Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 13:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
aimzeo/aimzero.exe
Resource
win7-20240729-en
7 signatures
120 seconds
Behavioral task
behavioral2
Sample
aimzeo/aimzero.exe
Resource
win10v2004-20240802-en
exelastealercollectiondefense_evasiondiscoveryevasionpersistenceprivilege_escalationpyinstallerspywarestealerupx
34 signatures
120 seconds
Behavioral task
behavioral3
Sample
aimzeo/updateoffset.cmd
Resource
win7-20240903-en
0 signatures
120 seconds
Behavioral task
behavioral4
Sample
aimzeo/updateoffset.cmd
Resource
win10v2004-20240802-en
2 signatures
120 seconds
General
-
Target
aimzeo/updateoffset.cmd
-
Size
289B
-
MD5
14c3896f45f92679adc9d0fce61cd47a
-
SHA1
9e07ca541cdf5e79ea0951971d2c4319835aba7b
-
SHA256
7a9d73deac9f5d77da4f1410623713c22f6cd1b63ddfb3d3e1251feb89cd8599
-
SHA512
dcf65be15759251d693eab4323ff04607e3b8116b2fbc824ba143ce66c048917adafe28884b8467ad51196dd8e3c1e8809f2fa5aec194e13f5c436dd7eacbe94
Score
6/10
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 2 raw.githubusercontent.com 7 raw.githubusercontent.com 11 raw.githubusercontent.com -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4156 wrote to memory of 408 4156 cmd.exe 90 PID 4156 wrote to memory of 408 4156 cmd.exe 90 PID 4156 wrote to memory of 4460 4156 cmd.exe 92 PID 4156 wrote to memory of 4460 4156 cmd.exe 92 PID 4156 wrote to memory of 3188 4156 cmd.exe 93 PID 4156 wrote to memory of 3188 4156 cmd.exe 93
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aimzeo\updateoffset.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\system32\curl.execurl https://raw.githubusercontent.com/a2x/cs2-dumper/main/output/buttons.json2⤵PID:408
-
-
C:\Windows\system32\curl.execurl https://raw.githubusercontent.com/a2x/cs2-dumper/main/output/client_dll.json2⤵PID:4460
-
-
C:\Windows\system32\curl.execurl https://raw.githubusercontent.com/a2x/cs2-dumper/main/output/offsets.json2⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4336,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=4328 /prefetch:81⤵PID:4984