Overview
overview
3Static
static
1AIMi - AI Aimbot.zip
windows7-x64
1AIMi - AI Aimbot.zip
windows10-2004-x64
1AIMi - AI ...ts.txt
windows7-x64
1AIMi - AI ...ts.txt
windows10-2004-x64
1AIMi - AI ...est.py
windows7-x64
3AIMi - AI ...est.py
windows10-2004-x64
3AIMi - AI ...ect.py
windows7-x64
3AIMi - AI ...ect.py
windows10-2004-x64
3AIMi - AI ...labels
windows7-x64
3AIMi - AI ...labels
windows10-2004-x64
3AIMi - AI ...ny.cfg
windows7-x64
3AIMi - AI ...ny.cfg
windows10-2004-x64
3AIMi - AI ...eights
windows7-x64
3AIMi - AI ...eights
windows10-2004-x64
3AIMi - AI ...nsfile
windows7-x64
1AIMi - AI ...nsfile
windows10-2004-x64
1AIMi - AI ...kefile
windows7-x64
1AIMi - AI ...kefile
windows10-2004-x64
1AIMi - AI ...n.json
windows7-x64
3AIMi - AI ...n.json
windows10-2004-x64
3AIMi - AI ...og.old
windows7-x64
3AIMi - AI ...og.old
windows10-2004-x64
3AIMi - AI ...compat
windows7-x64
1AIMi - AI ...compat
windows10-2004-x64
1AIMi - AI ...ontrol
windows7-x64
1AIMi - AI ...ontrol
windows10-2004-x64
1AIMi - AI ...yright
windows7-x64
1AIMi - AI ...yright
windows10-2004-x64
1AIMi - AI ...nstall
windows7-x64
3AIMi - AI ...nstall
windows10-2004-x64
3AIMi - AI ...rrides
windows7-x64
3AIMi - AI ...rrides
windows10-2004-x64
3Analysis
-
max time kernel
154s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
15-11-2023 16:37
Static task
static1
Behavioral task
behavioral1
Sample
AIMi - AI Aimbot.zip
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
AIMi - AI Aimbot.zip
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
AIMi - AI Aimbot/assets/requirements.txt
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
AIMi - AI Aimbot/assets/requirements.txt
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
AIMi - AI Aimbot/gpu test.py
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
AIMi - AI Aimbot/gpu test.py
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
AIMi - AI Aimbot/lib/detect.py
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
AIMi - AI Aimbot/lib/detect.py
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
AIMi - AI Aimbot/models/coco-dataset.labels
Resource
win7-20231023-en
Behavioral task
behavioral10
Sample
AIMi - AI Aimbot/models/coco-dataset.labels
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
AIMi - AI Aimbot/models/yolov3-tiny.cfg
Resource
win7-20231020-en
Behavioral task
behavioral12
Sample
AIMi - AI Aimbot/models/yolov3-tiny.cfg
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
AIMi - AI Aimbot/models/yolov3-tiny.weights
Resource
win7-20231020-en
Behavioral task
behavioral14
Sample
AIMi - AI Aimbot/models/yolov3-tiny.weights
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
AIMi - AI Aimbot/nvidia docker/Jenkinsfile
Resource
win7-20231020-en
Behavioral task
behavioral16
Sample
AIMi - AI Aimbot/nvidia docker/Jenkinsfile
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
AIMi - AI Aimbot/nvidia docker/Makefile
Resource
win7-20231025-en
Behavioral task
behavioral18
Sample
AIMi - AI Aimbot/nvidia docker/Makefile
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
AIMi - AI Aimbot/nvidia docker/daemon.json
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
AIMi - AI Aimbot/nvidia docker/daemon.json
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
AIMi - AI Aimbot/nvidia docker/debian/changelog.old
Resource
win7-20231023-en
Behavioral task
behavioral22
Sample
AIMi - AI Aimbot/nvidia docker/debian/changelog.old
Resource
win10v2004-20231020-en
Behavioral task
behavioral23
Sample
AIMi - AI Aimbot/nvidia docker/debian/compat
Resource
win7-20231025-en
Behavioral task
behavioral24
Sample
AIMi - AI Aimbot/nvidia docker/debian/compat
Resource
win10v2004-20231020-en
Behavioral task
behavioral25
Sample
AIMi - AI Aimbot/nvidia docker/debian/control
Resource
win7-20231023-en
Behavioral task
behavioral26
Sample
AIMi - AI Aimbot/nvidia docker/debian/control
Resource
win10v2004-20231020-en
Behavioral task
behavioral27
Sample
AIMi - AI Aimbot/nvidia docker/debian/copyright
Resource
win7-20231023-en
Behavioral task
behavioral28
Sample
AIMi - AI Aimbot/nvidia docker/debian/copyright
Resource
win10v2004-20231023-en
Behavioral task
behavioral29
Sample
AIMi - AI Aimbot/nvidia docker/debian/nvidia-docker2.install
Resource
win7-20231020-en
Behavioral task
behavioral30
Sample
AIMi - AI Aimbot/nvidia docker/debian/nvidia-docker2.install
Resource
win10v2004-20231023-en
Behavioral task
behavioral31
Sample
AIMi - AI Aimbot/nvidia docker/debian/nvidia-docker2.lintian-overrides
Resource
win7-20231023-en
Behavioral task
behavioral32
Sample
AIMi - AI Aimbot/nvidia docker/debian/nvidia-docker2.lintian-overrides
Resource
win10v2004-20231020-en
General
-
Target
AIMi - AI Aimbot/nvidia docker/debian/nvidia-docker2.lintian-overrides
-
Size
56B
-
MD5
f48d47190efed38d32a13454e445c71c
-
SHA1
fc814a32dc60b3701f07db69fd133f21722ca730
-
SHA256
721dee40266d3349a570217fe09aef4fb0f5d44c4657875ccd4266c41764e87d
-
SHA512
33c1dacc6572e7deb72f781322a31f1572051bfc148263817c3fcb7ab7080540afb6952919472ca6f43e19ca1629586923b6d15dddc16915bd4756c766792ce0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\lintian-overrides_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\lintian-overrides_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\lintian-overrides_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\lintian-overrides_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\lintian-overrides_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\lintian-overrides_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\.lintian-overrides rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\.lintian-overrides\ = "lintian-overrides_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2656 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2656 AcroRd32.exe 2656 AcroRd32.exe 2656 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2740 2188 cmd.exe 29 PID 2188 wrote to memory of 2740 2188 cmd.exe 29 PID 2188 wrote to memory of 2740 2188 cmd.exe 29 PID 2740 wrote to memory of 2656 2740 rundll32.exe 32 PID 2740 wrote to memory of 2656 2740 rundll32.exe 32 PID 2740 wrote to memory of 2656 2740 rundll32.exe 32 PID 2740 wrote to memory of 2656 2740 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\AIMi - AI Aimbot\nvidia docker\debian\nvidia-docker2.lintian-overrides"1⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\AIMi - AI Aimbot\nvidia docker\debian\nvidia-docker2.lintian-overrides2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\AIMi - AI Aimbot\nvidia docker\debian\nvidia-docker2.lintian-overrides"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD532a29a0c25db9571183fe296eb0d80f0
SHA1b376454ed2703b87af55ecaad0eb4fdb2b262753
SHA256e7f0c23f41ccee72d5046c4d1b2116e93327cecaf7df06400a246bbafdf965f1
SHA512333ca9352e0f4e900e2c514e510d4641227cc536b8b74ba5dc9fae8016d0b914bef450e7c5accdcf303c1e0b77187fdc5fa85698a43b06552a7c6c68aedbebac