Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
d5b24384b2e5a7f58299e42cc3d96ff8adc8b7568c1b30305116991b11d74391.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d5b24384b2e5a7f58299e42cc3d96ff8adc8b7568c1b30305116991b11d74391.exe
Resource
win10v2004-20220812-en
Target
d5b24384b2e5a7f58299e42cc3d96ff8adc8b7568c1b30305116991b11d74391
Size
806KB
MD5
818bac05b86e94aea45a20017864011b
SHA1
02f3d066eae5d0e1d5f64ca49a7ffe2426df4a7c
SHA256
d5b24384b2e5a7f58299e42cc3d96ff8adc8b7568c1b30305116991b11d74391
SHA512
52e6d042c351435d12cdb5536f64de98e81f5010d749fe3fde68585a612e37ad44d344ed8047dfa3e15fd710cdd4d10b852c90bfdd7bbf4bb513a10ce47b2457
SSDEEP
24576:cc2ryNv5aXxUG23RSjbQlQyYq5XyqoGGkO2hWZ4lK4c/:EryjSxM3RcbgYUnfO2hWZEc/
AutoIT scripts compiled to PE executables.
resource | yara_rule |
---|---|
sample | autoit_exe |
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
__WSAFDIsSet
recv
send
socket
connect
closesocket
bind
select
accept
htons
sendto
recvfrom
ntohs
WSAGetLastError
ioctlsocket
WSACleanup
inet_addr
gethostbyname
WSAStartup
gethostname
listen
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
waveOutSetVolume
timeGetTime
mciSendStringA
ImageList_DragEnter
ImageList_DragMove
ImageList_EndDrag
ImageList_DragLeave
ImageList_BeginDrag
ImageList_SetDragCursorImage
ImageList_Destroy
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
ImageList_Remove
WNetCancelConnection2A
WNetGetConnectionA
WNetAddConnection2A
WNetUseConnectionA
OpenProcess
CreateFileMappingA
MapViewOfFile
WriteProcessMemory
ReadProcessMemory
CreateFileA
ReadFile
SetFilePointer
MoveFileA
OutputDebugStringA
CopyFileA
CreateDirectoryA
RemoveDirectoryA
TerminateProcess
SetSystemPowerState
SetFileTime
FindResourceA
GetFileAttributesA
LoadResource
FindFirstFileA
LockResource
FindClose
SizeofResource
MultiByteToWideChar
EnumResourceNamesA
DeleteFileA
FindNextFileA
lstrcmpiA
GetLocalTime
WideCharToMultiByte
CompareStringA
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
WriteFile
CreatePipe
GetStdHandle
InterlockedExchange
EnterCriticalSection
TerminateThread
LeaveCriticalSection
GetTempPathA
GetTempFileNameA
VirtualFree
UnmapViewOfFile
GetExitCodeProcess
GetDiskFreeSpaceA
GetVolumeInformationA
SetVolumeLabelA
DeviceIoControl
SetErrorMode
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileSectionA
SetFileAttributesA
WritePrivateProfileSectionA
GetShortPathNameA
GetPrivateProfileSectionNamesA
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetDriveTypeA
GlobalAlloc
SetProcessWorkingSetSize
GlobalMemoryStatus
Beep
GetEnvironmentVariableA
GetFileSize
SetEnvironmentVariableA
GlobalFree
GlobalLock
GlobalUnlock
GetCurrentProcessId
GetComputerNameA
GetWindowsDirectoryA
GetSystemDirectoryA
CreateProcessA
SetPriorityClass
VirtualAlloc
GetCurrentThread
LoadLibraryExA
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleHandleA
GetSystemInfo
GetVersionExA
GetCurrentThreadId
Sleep
WaitForSingleObject
CreateThread
DuplicateHandle
GetLastError
HeapAlloc
GetProcessHeap
HeapFree
CloseHandle
ExitProcess
ExitThread
GetSystemTimeAsFileTime
ResumeThread
GetCommandLineA
GetStartupInfoA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RaiseException
GetCurrentProcess
GetModuleFileNameA
GetFullPathNameA
SetCurrentDirectoryA
GetCurrentDirectoryA
FreeLibrary
InitializeCriticalSection
GetProcAddress
LoadLibraryA
HeapCreate
RtlUnwind
GetConsoleCP
GetConsoleMode
SetHandleCount
GetFileType
FlushFileBuffers
SetStdHandle
LCMapStringA
LCMapStringW
GetTimeZoneInformation
HeapSize
HeapReAlloc
HeapDestroy
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
FormatMessageA
CompareStringW
GetSubMenu
GetCaretPos
IsZoomed
SetWindowLongA
FlashWindow
GetMenuStringA
DestroyMenu
SetMenu
DestroyAcceleratorTable
CreateAcceleratorTableA
GetWindowTextLengthA
SetCursor
GetWindowDC
TranslateAcceleratorA
GetSystemMetrics
IsDialogMessageA
CreateMenu
IsDlgButtonChecked
GetSysColor
GetActiveWindow
InflateRect
CharNextA
DrawFocusRect
wsprintfA
DrawTextA
RedrawWindow
FrameRect
DrawFrameControl
FillRect
DrawMenuBar
PtInRect
ReleaseCapture
SetCapture
DefDlgProcA
RegisterHotKey
ReleaseDC
GetCursor
GetDC
WindowFromPoint
SetClipboardData
EmptyClipboard
CountClipboardFormats
CharLowerBuffA
GetMessageA
LockWindowUpdate
DispatchMessageA
TranslateMessage
IsCharUpperA
UnregisterHotKey
LoadImageA
CreateIconFromResourceEx
mouse_event
ExitWindowsEx
SetActiveWindow
FindWindowExA
EnumThreadWindows
CheckMenuRadioItem
GetMenuItemID
GetMenuItemCount
SetMenuItemInfoA
GetMenuItemInfoA
SetMenuDefaultItem
InsertMenuItemA
IsMenu
TrackPopupMenuEx
GetCursorPos
DeleteMenu
SystemParametersInfoA
SetForegroundWindow
IsIconic
FindWindowA
GetKeyboardState
GetKeyState
keybd_event
VkKeyScanA
GetKeyboardLayoutNameA
GetAsyncKeyState
SetKeyboardState
CharUpperA
LoadStringA
MessageBeep
EndDialog
SendDlgItemMessageA
GetDlgItem
SetWindowTextA
GetMenu
GetClientRect
CopyRect
EndPaint
BeginPaint
DestroyWindow
GetDesktopWindow
IsWindow
EnumWindows
IsWindowEnabled
IsWindowVisible
IsCharLowerA
IsCharAlphaNumericA
IsCharAlphaA
SetWindowPos
CopyImage
CloseClipboard
GetClipboardData
IsClipboardFormatAvailable
OpenClipboard
AdjustWindowRectEx
SetRect
PeekMessageA
ClientToScreen
EnableWindow
InvalidateRect
GetWindowLongA
GetWindowTextA
ScreenToClient
EnumChildWindows
CharUpperBuffA
GetWindowThreadProcessId
AttachThreadInput
SendMessageTimeoutA
GetFocus
GetClassNameA
GetParent
GetDlgCtrlID
SendMessageA
MapVirtualKeyA
PostMessageA
GetWindowRect
DefWindowProcA
MoveWindow
SetFocus
PostQuitMessage
KillTimer
CreatePopupMenu
MessageBoxA
RegisterWindowMessageA
DestroyIcon
SetTimer
ShowWindow
CreateWindowExA
RegisterClassExA
LoadIconA
LoadCursorA
GetSysColorBrush
GetForegroundWindow
DialogBoxParamA
Ellipse
MoveToEx
AngleArc
LineTo
CloseFigure
SetPixel
EndPath
CreateSolidBrush
StrokePath
PolyDraw
DeleteObject
GetTextExtentPoint32A
CreateDCA
BeginPath
Rectangle
SetViewportOrgEx
PolyBezierTo
ExtCreatePen
StrokeAndFillPath
RoundRect
SetBkColor
SetTextColor
GetObjectA
SetBkMode
CreateCompatibleBitmap
GetPixel
DeleteDC
GetDIBits
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
CreateFontA
GetDeviceCaps
GetTextFaceA
GetStockObject
CreatePen
GetSaveFileNameA
GetOpenFileNameA
LookupPrivilegeValueA
RegEnumValueA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
GetUserNameA
RegConnectRegistryA
RegEnumKeyExA
AdjustTokenPrivileges
OpenProcessToken
CloseServiceHandle
UnlockServiceDatabase
LockServiceDatabase
OpenSCManagerA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
DragQueryPoint
ShellExecuteExA
DragQueryFileA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetDesktopFolder
SHGetMalloc
SHFileOperationA
ExtractIconExA
Shell_NotifyIconA
ShellExecuteA
DragFinish
OleSetContainedObject
OleSetMenuDescriptor
MkParseDisplayName
CoCreateInstance
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
IIDFromString
StringFromIID
CLSIDFromString
OleInitialize
CreateBindCtx
CLSIDFromProgID
CoInitializeSecurity
CoCreateInstanceEx
CoSetProxyBlanket
StringFromCLSID
OleUninitialize
CoTaskMemAlloc
CoTaskMemFree
VariantTimeToSystemTime
VarR8FromDec
SafeArrayAccessData
SafeArrayUnaccessData
VariantClear
SafeArrayDestroyData
SafeArrayDestroyDescriptor
LoadRegTypeLi
GetActiveObject
SysAllocString
VariantCopy
VariantInit
SafeArrayAllocData
OleLoadPicture
SafeArrayAllocDescriptorEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ