Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3plpscripts..._1.zip
windows11-21h2-x64
1plpscripts...ELP.md
windows11-21h2-x64
1plpscripts...ll.bat
windows11-21h2-x64
10plpscripts...bot.py
windows11-21h2-x64
3plpscripts...st.zip
windows11-21h2-x64
1archive/data.pkl
windows11-21h2-x64
3archive/da...988160
windows11-21h2-x64
1archive/da...651120
windows11-21h2-x64
1archive/da...651216
windows11-21h2-x64
1archive/da...760992
windows11-21h2-x64
1archive/da...785696
windows11-21h2-x64
1archive/da...797712
windows11-21h2-x64
1archive/da...665328
windows11-21h2-x64
1archive/da...860848
windows11-21h2-x64
1archive/da...060304
windows11-21h2-x64
1archive/da...374192
windows11-21h2-x64
1archive/da...374288
windows11-21h2-x64
1archive/da...501856
windows11-21h2-x64
1archive/da...582784
windows11-21h2-x64
1archive/da...647568
windows11-21h2-x64
1archive/da...701936
windows11-21h2-x64
1archive/da...741200
windows11-21h2-x64
1archive/da...778800
windows11-21h2-x64
1archive/da...274048
windows11-21h2-x64
1plpscripts...g.json
windows11-21h2-x64
3plpscripts...e.json
windows11-21h2-x64
3plpscripts...ain.py
windows11-21h2-x64
3plpscripts...ev2.py
windows11-21h2-x64
3plpscripts...t__.py
windows11-21h2-x64
3plpscripts...me.dll
windows11-21h2-x64
1plpscripts...rt.bat
windows11-21h2-x64
1plpscripts...ts.txt
windows11-21h2-x64
3Analysis
-
max time kernel
90s -
max time network
130s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
13/05/2024, 15:21
Static task
static1
Behavioral task
behavioral1
Sample
plpscripts_freeV2_1.zip
Resource
win11-20240508-en
Behavioral task
behavioral2
Sample
plpscripts_freeV2/1.READ ME & THIS HAS HELP.md
Resource
win11-20240426-en
Behavioral task
behavioral3
Sample
plpscripts_freeV2/auto_setup_install.bat
Resource
win11-20240508-en
Behavioral task
behavioral4
Sample
plpscripts_freeV2/plpscripts free ai aimbot/aimbot.py
Resource
win11-20240508-en
Behavioral task
behavioral5
Sample
plpscripts_freeV2/plpscripts free ai aimbot/config/best.zip
Resource
win11-20240426-en
Behavioral task
behavioral6
Sample
archive/data.pkl
Resource
win11-20240426-en
Behavioral task
behavioral7
Sample
archive/data/94907481988160
Resource
win11-20240426-en
Behavioral task
behavioral8
Sample
archive/data/94909076651120
Resource
win11-20240426-en
Behavioral task
behavioral9
Sample
archive/data/94909076651216
Resource
win11-20240419-en
Behavioral task
behavioral10
Sample
archive/data/94909076760992
Resource
win11-20240508-en
Behavioral task
behavioral11
Sample
archive/data/94909076785696
Resource
win11-20240426-en
Behavioral task
behavioral12
Sample
archive/data/94909076797712
Resource
win11-20240426-en
Behavioral task
behavioral13
Sample
archive/data/94909083665328
Resource
win11-20240508-en
Behavioral task
behavioral14
Sample
archive/data/94909083860848
Resource
win11-20240508-en
Behavioral task
behavioral15
Sample
archive/data/94909084060304
Resource
win11-20240508-en
Behavioral task
behavioral16
Sample
archive/data/94909084374192
Resource
win11-20240508-en
Behavioral task
behavioral17
Sample
archive/data/94909084374288
Resource
win11-20240426-en
Behavioral task
behavioral18
Sample
archive/data/94909084501856
Resource
win11-20240508-en
Behavioral task
behavioral19
Sample
archive/data/94909084582784
Resource
win11-20240426-en
Behavioral task
behavioral20
Sample
archive/data/94909084647568
Resource
win11-20240426-en
Behavioral task
behavioral21
Sample
archive/data/94909084701936
Resource
win11-20240426-en
Behavioral task
behavioral22
Sample
archive/data/94909084741200
Resource
win11-20240508-en
Behavioral task
behavioral23
Sample
archive/data/94909084778800
Resource
win11-20240426-en
Behavioral task
behavioral24
Sample
archive/data/94909086274048
Resource
win11-20240426-en
Behavioral task
behavioral25
Sample
plpscripts_freeV2/plpscripts free ai aimbot/config/config.json
Resource
win11-20240419-en
Behavioral task
behavioral26
Sample
plpscripts_freeV2/plpscripts free ai aimbot/config/style.json
Resource
win11-20240508-en
Behavioral task
behavioral27
Sample
plpscripts_freeV2/plpscripts free ai aimbot/main.py
Resource
win11-20240508-en
Behavioral task
behavioral28
Sample
plpscripts_freeV2/plpscripts free ai aimbot/plpscripts_freev2.py
Resource
win11-20240426-en
Behavioral task
behavioral29
Sample
plpscripts_freeV2/plpscripts free ai aimbot/pyarmor_runtime_000000/__init__.py
Resource
win11-20240508-en
Behavioral task
behavioral30
Sample
plpscripts_freeV2/plpscripts free ai aimbot/pyarmor_runtime_000000/pyarmor_runtime.dll
Resource
win11-20240426-en
Behavioral task
behavioral31
Sample
plpscripts_freeV2/plpscripts free ai aimbot/start.bat
Resource
win11-20240419-en
Behavioral task
behavioral32
Sample
plpscripts_freeV2/requirements.txt
Resource
win11-20240508-en
General
-
Target
plpscripts_freeV2/requirements.txt
-
Size
395B
-
MD5
3058244d8d10c23492415310cf485ec3
-
SHA1
0afebab685deec80d088557bd5985298e33ec8a9
-
SHA256
7ca239ab576a865979b1cc267173e9830ee3a92e1f2239c05f2fe4b47e6f0208
-
SHA512
ed7a8eb72a2cc770148356af85158a46df731e2003d1b77c758ab7f8da085acb197a26f63f425d4d0ff3d6f3b1384fa0cfa8a634b5e1a1b0e2e73f9b2d822546
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2576 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4496 wrote to memory of 2576 4496 cmd.exe 82 PID 4496 wrote to memory of 2576 4496 cmd.exe 82
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\plpscripts_freeV2\requirements.txt1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\plpscripts_freeV2\requirements.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2576
-