Overview
overview
10Static
static
3plpscripts...ll.bat
windows7-x64
10plpscripts...ll.bat
windows10-2004-x64
10plpscripts...bot.py
windows7-x64
3plpscripts...bot.py
windows10-2004-x64
3plpscripts...ain.py
windows7-x64
3plpscripts...ain.py
windows10-2004-x64
3plpscripts...ev2.py
windows7-x64
3plpscripts...ev2.py
windows10-2004-x64
3plpscripts...t__.py
windows7-x64
3plpscripts...t__.py
windows10-2004-x64
3plpscripts...me.dll
windows7-x64
1plpscripts...me.dll
windows10-2004-x64
1plpscripts...rt.bat
windows7-x64
1plpscripts...rt.bat
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:28
Static task
static1
Behavioral task
behavioral1
Sample
plpscripts_freeV2/auto_setup_install.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
plpscripts_freeV2/auto_setup_install.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
plpscripts_freeV2/plpscripts free ai aimbot/aimbot.py
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
plpscripts_freeV2/plpscripts free ai aimbot/aimbot.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
plpscripts_freeV2/plpscripts free ai aimbot/main.py
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
plpscripts_freeV2/plpscripts free ai aimbot/main.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
plpscripts_freeV2/plpscripts free ai aimbot/plpscripts_freev2.py
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
plpscripts_freeV2/plpscripts free ai aimbot/plpscripts_freev2.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
plpscripts_freeV2/plpscripts free ai aimbot/pyarmor_runtime_000000/__init__.py
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
plpscripts_freeV2/plpscripts free ai aimbot/pyarmor_runtime_000000/__init__.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
plpscripts_freeV2/plpscripts free ai aimbot/pyarmor_runtime_000000/pyarmor_runtime.dll
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
plpscripts_freeV2/plpscripts free ai aimbot/pyarmor_runtime_000000/pyarmor_runtime.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
plpscripts_freeV2/plpscripts free ai aimbot/start.bat
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
plpscripts_freeV2/plpscripts free ai aimbot/start.bat
Resource
win10v2004-20240508-en
General
-
Target
plpscripts_freeV2/plpscripts free ai aimbot/pyarmor_runtime_000000/__init__.py
-
Size
103B
-
MD5
b531b298be665224d9033ce2cc9f8e66
-
SHA1
92f4036fe8225e2b35631b49e8fff4fd72b180b1
-
SHA256
7072222a776c768ede0d208609b9948e13b99c3c666085f924f0bf7064e449cf
-
SHA512
717dcb8ce03b46ee2d98fc3359a859593e8cf783a1904c57aea84640dabaf058b9d5060019046a056e2d9740ebbfa06556232fed4f24b38acf3e953574de69f6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2548 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2548 AcroRd32.exe 2548 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 1724 wrote to memory of 3048 1724 cmd.exe rundll32.exe PID 1724 wrote to memory of 3048 1724 cmd.exe rundll32.exe PID 1724 wrote to memory of 3048 1724 cmd.exe rundll32.exe PID 3048 wrote to memory of 2548 3048 rundll32.exe AcroRd32.exe PID 3048 wrote to memory of 2548 3048 rundll32.exe AcroRd32.exe PID 3048 wrote to memory of 2548 3048 rundll32.exe AcroRd32.exe PID 3048 wrote to memory of 2548 3048 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\plpscripts_freeV2\plpscripts free ai aimbot\pyarmor_runtime_000000\__init__.py"1⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\plpscripts_freeV2\plpscripts free ai aimbot\pyarmor_runtime_000000\__init__.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\plpscripts_freeV2\plpscripts free ai aimbot\pyarmor_runtime_000000\__init__.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ed849b7945496b4730760c45d9b2eaaf
SHA15e03a38ea770199d8a7def54a9f00c907c9f7647
SHA2562cc01cf17f5e4c39b6b5db514df2e4ff4b558f5b8c956ca4676a637c6f23c6c9
SHA512d388cd1b069ea1efc22e270c9f84e0f45595182e21cddb07c20e58efb5e739aa74a5992eecce9342c48aa1b0b48cd7cb88045913ae0251b979455ac443cdca75