Static task
static1
Behavioral task
behavioral1
Sample
116f02828154950febc26238d65ede9146595ffe0f71d1928f0322cfe02ffbd6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
116f02828154950febc26238d65ede9146595ffe0f71d1928f0322cfe02ffbd6.exe
Resource
win10v2004-20220812-en
General
-
Target
116f02828154950febc26238d65ede9146595ffe0f71d1928f0322cfe02ffbd6
-
Size
473KB
-
MD5
5621a914e97a1cce7f7347ae2609444f
-
SHA1
e46ef2500b03ac12eac78a4da390e7b5e8aa4d6e
-
SHA256
116f02828154950febc26238d65ede9146595ffe0f71d1928f0322cfe02ffbd6
-
SHA512
9aefe6233d6095715c4b98f4b111891f3596d18ded30725edd60ca66dfb13832885f4cae17d76700994cc63554173190963bddb8f01578865034977f1fdc32b4
-
SSDEEP
12288:E2pWNuDbwXVIQg/f1kToJ3KrIwSUhQirpAyw:dpWNu4yQg1kTuQEUWMGyw
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe
Files
-
116f02828154950febc26238d65ede9146595ffe0f71d1928f0322cfe02ffbd6.exe windows x86
bcca6b5dc49cebe3e7890b5de9031331
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
__WSAFDIsSet
recv
send
socket
connect
closesocket
bind
select
accept
htons
sendto
recvfrom
ntohs
WSAGetLastError
ioctlsocket
WSACleanup
inet_addr
gethostbyname
WSAStartup
gethostname
listen
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
winmm
waveOutSetVolume
mciSendStringW
timeGetTime
comctl32
ImageList_EndDrag
ImageList_DragLeave
ImageList_DragMove
ImageList_DragEnter
ImageList_BeginDrag
ImageList_SetDragCursorImage
ImageList_Destroy
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
ImageList_Remove
mpr
WNetUseConnectionW
WNetGetConnectionW
WNetAddConnection2W
WNetCancelConnection2W
kernel32
TerminateProcess
WaitForSingleObject
SetSystemPowerState
SetFileTime
FindResourceW
GetFileAttributesW
LoadResource
FindFirstFileW
LockResource
FindClose
SizeofResource
EnumResourceNamesW
DeleteFileW
FindNextFileW
lstrcmpiW
MoveFileW
OutputDebugStringW
CopyFileW
GetLastError
CreateDirectoryW
RemoveDirectoryW
GetLocalTime
MultiByteToWideChar
WideCharToMultiByte
CompareStringW
InterlockedIncrement
InterlockedDecrement
GetTempPathW
GetTempFileNameW
GetExitCodeProcess
FormatMessageW
LocalFileTimeToFileTime
GetDriveTypeW
SetErrorMode
GetDiskFreeSpaceW
GetVolumeInformationW
SetVolumeLabelW
DeviceIoControl
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileSectionW
WritePrivateProfileSectionW
SetFileAttributesW
GetPrivateProfileSectionNamesW
GetShortPathNameW
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
SetFilePointer
GlobalMemoryStatus
Beep
GetFileSize
GetEnvironmentVariableW
SetEnvironmentVariableW
GlobalFree
GlobalLock
GlobalUnlock
GlobalAlloc
GetComputerNameW
GetWindowsDirectoryW
GetSystemDirectoryW
GetCurrentProcessId
SetPriorityClass
LoadLibraryW
CreatePipe
DuplicateHandle
GetStdHandle
CreateProcessW
WriteFile
GetFileType
PeekNamedPipe
SetLastError
LoadLibraryExW
GlobalFindAtomW
GetModuleHandleA
EnterCriticalSection
GetSystemTimeAsFileTime
CreateThread
ExitThread
HeapFree
HeapAlloc
ExitProcess
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RaiseException
GetModuleFileNameA
DeleteCriticalSection
InitializeCriticalSection
HeapSize
VirtualFree
VirtualAlloc
HeapReAlloc
HeapDestroy
HeapCreate
ReadFile
CreateFileW
ReadProcessMemory
WriteProcessMemory
MapViewOfFile
CreateFileMappingW
OpenProcess
UnmapViewOfFile
CloseHandle
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleHandleW
GetSystemInfo
GetCurrentProcess
GetVersionExW
GetCurrentThreadId
Sleep
GetProcAddress
LoadLibraryA
RtlUnwind
GetConsoleCP
GetConsoleMode
FreeLibrary
GetModuleFileNameW
GetFullPathNameW
SetCurrentDirectoryW
GetCurrentDirectoryW
LeaveCriticalSection
ResumeThread
GetVersionExA
GetProcessHeap
GetStartupInfoW
SetHandleCount
GetStartupInfoA
SetStdHandle
FlushFileBuffers
GetCPInfo
LCMapStringA
LCMapStringW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
GetTickCount
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEndOfFile
CompareStringA
SetProcessWorkingSetSize
SetEnvironmentVariableA
user32
GetWindowDC
GetWindowTextLengthW
GetSystemMetrics
IsDialogMessageW
SetClassLongW
GetSysColor
GetActiveWindow
InflateRect
CharNextW
wsprintfW
RedrawWindow
DrawFocusRect
DrawTextW
FrameRect
DrawFrameControl
SubtractRect
OffsetRect
GetClassWord
GetNextDlgTabItem
GetWindow
IsChild
ReleaseCapture
SetCapture
WindowFromPoint
CharLowerBuffW
UnregisterHotKey
GetMessageW
LockWindowUpdate
DispatchMessageW
TranslateMessage
PeekMessageW
LoadImageW
CreateIconFromResourceEx
mouse_event
ExitWindowsEx
SetActiveWindow
FindWindowExW
EnumThreadWindows
SetMenuDefaultItem
InsertMenuItemW
IsMenu
TrackPopupMenuEx
SetCursor
DeleteMenu
CreateIcon
CheckMenuRadioItem
GetMenuItemID
GetMenuItemCount
SetMenuItemInfoW
GetMenuItemInfoW
IsIconic
FindWindowW
SystemParametersInfoW
IsCharAlphaNumericW
GetKeyboardLayoutNameA
GetAsyncKeyState
SetKeyboardState
ClientToScreen
GetKeyState
keybd_event
CharUpperW
LoadStringW
SendDlgItemMessageW
GetDlgItem
SetWindowTextW
DialogBoxParamW
MessageBeep
EndDialog
DestroyWindow
GetMenu
GetClientRect
CopyRect
EndPaint
BeginPaint
EnumWindows
GetDesktopWindow
IsWindow
IsWindowEnabled
IsWindowVisible
EnableWindow
ScreenToClient
InvalidateRect
GetWindowLongW
GetWindowThreadProcessId
AttachThreadInput
SetMenu
CreateMenu
PtInRect
DestroyMenu
DrawMenuBar
FillRect
GetCaretPos
GetSubMenu
GetMenuStringW
FlashWindow
SetWindowLongW
GetCursorPos
IsZoomed
SendMessageTimeoutW
GetFocus
GetWindowTextW
EnumChildWindows
CharUpperBuffW
GetParent
GetDlgCtrlID
SendMessageW
MapVirtualKeyW
PostMessageW
GetWindowRect
GetClassNameW
MessageBoxW
ShowWindow
CreateWindowExW
RegisterClassExW
LoadIconW
LoadCursorW
GetSysColorBrush
GetForegroundWindow
DefWindowProcW
MoveWindow
IsCharAlphaW
IsCharUpperW
IsCharLowerW
GetKeyboardLayoutNameW
SetClipboardData
EmptyClipboard
CountClipboardFormats
SetWindowPos
CloseClipboard
CopyImage
GetClipboardData
IsClipboardFormatAvailable
OpenClipboard
AdjustWindowRectEx
VkKeyScanA
SetRect
SetFocus
PostQuitMessage
KillTimer
MessageBoxA
CreatePopupMenu
RegisterWindowMessageW
DestroyIcon
SetTimer
RegisterHotKey
ReleaseDC
GetCursor
GetKeyboardState
GetDC
SetForegroundWindow
gdi32
Ellipse
PolyDraw
BeginPath
Rectangle
SetViewportOrgEx
PolyBezierTo
RoundRect
SetBkColor
CreatePen
CreateSolidBrush
SetTextColor
MoveToEx
AngleArc
LineTo
CloseFigure
SetPixel
EndPath
StrokePath
StrokeAndFillPath
ExtCreatePen
GetObjectW
SetBkMode
CreateFontW
GetDeviceCaps
GetTextFaceW
GetStockObject
CreateDCW
CreateCompatibleBitmap
GetPixel
DeleteDC
GetDIBits
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
GetTextExtentPoint32W
DeleteObject
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
GetUserNameW
RegConnectRegistryW
RegEnumKeyExW
CloseServiceHandle
UnlockServiceDatabase
LockServiceDatabase
OpenSCManagerW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
shell32
DragQueryPoint
ShellExecuteExW
DragQueryFileW
SHBrowseForFolderW
SHFileOperationW
SHGetPathFromIDListW
SHGetDesktopFolder
SHGetMalloc
Shell_NotifyIconW
ExtractIconExW
ShellExecuteW
DragFinish
ole32
OleSetMenuDescriptor
MkParseDisplayName
OleSetContainedObject
CoInitialize
CoUninitialize
CoCreateInstance
CreateStreamOnHGlobal
IIDFromString
StringFromIID
CLSIDFromString
OleInitialize
CreateBindCtx
CLSIDFromProgID
CoInitializeSecurity
CoCreateInstanceEx
CoSetProxyBlanket
StringFromCLSID
OleUninitialize
CoTaskMemAlloc
CoTaskMemFree
oleaut32
LoadRegTypeLi
SafeArrayDestroyDescriptor
SafeArrayDestroyData
SafeArrayAllocData
SafeArrayAllocDescriptorEx
SysAllocString
OleLoadPicture
SafeArrayUnaccessData
SafeArrayAccessData
VarR4FromDec
VariantTimeToSystemTime
VariantClear
VariantCopy
VariantInit
GetActiveObject
Sections
.text Size: 392KB - Virtual size: 391KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ