Overview
overview
3Static
static
1AIMi - AI Aimbot.zip
windows7-x64
1AIMi - AI Aimbot.zip
windows10-2004-x64
1AIMi - AI ...ts.txt
windows7-x64
1AIMi - AI ...ts.txt
windows10-2004-x64
1AIMi - AI ...est.py
windows7-x64
3AIMi - AI ...est.py
windows10-2004-x64
3AIMi - AI ...ect.py
windows7-x64
3AIMi - AI ...ect.py
windows10-2004-x64
3AIMi - AI ...labels
windows7-x64
3AIMi - AI ...labels
windows10-2004-x64
3AIMi - AI ...ny.cfg
windows7-x64
3AIMi - AI ...ny.cfg
windows10-2004-x64
3AIMi - AI ...eights
windows7-x64
3AIMi - AI ...eights
windows10-2004-x64
3AIMi - AI ...nsfile
windows7-x64
1AIMi - AI ...nsfile
windows10-2004-x64
1AIMi - AI ...kefile
windows7-x64
1AIMi - AI ...kefile
windows10-2004-x64
1AIMi - AI ...n.json
windows7-x64
3AIMi - AI ...n.json
windows10-2004-x64
3AIMi - AI ...og.old
windows7-x64
3AIMi - AI ...og.old
windows10-2004-x64
3AIMi - AI ...compat
windows7-x64
1AIMi - AI ...compat
windows10-2004-x64
1AIMi - AI ...ontrol
windows7-x64
1AIMi - AI ...ontrol
windows10-2004-x64
1AIMi - AI ...yright
windows7-x64
1AIMi - AI ...yright
windows10-2004-x64
1AIMi - AI ...nstall
windows7-x64
3AIMi - AI ...nstall
windows10-2004-x64
3AIMi - AI ...rrides
windows7-x64
3AIMi - AI ...rrides
windows10-2004-x64
3Analysis
-
max time kernel
152s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
15/11/2023, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
AIMi - AI Aimbot.zip
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
AIMi - AI Aimbot.zip
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
AIMi - AI Aimbot/assets/requirements.txt
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
AIMi - AI Aimbot/assets/requirements.txt
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
AIMi - AI Aimbot/gpu test.py
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
AIMi - AI Aimbot/gpu test.py
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
AIMi - AI Aimbot/lib/detect.py
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
AIMi - AI Aimbot/lib/detect.py
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
AIMi - AI Aimbot/models/coco-dataset.labels
Resource
win7-20231023-en
Behavioral task
behavioral10
Sample
AIMi - AI Aimbot/models/coco-dataset.labels
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
AIMi - AI Aimbot/models/yolov3-tiny.cfg
Resource
win7-20231020-en
Behavioral task
behavioral12
Sample
AIMi - AI Aimbot/models/yolov3-tiny.cfg
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
AIMi - AI Aimbot/models/yolov3-tiny.weights
Resource
win7-20231020-en
Behavioral task
behavioral14
Sample
AIMi - AI Aimbot/models/yolov3-tiny.weights
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
AIMi - AI Aimbot/nvidia docker/Jenkinsfile
Resource
win7-20231020-en
Behavioral task
behavioral16
Sample
AIMi - AI Aimbot/nvidia docker/Jenkinsfile
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
AIMi - AI Aimbot/nvidia docker/Makefile
Resource
win7-20231025-en
Behavioral task
behavioral18
Sample
AIMi - AI Aimbot/nvidia docker/Makefile
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
AIMi - AI Aimbot/nvidia docker/daemon.json
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
AIMi - AI Aimbot/nvidia docker/daemon.json
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
AIMi - AI Aimbot/nvidia docker/debian/changelog.old
Resource
win7-20231023-en
Behavioral task
behavioral22
Sample
AIMi - AI Aimbot/nvidia docker/debian/changelog.old
Resource
win10v2004-20231020-en
Behavioral task
behavioral23
Sample
AIMi - AI Aimbot/nvidia docker/debian/compat
Resource
win7-20231025-en
Behavioral task
behavioral24
Sample
AIMi - AI Aimbot/nvidia docker/debian/compat
Resource
win10v2004-20231020-en
Behavioral task
behavioral25
Sample
AIMi - AI Aimbot/nvidia docker/debian/control
Resource
win7-20231023-en
Behavioral task
behavioral26
Sample
AIMi - AI Aimbot/nvidia docker/debian/control
Resource
win10v2004-20231020-en
Behavioral task
behavioral27
Sample
AIMi - AI Aimbot/nvidia docker/debian/copyright
Resource
win7-20231023-en
Behavioral task
behavioral28
Sample
AIMi - AI Aimbot/nvidia docker/debian/copyright
Resource
win10v2004-20231023-en
Behavioral task
behavioral29
Sample
AIMi - AI Aimbot/nvidia docker/debian/nvidia-docker2.install
Resource
win7-20231020-en
Behavioral task
behavioral30
Sample
AIMi - AI Aimbot/nvidia docker/debian/nvidia-docker2.install
Resource
win10v2004-20231023-en
Behavioral task
behavioral31
Sample
AIMi - AI Aimbot/nvidia docker/debian/nvidia-docker2.lintian-overrides
Resource
win7-20231023-en
Behavioral task
behavioral32
Sample
AIMi - AI Aimbot/nvidia docker/debian/nvidia-docker2.lintian-overrides
Resource
win10v2004-20231020-en
General
-
Target
AIMi - AI Aimbot/nvidia docker/daemon.json
-
Size
136B
-
MD5
977c544b2137c912068c2b7787ee9835
-
SHA1
6f17f0e2e4e021c90ff4cd734fc8b3dc07a63e54
-
SHA256
ab5f4f203a04fba05022056a3ffe77cb86ee4301f531730e6a013652cde8b3b3
-
SHA512
25f3f3009c95e8857a91b8cff6d8adbd43943fa5dbfc7588e7d20a473e958f453aa6d56c01f94ffc0408965da58f8e72befa8a8bd14eed2fdb5d4481892debf2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\json_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\.json rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\json_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2724 AcroRd32.exe 2724 AcroRd32.exe 2724 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2228 wrote to memory of 1500 2228 cmd.exe 29 PID 2228 wrote to memory of 1500 2228 cmd.exe 29 PID 2228 wrote to memory of 1500 2228 cmd.exe 29 PID 1500 wrote to memory of 2724 1500 rundll32.exe 30 PID 1500 wrote to memory of 2724 1500 rundll32.exe 30 PID 1500 wrote to memory of 2724 1500 rundll32.exe 30 PID 1500 wrote to memory of 2724 1500 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\AIMi - AI Aimbot\nvidia docker\daemon.json"1⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\AIMi - AI Aimbot\nvidia docker\daemon.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\AIMi - AI Aimbot\nvidia docker\daemon.json"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5af07f8f9b06dfa97844eaa6fd02c3693
SHA1ce05fba2ed8219c01e82625dc2cd3f7c3c6e8244
SHA25663294dc74cff8c3dfd470b3398e222229de3cc77a9fb84fa44b384635c4e87b0
SHA512629bf92f3141fb4d1324c468d6c14377a8f789b3c0aacf7467924166f9f9a07f7953ffc832e0fecd3dee76b325b33c8aa84d5f1e760879d800609f7083bf9099