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\SAMP\samaps.txd"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2616
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD520d06fd3a7a70d12643c4b6afe3bd3cd
SHA18b66c4b62229c5a934420dce68115e39934ef651
SHA2562d12d3ae2cff01b9ac2f899023e166e6b32ec18a9dea987d1549a2602d801bbf
SHA51233eed86de1ea7ed3a4bef5f11301f32d5f068521f5a7a7742d45a747f7fe14e0482e0b4f5497c06b1f0fb081b50eff252f38c9cdd18b6a963624ebe0e6082cd8