Overview
overview
3Static
static
1AIMi - AI Aimbot.zip
windows7-x64
1AIMi - AI Aimbot.zip
windows10-2004-x64
1AIMi - AI ...ts.txt
windows7-x64
1AIMi - AI ...ts.txt
windows10-2004-x64
1AIMi - AI ...est.py
windows7-x64
3AIMi - AI ...est.py
windows10-2004-x64
3AIMi - AI ...ect.py
windows7-x64
3AIMi - AI ...ect.py
windows10-2004-x64
3AIMi - AI ...labels
windows7-x64
3AIMi - AI ...labels
windows10-2004-x64
3AIMi - AI ...ny.cfg
windows7-x64
3AIMi - AI ...ny.cfg
windows10-2004-x64
3AIMi - AI ...eights
windows7-x64
3AIMi - AI ...eights
windows10-2004-x64
3AIMi - AI ...nsfile
windows7-x64
1AIMi - AI ...nsfile
windows10-2004-x64
1AIMi - AI ...kefile
windows7-x64
1AIMi - AI ...kefile
windows10-2004-x64
1AIMi - AI ...n.json
windows7-x64
3AIMi - AI ...n.json
windows10-2004-x64
3AIMi - AI ...og.old
windows7-x64
3AIMi - AI ...og.old
windows10-2004-x64
3AIMi - AI ...compat
windows7-x64
1AIMi - AI ...compat
windows10-2004-x64
1AIMi - AI ...ontrol
windows7-x64
1AIMi - AI ...ontrol
windows10-2004-x64
1AIMi - AI ...yright
windows7-x64
1AIMi - AI ...yright
windows10-2004-x64
1AIMi - AI ...nstall
windows7-x64
3AIMi - AI ...nstall
windows10-2004-x64
3AIMi - AI ...rrides
windows7-x64
3AIMi - AI ...rrides
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
15-11-2023 16:37
Static task
static1
Behavioral task
behavioral1
Sample
AIMi - AI Aimbot.zip
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
AIMi - AI Aimbot.zip
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
AIMi - AI Aimbot/assets/requirements.txt
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
AIMi - AI Aimbot/assets/requirements.txt
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
AIMi - AI Aimbot/gpu test.py
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
AIMi - AI Aimbot/gpu test.py
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
AIMi - AI Aimbot/lib/detect.py
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
AIMi - AI Aimbot/lib/detect.py
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
AIMi - AI Aimbot/models/coco-dataset.labels
Resource
win7-20231023-en
Behavioral task
behavioral10
Sample
AIMi - AI Aimbot/models/coco-dataset.labels
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
AIMi - AI Aimbot/models/yolov3-tiny.cfg
Resource
win7-20231020-en
Behavioral task
behavioral12
Sample
AIMi - AI Aimbot/models/yolov3-tiny.cfg
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
AIMi - AI Aimbot/models/yolov3-tiny.weights
Resource
win7-20231020-en
Behavioral task
behavioral14
Sample
AIMi - AI Aimbot/models/yolov3-tiny.weights
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
AIMi - AI Aimbot/nvidia docker/Jenkinsfile
Resource
win7-20231020-en
Behavioral task
behavioral16
Sample
AIMi - AI Aimbot/nvidia docker/Jenkinsfile
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
AIMi - AI Aimbot/nvidia docker/Makefile
Resource
win7-20231025-en
Behavioral task
behavioral18
Sample
AIMi - AI Aimbot/nvidia docker/Makefile
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
AIMi - AI Aimbot/nvidia docker/daemon.json
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
AIMi - AI Aimbot/nvidia docker/daemon.json
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
AIMi - AI Aimbot/nvidia docker/debian/changelog.old
Resource
win7-20231023-en
Behavioral task
behavioral22
Sample
AIMi - AI Aimbot/nvidia docker/debian/changelog.old
Resource
win10v2004-20231020-en
Behavioral task
behavioral23
Sample
AIMi - AI Aimbot/nvidia docker/debian/compat
Resource
win7-20231025-en
Behavioral task
behavioral24
Sample
AIMi - AI Aimbot/nvidia docker/debian/compat
Resource
win10v2004-20231020-en
Behavioral task
behavioral25
Sample
AIMi - AI Aimbot/nvidia docker/debian/control
Resource
win7-20231023-en
Behavioral task
behavioral26
Sample
AIMi - AI Aimbot/nvidia docker/debian/control
Resource
win10v2004-20231020-en
Behavioral task
behavioral27
Sample
AIMi - AI Aimbot/nvidia docker/debian/copyright
Resource
win7-20231023-en
Behavioral task
behavioral28
Sample
AIMi - AI Aimbot/nvidia docker/debian/copyright
Resource
win10v2004-20231023-en
Behavioral task
behavioral29
Sample
AIMi - AI Aimbot/nvidia docker/debian/nvidia-docker2.install
Resource
win7-20231020-en
Behavioral task
behavioral30
Sample
AIMi - AI Aimbot/nvidia docker/debian/nvidia-docker2.install
Resource
win10v2004-20231023-en
Behavioral task
behavioral31
Sample
AIMi - AI Aimbot/nvidia docker/debian/nvidia-docker2.lintian-overrides
Resource
win7-20231023-en
Behavioral task
behavioral32
Sample
AIMi - AI Aimbot/nvidia docker/debian/nvidia-docker2.lintian-overrides
Resource
win10v2004-20231020-en
General
-
Target
AIMi - AI Aimbot/models/yolov3-tiny.weights
-
Size
33.8MB
-
MD5
3bcd6b390912c18924b46b26a9e7ff53
-
SHA1
40f3c11883bef62fd850213bc14266632ed4414f
-
SHA256
dccea06f59b781ec1234ddf8d1e94b9519a97f4245748a7d4db75d5b7080a42c
-
SHA512
981a56459515f727bb7b3d3341b95f4117499b6726eab2798e1c3e524de1ee8ed0d954c11b27bbbb926da2cc955526a194eddf69c55d65923994ab2e8af07042
-
SSDEEP
786432:p/DvlLLSMf8CJToqJH1F6Vq+43HfED3mtgPMr9uQD3sJ1nr3C3BEorWiA2UClq4a:p/DdvS2JToqN36AmD3m+PMQ4sJg3efiw
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\weights_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\.weights rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\.weights\ = "weights_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\weights_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\weights_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\weights_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\weights_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\weights_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2824 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2824 AcroRd32.exe 2824 AcroRd32.exe 2824 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2764 2000 cmd.exe 29 PID 2000 wrote to memory of 2764 2000 cmd.exe 29 PID 2000 wrote to memory of 2764 2000 cmd.exe 29 PID 2764 wrote to memory of 2824 2764 rundll32.exe 30 PID 2764 wrote to memory of 2824 2764 rundll32.exe 30 PID 2764 wrote to memory of 2824 2764 rundll32.exe 30 PID 2764 wrote to memory of 2824 2764 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\AIMi - AI Aimbot\models\yolov3-tiny.weights"1⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\AIMi - AI Aimbot\models\yolov3-tiny.weights2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\AIMi - AI Aimbot\models\yolov3-tiny.weights"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55c329ff1580776f14ebd4cc50bfe2fd6
SHA19b86c9b680c46675a01d7ec7bdb4e6988df5598d
SHA25638b19e38af20c5e704e6892baf12cfab541cb0f0cc2396ad4e0d09766729d9c7
SHA512bc88e7ffceff4878910a9748241b333073cbb7adb887e8d57daacf4bbca2f4a936f2a730dc12673e25c9501720f0f8aa957e66718474f186cb6d70bf4f2fc6ff