Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3plpscripts...ll.bat
windows7-x64
10plpscripts...ll.bat
windows10-2004-x64
10plpscripts...bot.py
windows7-x64
3plpscripts...bot.py
windows10-2004-x64
3plpscripts...ain.py
windows7-x64
3plpscripts...ain.py
windows10-2004-x64
3plpscripts...ev2.py
windows7-x64
3plpscripts...ev2.py
windows10-2004-x64
3plpscripts...t__.py
windows7-x64
3plpscripts...t__.py
windows10-2004-x64
3plpscripts...me.dll
windows7-x64
1plpscripts...me.dll
windows10-2004-x64
1plpscripts...rt.bat
windows7-x64
1plpscripts...rt.bat
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 01:28
Static task
static1
Behavioral task
behavioral1
Sample
plpscripts_freeV2/auto_setup_install.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
plpscripts_freeV2/auto_setup_install.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
plpscripts_freeV2/plpscripts free ai aimbot/aimbot.py
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
plpscripts_freeV2/plpscripts free ai aimbot/aimbot.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
plpscripts_freeV2/plpscripts free ai aimbot/main.py
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
plpscripts_freeV2/plpscripts free ai aimbot/main.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
plpscripts_freeV2/plpscripts free ai aimbot/plpscripts_freev2.py
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
plpscripts_freeV2/plpscripts free ai aimbot/plpscripts_freev2.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
plpscripts_freeV2/plpscripts free ai aimbot/pyarmor_runtime_000000/__init__.py
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
plpscripts_freeV2/plpscripts free ai aimbot/pyarmor_runtime_000000/__init__.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
plpscripts_freeV2/plpscripts free ai aimbot/pyarmor_runtime_000000/pyarmor_runtime.dll
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
plpscripts_freeV2/plpscripts free ai aimbot/pyarmor_runtime_000000/pyarmor_runtime.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
plpscripts_freeV2/plpscripts free ai aimbot/start.bat
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
plpscripts_freeV2/plpscripts free ai aimbot/start.bat
Resource
win10v2004-20240508-en
General
-
Target
plpscripts_freeV2/plpscripts free ai aimbot/main.py
-
Size
11KB
-
MD5
278b94da858a87ef65c1ddb484393078
-
SHA1
71ce6717e419421f16fda9172de23b1c52fd6292
-
SHA256
3424487c41c79ecd49110347c89460116d4fefd1725d84390dada977341a6bf3
-
SHA512
c1acace3f5911c641b1b9b87813c7fa9008fc1444218403ff36278818c86b9f36e8b41c03a20964f0c6577ef00b27134df83426227c94761b28508f8e197fc82
-
SSDEEP
192:G3cikohsCfRiF0OGaVOIJADz1ryh2A98DOD+qPwK4o7uSiWxtYTo1i:GMizsCGCalEvA9eOy8TcWyki
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2776 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2776 AcroRd32.exe 2776 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2100 1936 cmd.exe 29 PID 1936 wrote to memory of 2100 1936 cmd.exe 29 PID 1936 wrote to memory of 2100 1936 cmd.exe 29 PID 2100 wrote to memory of 2776 2100 rundll32.exe 30 PID 2100 wrote to memory of 2776 2100 rundll32.exe 30 PID 2100 wrote to memory of 2776 2100 rundll32.exe 30 PID 2100 wrote to memory of 2776 2100 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\plpscripts_freeV2\plpscripts free ai aimbot\main.py"1⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\plpscripts_freeV2\plpscripts free ai aimbot\main.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\plpscripts_freeV2\plpscripts free ai aimbot\main.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2776
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD578c791ab95088d593e3e1e61307022c8
SHA15285ee5ce59e3403347bd289a1930500d0bbc6d1
SHA256e728d9d2899809c4efcab4194ccd056403262664c9a2274fffdcd31e251537db
SHA51261ef93f881fd3f4463a8df07ce6b2411b5cf30efd90eb1d6a62c458f8519b3c425558577011c9cba15e38ed0c753937c4568a8c32a9f683c80c10568ede08744