Overview
overview
7Static
static
5san-andrea...-7.exe
windows11-21h2-x64
3$PLUGINSDI...ns.dll
windows11-21h2-x64
3$SYSDIR/d3dx9_25.dll
windows11-21h2-x64
3SAMPUninstall.exe
windows11-21h2-x64
7$PLUGINSDI...ns.dll
windows11-21h2-x64
3bass.dll
windows11-21h2-x64
3rcon.exe
windows11-21h2-x64
3samp.dll
windows11-21h2-x64
3samp.exe
windows11-21h2-x64
5samp_debug.exe
windows11-21h2-x64
3Analysis
-
max time kernel
68s -
max time network
142s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-10-2024 12:12
Behavioral task
behavioral1
Sample
san-andreas-multiplayer-0-3-7.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
$SYSDIR/d3dx9_25.dll
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
SAMPUninstall.exe
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
bass.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
rcon.exe
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
samp.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
samp.exe
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
samp_debug.exe
Resource
win11-20240802-en
General
-
Target
SAMPUninstall.exe
-
Size
56KB
-
MD5
bffa504cd63305418858b150faa8f408
-
SHA1
86886fd2378aa33935cf684f056454859713aed4
-
SHA256
d00f8bf2eaa1994b0064d7b14fc987b0aab9b3c440a4177257ee2d3217fe6d3b
-
SHA512
6b8958a4ccffce02ba8e4390f66121a02116e2b2ef9c4baa2eea62b8acfe380d0c0dd5e773f83b7062467a34019612d3f8a531e1a4ffcefb769de964cbf02019
-
SSDEEP
1536:HLXB65939tY6HBg4sXJOgdLeAyN/dIM6su:HLk395hYXJOceAlMM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1028 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 1028 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 1028 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SAMPUninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral4/files/0x000600000002aa97-3.dat nsis_installer_1 behavioral4/files/0x000600000002aa97-3.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2832 wrote to memory of 1028 2832 SAMPUninstall.exe 79 PID 2832 wrote to memory of 1028 2832 SAMPUninstall.exe 79 PID 2832 wrote to memory of 1028 2832 SAMPUninstall.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\SAMPUninstall.exe"C:\Users\Admin\AppData\Local\Temp\SAMPUninstall.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
538B
MD53e24d1d4746165d694ba997016c03af7
SHA1b23085caeccc1e25602612c38bdc3f21771d7811
SHA256368ef4643e663a4e68136dd5674805aef827136ea04aea11311a3b01d67fe050
SHA512b39cf4e41d3e03c5c41d8cbfd720010b5579ce7158c4c3b3a278d8c58439602a6ca70cecf8d5fce6c073fe22b6fe3bd014822c8a81f801056bb2c62afd0e1d86
-
Filesize
577B
MD5276ba5cc1dafa6e0d5df483bf1afe7a6
SHA156b45474fcebd29ab2491fb6727a3dceedaaa3eb
SHA256776c3551027197b66b600db9d130983ec5719aac54d0eca6da59464a25f678e1
SHA51273e414f06bab91f0145e3b6035bfb4e0d505a2098eeeead7ecbb683fd024aa761fdd243aea8a05d595c2ad5e01b756d378becb4c7f1ebc187af99e7ab042d792
-
Filesize
56KB
MD5bffa504cd63305418858b150faa8f408
SHA186886fd2378aa33935cf684f056454859713aed4
SHA256d00f8bf2eaa1994b0064d7b14fc987b0aab9b3c440a4177257ee2d3217fe6d3b
SHA5126b8958a4ccffce02ba8e4390f66121a02116e2b2ef9c4baa2eea62b8acfe380d0c0dd5e773f83b7062467a34019612d3f8a531e1a4ffcefb769de964cbf02019