Overview
overview
10Static
static
3plpscripts...ll.bat
windows7-x64
10plpscripts...ll.bat
windows10-2004-x64
10plpscripts...bot.py
windows7-x64
3plpscripts...bot.py
windows10-2004-x64
3plpscripts...ain.py
windows7-x64
3plpscripts...ain.py
windows10-2004-x64
3plpscripts...ev2.py
windows7-x64
3plpscripts...ev2.py
windows10-2004-x64
3plpscripts...t__.py
windows7-x64
3plpscripts...t__.py
windows10-2004-x64
3plpscripts...me.dll
windows7-x64
1plpscripts...me.dll
windows10-2004-x64
1plpscripts...rt.bat
windows7-x64
1plpscripts...rt.bat
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:32
Static task
static1
Behavioral task
behavioral1
Sample
plpscripts_freeV2/auto_setup_install.bat
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
plpscripts_freeV2/auto_setup_install.bat
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
plpscripts_freeV2/plpscripts free ai aimbot/aimbot.py
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
plpscripts_freeV2/plpscripts free ai aimbot/aimbot.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
plpscripts_freeV2/plpscripts free ai aimbot/main.py
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
plpscripts_freeV2/plpscripts free ai aimbot/main.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
plpscripts_freeV2/plpscripts free ai aimbot/plpscripts_freev2.py
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
plpscripts_freeV2/plpscripts free ai aimbot/plpscripts_freev2.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
plpscripts_freeV2/plpscripts free ai aimbot/pyarmor_runtime_000000/__init__.py
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
plpscripts_freeV2/plpscripts free ai aimbot/pyarmor_runtime_000000/__init__.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
plpscripts_freeV2/plpscripts free ai aimbot/pyarmor_runtime_000000/pyarmor_runtime.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
plpscripts_freeV2/plpscripts free ai aimbot/pyarmor_runtime_000000/pyarmor_runtime.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
plpscripts_freeV2/plpscripts free ai aimbot/start.bat
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
plpscripts_freeV2/plpscripts free ai aimbot/start.bat
Resource
win10v2004-20240426-en
General
-
Target
plpscripts_freeV2/auto_setup_install.bat
-
Size
2KB
-
MD5
bdba7ddafbddca1a9bd0ed4646819426
-
SHA1
9a69db7ab775800ce12e7c05e0193046b6d9ee04
-
SHA256
160184eb890d9d25418bba37efb2fabedb93b333de9a1fd291e233e750344a15
-
SHA512
7d46bc1c8723a43fe0b9a8bce21be3abad96b6bba9558bc564b9e6adfc8eebd5c94bae8839f1d4d46654a15a46398ada29aad33d18fc49efe8468d8841c69898
Malware Config
Extracted
https://www.python.org/ftp/python/3.10.5/python-3.10.5-amd64.exe
Extracted
https://developer.download.nvidia.com/compute/cuda/12.2.0/network_installers/cuda_12.2.0_windows_network.exe
Signatures
-
Blocklisted process makes network request 4 IoCs
Processes:
powershell.exepowershell.exeflow pid process 3 2864 powershell.exe 4 2864 powershell.exe 6 2252 powershell.exe 7 2252 powershell.exe -
Processes:
powershell.exepowershell.exepid process 2864 powershell.exe 2252 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 2712 timeout.exe 1976 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 2660 tasklist.exe 2616 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepowershell.exepid process 2864 powershell.exe 2252 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exetasklist.exepowershell.exetasklist.exedescription pid process Token: SeDebugPrivilege 2864 powershell.exe Token: SeDebugPrivilege 2660 tasklist.exe Token: SeDebugPrivilege 2252 powershell.exe Token: SeDebugPrivilege 2616 tasklist.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
cmd.exedescription pid process target process PID 492 wrote to memory of 1532 492 cmd.exe cacls.exe PID 492 wrote to memory of 1532 492 cmd.exe cacls.exe PID 492 wrote to memory of 1532 492 cmd.exe cacls.exe PID 492 wrote to memory of 2864 492 cmd.exe powershell.exe PID 492 wrote to memory of 2864 492 cmd.exe powershell.exe PID 492 wrote to memory of 2864 492 cmd.exe powershell.exe PID 492 wrote to memory of 2712 492 cmd.exe timeout.exe PID 492 wrote to memory of 2712 492 cmd.exe timeout.exe PID 492 wrote to memory of 2712 492 cmd.exe timeout.exe PID 492 wrote to memory of 2660 492 cmd.exe tasklist.exe PID 492 wrote to memory of 2660 492 cmd.exe tasklist.exe PID 492 wrote to memory of 2660 492 cmd.exe tasklist.exe PID 492 wrote to memory of 3048 492 cmd.exe find.exe PID 492 wrote to memory of 3048 492 cmd.exe find.exe PID 492 wrote to memory of 3048 492 cmd.exe find.exe PID 492 wrote to memory of 2252 492 cmd.exe powershell.exe PID 492 wrote to memory of 2252 492 cmd.exe powershell.exe PID 492 wrote to memory of 2252 492 cmd.exe powershell.exe PID 492 wrote to memory of 1976 492 cmd.exe timeout.exe PID 492 wrote to memory of 1976 492 cmd.exe timeout.exe PID 492 wrote to memory of 1976 492 cmd.exe timeout.exe PID 492 wrote to memory of 2616 492 cmd.exe tasklist.exe PID 492 wrote to memory of 2616 492 cmd.exe tasklist.exe PID 492 wrote to memory of 2616 492 cmd.exe tasklist.exe PID 492 wrote to memory of 2560 492 cmd.exe find.exe PID 492 wrote to memory of 2560 492 cmd.exe find.exe PID 492 wrote to memory of 2560 492 cmd.exe find.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\plpscripts_freeV2\auto_setup_install.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "(New-Object System.Net.WebClient).DownloadFile('https://www.python.org/ftp/python/3.10.5/python-3.10.5-amd64.exe', 'C:\Users\Admin\AppData\Local\Temp\python_installer.exe')"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak2⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "python_installer.exe"2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "(New-Object System.Net.WebClient).DownloadFile('https://developer.download.nvidia.com/compute/cuda/12.2.0/network_installers/cuda_12.2.0_windows_network.exe', 'C:\Users\Admin\AppData\Local\Temp\cuda_installer.exe')"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak2⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "cuda_installer.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD52a80112518f6c421a468fb5be1319e2d
SHA1fffd13afe20153d5e77238cdcd8791901554a35a
SHA25646387241a6fafc24bab0309c5ce2a056adc8e1cd6675aa13a72632f7b7ba6cfe
SHA51268e06da5b1a7d8098d68bcf23b29e9bada09a94b14d83a73230fad5d58fcebcb2f18bee89509f0d0b98e977d4f29a9715ff5e2187748b785597fa90f7f153093
-
memory/2252-16-0x000000001B540000-0x000000001B822000-memory.dmpFilesize
2.9MB
-
memory/2252-17-0x0000000002240000-0x0000000002248000-memory.dmpFilesize
32KB
-
memory/2864-4-0x000007FEF53EE000-0x000007FEF53EF000-memory.dmpFilesize
4KB
-
memory/2864-5-0x000000001B650000-0x000000001B932000-memory.dmpFilesize
2.9MB
-
memory/2864-6-0x0000000001F40000-0x0000000001F48000-memory.dmpFilesize
32KB
-
memory/2864-7-0x000007FEF5130000-0x000007FEF5ACD000-memory.dmpFilesize
9.6MB
-
memory/2864-8-0x000007FEF5130000-0x000007FEF5ACD000-memory.dmpFilesize
9.6MB
-
memory/2864-9-0x000007FEF5130000-0x000007FEF5ACD000-memory.dmpFilesize
9.6MB
-
memory/2864-10-0x000007FEF5130000-0x000007FEF5ACD000-memory.dmpFilesize
9.6MB