Overview
overview
10Static
static
3plpscripts...ll.bat
windows7-x64
10plpscripts...ll.bat
windows10-2004-x64
10plpscripts...bot.py
windows7-x64
3plpscripts...bot.py
windows10-2004-x64
3plpscripts...ain.py
windows7-x64
3plpscripts...ain.py
windows10-2004-x64
3plpscripts...ev2.py
windows7-x64
3plpscripts...ev2.py
windows10-2004-x64
3plpscripts...t__.py
windows7-x64
3plpscripts...t__.py
windows10-2004-x64
3plpscripts...me.dll
windows7-x64
1plpscripts...me.dll
windows10-2004-x64
1plpscripts...rt.bat
windows7-x64
1plpscripts...rt.bat
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:32
Static task
static1
Behavioral task
behavioral1
Sample
plpscripts_freeV2/auto_setup_install.bat
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
plpscripts_freeV2/auto_setup_install.bat
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
plpscripts_freeV2/plpscripts free ai aimbot/aimbot.py
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
plpscripts_freeV2/plpscripts free ai aimbot/aimbot.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
plpscripts_freeV2/plpscripts free ai aimbot/main.py
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
plpscripts_freeV2/plpscripts free ai aimbot/main.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
plpscripts_freeV2/plpscripts free ai aimbot/plpscripts_freev2.py
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
plpscripts_freeV2/plpscripts free ai aimbot/plpscripts_freev2.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
plpscripts_freeV2/plpscripts free ai aimbot/pyarmor_runtime_000000/__init__.py
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
plpscripts_freeV2/plpscripts free ai aimbot/pyarmor_runtime_000000/__init__.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
plpscripts_freeV2/plpscripts free ai aimbot/pyarmor_runtime_000000/pyarmor_runtime.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
plpscripts_freeV2/plpscripts free ai aimbot/pyarmor_runtime_000000/pyarmor_runtime.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
plpscripts_freeV2/plpscripts free ai aimbot/start.bat
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
plpscripts_freeV2/plpscripts free ai aimbot/start.bat
Resource
win10v2004-20240426-en
General
-
Target
plpscripts_freeV2/plpscripts free ai aimbot/pyarmor_runtime_000000/__init__.py
-
Size
103B
-
MD5
b531b298be665224d9033ce2cc9f8e66
-
SHA1
92f4036fe8225e2b35631b49e8fff4fd72b180b1
-
SHA256
7072222a776c768ede0d208609b9948e13b99c3c666085f924f0bf7064e449cf
-
SHA512
717dcb8ce03b46ee2d98fc3359a859593e8cf783a1904c57aea84640dabaf058b9d5060019046a056e2d9740ebbfa06556232fed4f24b38acf3e953574de69f6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\py_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2616 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2616 AcroRd32.exe 2616 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2052 wrote to memory of 2664 2052 cmd.exe rundll32.exe PID 2052 wrote to memory of 2664 2052 cmd.exe rundll32.exe PID 2052 wrote to memory of 2664 2052 cmd.exe rundll32.exe PID 2664 wrote to memory of 2616 2664 rundll32.exe AcroRd32.exe PID 2664 wrote to memory of 2616 2664 rundll32.exe AcroRd32.exe PID 2664 wrote to memory of 2616 2664 rundll32.exe AcroRd32.exe PID 2664 wrote to memory of 2616 2664 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\plpscripts_freeV2\plpscripts free ai aimbot\pyarmor_runtime_000000\__init__.py"1⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\plpscripts_freeV2\plpscripts free ai aimbot\pyarmor_runtime_000000\__init__.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\plpscripts_freeV2\plpscripts free ai aimbot\pyarmor_runtime_000000\__init__.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ff90c897510036b360ca35b6dc43570d
SHA159e6310cbbc87bb34de79829483c9c8cdad4dad7
SHA256afd5a46255daee0c08f90307f2c712929b9560e10f8c4d34905e89b68a5932f5
SHA512df7b7ab46f127b5a4c20ce771647743eca510f6540abbba2a79b11d1b05c4881359dbb391d601a7ebefbc9345205b3689236bf4fbd418a388e5c462f4132f5b0