Overview
overview
7Static
static
7PAIcom/PAI...ds.exe
windows7-x64
7PAIcom/PAI...ds.exe
windows10-2004-x64
7PAIcom/PAI...UI.dll
windows7-x64
1PAIcom/PAI...UI.dll
windows10-2004-x64
1PAIcom/PAI...ug.exe
windows7-x64
3PAIcom/PAI...ug.exe
windows10-2004-x64
3PAIcom/PAI...om.exe
windows7-x64
6PAIcom/PAI...om.exe
windows10-2004-x64
6PAIcom/PAI...me.bat
windows7-x64
1PAIcom/PAI...me.bat
windows10-2004-x64
1PAIcom/PAI...ds.bat
windows7-x64
1PAIcom/PAI...ds.bat
windows10-2004-x64
1PAIcom/PAI...it.bat
windows7-x64
1PAIcom/PAI...it.bat
windows10-2004-x64
1PAIcom/PAI...le.bat
windows7-x64
1PAIcom/PAI...le.bat
windows10-2004-x64
1PAIcom/PAI...er.exe
windows7-x64
3PAIcom/PAI...er.exe
windows10-2004-x64
3PAIcom/PAI...te.exe
windows7-x64
1PAIcom/PAI...te.exe
windows10-2004-x64
1PAIcom/PAI...ne.bat
windows7-x64
1PAIcom/PAI...ne.bat
windows10-2004-x64
1PAIcom/PAI...es.exe
windows7-x64
1PAIcom/PAI...es.exe
windows10-2004-x64
1PAIcom/PAI...ns.exe
windows7-x64
3PAIcom/PAI...ns.exe
windows10-2004-x64
3PAIcom/PAI...ug.bat
windows7-x64
1PAIcom/PAI...ug.bat
windows10-2004-x64
1PAIcom/PAI...am.bat
windows7-x64
1PAIcom/PAI...am.bat
windows10-2004-x64
1PAIcom/PAI...m2.bat
windows7-x64
1PAIcom/PAI...m2.bat
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 06:34
Behavioral task
behavioral1
Sample
PAIcom/PAIcom/Commands.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
PAIcom/PAIcom/Commands.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
PAIcom/PAIcom/Guna.UI.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
PAIcom/PAIcom/Guna.UI.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
PAIcom/PAIcom/PAIcom-Debug.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
PAIcom/PAIcom/PAIcom-Debug.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
PAIcom/PAIcom/PAIcom.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
PAIcom/PAIcom/PAIcom.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
PAIcom/PAIcom/chrome.bat
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
PAIcom/PAIcom/chrome.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
PAIcom/PAIcom/commands.bat
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
PAIcom/PAIcom/commands.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
PAIcom/PAIcom/exit.bat
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
PAIcom/PAIcom/exit.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
PAIcom/PAIcom/invisible.bat
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
PAIcom/PAIcom/invisible.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
PAIcom/PAIcom/mod-helper.exe
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
PAIcom/PAIcom/mod-helper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
PAIcom/PAIcom/mute.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
PAIcom/PAIcom/mute.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
PAIcom/PAIcom/online.bat
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
PAIcom/PAIcom/online.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
PAIcom/PAIcom/privileges.exe
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
PAIcom/PAIcom/privileges.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
PAIcom/PAIcom/skins.exe
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
PAIcom/PAIcom/skins.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
PAIcom/PAIcom/smug.bat
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
PAIcom/PAIcom/smug.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
PAIcom/PAIcom/steam.bat
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
PAIcom/PAIcom/steam.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
PAIcom/PAIcom/steam2.bat
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
PAIcom/PAIcom/steam2.bat
Resource
win10v2004-20240802-en
General
-
Target
PAIcom/PAIcom/Commands.exe
-
Size
26.4MB
-
MD5
33798ad56d6d67185564f0f019cc900b
-
SHA1
e2b8be8a5c4421e7416a3d9d5525eceeec4fc33b
-
SHA256
c635654a58b7fb9c51ee5d76faedc1f53f92da9b3b2de66a369760e1d78fcf03
-
SHA512
25e3aef882cdf0f253efae8c2accab98fa47e4853c6ef45859001431a7ac55fda992f7478c2d70b38254707dc16f1f9a62319a78838050663e8c4d588c5c22eb
-
SSDEEP
393216:UKhvE4jIizm33wREw+TJR7jIizm33wREw+TJRpCjIizm33wREw+TJR:Umc4jaA4JR7jaA4JRkjaA4JR
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/2196-2-0x0000000000D00000-0x0000000000DA2000-memory.dmp agile_net -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2816 2196 WerFault.exe Commands.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Commands.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Commands.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Commands.exedescription pid process Token: SeDebugPrivilege 2196 Commands.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Commands.exedescription pid process target process PID 2196 wrote to memory of 2816 2196 Commands.exe WerFault.exe PID 2196 wrote to memory of 2816 2196 Commands.exe WerFault.exe PID 2196 wrote to memory of 2816 2196 Commands.exe WerFault.exe PID 2196 wrote to memory of 2816 2196 Commands.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PAIcom\PAIcom\Commands.exe"C:\Users\Admin\AppData\Local\Temp\PAIcom\PAIcom\Commands.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 12082⤵
- Program crash
PID:2816