Analysis

  • max time kernel
    148s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-11-2023 16:37

General

  • Target

    AIMi - AI Aimbot/nvidia docker/debian/nvidia-docker2.lintian-overrides

  • Size

    56B

  • MD5

    f48d47190efed38d32a13454e445c71c

  • SHA1

    fc814a32dc60b3701f07db69fd133f21722ca730

  • SHA256

    721dee40266d3349a570217fe09aef4fb0f5d44c4657875ccd4266c41764e87d

  • SHA512

    33c1dacc6572e7deb72f781322a31f1572051bfc148263817c3fcb7ab7080540afb6952919472ca6f43e19ca1629586923b6d15dddc16915bd4756c766792ce0

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\AIMi - AI Aimbot\nvidia docker\debian\nvidia-docker2.lintian-overrides"
    1⤵
    • Modifies registry class
    PID:416
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads