Static task
static1
Behavioral task
behavioral1
Sample
20f33ea0e8655745cf14c14dcfab466039dffa3fd0092b4e2b16162a7ac1511a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
20f33ea0e8655745cf14c14dcfab466039dffa3fd0092b4e2b16162a7ac1511a.exe
Resource
win10v2004-20220812-en
General
-
Target
20f33ea0e8655745cf14c14dcfab466039dffa3fd0092b4e2b16162a7ac1511a
-
Size
2.0MB
-
MD5
7612a0bbe9675f1c15b1d02ff09e8d41
-
SHA1
dc7d62fc431f3632862e2c6214fa281d1e31297a
-
SHA256
20f33ea0e8655745cf14c14dcfab466039dffa3fd0092b4e2b16162a7ac1511a
-
SHA512
e9f74137c2bac0a9210a1a161b21c882289652e6b236c0b594eae56ed9ccc015edfa7ad0cae1248b30a87b6d5a711e82ae3dabf3efdd5b53e0f26c46b40c507b
-
SSDEEP
49152:VeJfAJGpLDxrnP870aDe1PcrnP87NmDe1P:VeVAJUdEq1UEJ1
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe
Files
-
20f33ea0e8655745cf14c14dcfab466039dffa3fd0092b4e2b16162a7ac1511a.exe windows x86
a7c42fd90a54255a67497138e870e532
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
__WSAFDIsSet
recv
send
socket
connect
closesocket
bind
select
accept
htons
sendto
recvfrom
ntohs
WSAGetLastError
ioctlsocket
WSACleanup
inet_addr
gethostbyname
WSAStartup
gethostname
listen
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
winmm
waveOutSetVolume
mciSendStringW
timeGetTime
comctl32
ImageList_EndDrag
ImageList_DragLeave
ImageList_DragMove
ImageList_DragEnter
ImageList_BeginDrag
ImageList_SetDragCursorImage
ImageList_Remove
ImageList_Destroy
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
mpr
WNetUseConnectionW
WNetGetConnectionW
WNetAddConnection2W
WNetCancelConnection2W
kernel32
SetFilePointer
TerminateProcess
WaitForSingleObject
SetSystemPowerState
SetFileTime
FindResourceW
GetFileAttributesW
LoadResource
FindFirstFileW
LockResource
FindClose
SizeofResource
EnumResourceNamesW
DeleteFileW
FindNextFileW
lstrcmpiW
MoveFileW
OutputDebugStringW
CopyFileW
GetLastError
CreateDirectoryW
RemoveDirectoryW
WideCharToMultiByte
GetLocalTime
MultiByteToWideChar
GetModuleHandleA
CompareStringW
InterlockedIncrement
InterlockedDecrement
GetTempPathW
GetTempFileNameW
VirtualFree
FormatMessageW
GetExitCodeProcess
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetDriveTypeW
SetErrorMode
GetDiskFreeSpaceW
GetVolumeInformationW
SetVolumeLabelW
DeviceIoControl
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileSectionW
WritePrivateProfileSectionW
SetFileAttributesW
ReadFile
GetShortPathNameW
FileTimeToLocalFileTime
GlobalLock
GlobalUnlock
GlobalAlloc
SetProcessWorkingSetSize
GlobalMemoryStatus
Beep
GetFileSize
GetEnvironmentVariableW
SetEnvironmentVariableW
GlobalFree
GetComputerNameW
GetWindowsDirectoryW
GetSystemDirectoryW
GetCurrentProcessId
CreatePipe
DuplicateHandle
GetStdHandle
CreateProcessW
SetPriorityClass
LoadLibraryW
VirtualAlloc
WriteFile
GetFileType
PeekNamedPipe
SetLastError
LoadLibraryExW
GlobalFindAtomW
CreateThread
ExitThread
HeapFree
HeapAlloc
ExitProcess
GetProcessHeap
GetStartupInfoW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RaiseException
GetModuleFileNameA
DeleteCriticalSection
HeapSize
HeapReAlloc
HeapDestroy
HeapCreate
CreateFileW
WriteProcessMemory
MapViewOfFile
CreateFileMappingW
OpenProcess
UnmapViewOfFile
CloseHandle
ReadProcessMemory
QueryPerformanceCounter
QueryPerformanceFrequency
GetModuleHandleW
GetSystemInfo
GetCurrentProcess
GetVersionExW
GetCurrentThreadId
Sleep
GetCurrentDirectoryW
GetModuleFileNameW
GetFullPathNameW
RtlUnwind
GetConsoleCP
GetConsoleMode
SetCurrentDirectoryW
FreeLibrary
GetProcAddress
LoadLibraryA
InitializeCriticalSection
GetSystemTimeAsFileTime
ResumeThread
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStartupInfoA
SetStdHandle
FlushFileBuffers
GetVersionExA
LCMapStringA
LCMapStringW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
GetTickCount
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEndOfFile
CompareStringA
GetPrivateProfileSectionNamesW
SetEnvironmentVariableA
user32
GetWindowTextLengthW
GetSystemMetrics
IsDialogMessageW
SetClassLongW
GetSysColor
GetActiveWindow
InflateRect
CharNextW
wsprintfW
DrawFocusRect
RedrawWindow
DrawTextW
FrameRect
DrawFrameControl
FillRect
DrawMenuBar
PtInRect
DestroyMenu
GetClassWord
GetNextDlgTabItem
GetWindow
IsChild
ReleaseCapture
SetCapture
SubtractRect
OffsetRect
LockWindowUpdate
DispatchMessageW
TranslateMessage
PeekMessageW
UnregisterHotKey
LoadImageW
CreateIconFromResourceEx
mouse_event
ExitWindowsEx
SetActiveWindow
FindWindowExW
EnumThreadWindows
SetMenuDefaultItem
InsertMenuItemW
IsMenu
TrackPopupMenuEx
GetCursorPos
GetWindowDC
CreateIcon
CheckMenuRadioItem
GetMenuItemID
GetMenuItemCount
SetMenuItemInfoW
GetMenuItemInfoW
SetForegroundWindow
IsIconic
FindWindowW
GetAsyncKeyState
IsCharAlphaW
GetKeyboardState
GetKeyState
CountClipboardFormats
VkKeyScanA
GetKeyboardLayoutNameA
CharUpperW
LoadStringW
SendDlgItemMessageW
GetDlgItem
SetWindowTextW
DialogBoxParamW
MessageBeep
EndDialog
GetMenu
GetClientRect
CopyRect
EndPaint
BeginPaint
DestroyWindow
EnumWindows
GetDesktopWindow
IsWindow
IsWindowEnabled
IsWindowVisible
EnableWindow
ScreenToClient
InvalidateRect
GetWindowLongW
GetWindowThreadProcessId
AttachThreadInput
SendMessageTimeoutW
GetFocus
GetWindowTextW
SetCursor
SetMenu
CreateMenu
GetCaretPos
GetSubMenu
GetMenuStringW
FlashWindow
SetWindowLongW
IsZoomed
IsCharUpperW
IsCharLowerW
DeleteMenu
IsCharAlphaNumericW
EnumChildWindows
CharUpperBuffW
GetClassNameW
GetParent
GetDlgCtrlID
SendMessageW
MapVirtualKeyW
PostMessageW
GetWindowRect
MessageBoxW
CreatePopupMenu
MessageBoxA
RegisterWindowMessageW
SetTimer
DestroyIcon
ShowWindow
CreateWindowExW
RegisterClassExW
LoadIconW
LoadCursorW
GetSysColorBrush
GetForegroundWindow
GetKeyboardLayoutNameW
CopyImage
GetClipboardData
IsClipboardFormatAvailable
OpenClipboard
AdjustWindowRectEx
SetRect
ClientToScreen
RegisterHotKey
ReleaseDC
GetCursor
GetDC
WindowFromPoint
SetClipboardData
SetKeyboardState
EmptyClipboard
DefWindowProcW
MoveWindow
SetFocus
PostQuitMessage
KillTimer
SetWindowPos
CloseClipboard
CharLowerBuffW
keybd_event
GetMessageW
SystemParametersInfoW
gdi32
MoveToEx
Ellipse
PolyDraw
BeginPath
Rectangle
SetViewportOrgEx
RoundRect
SetBkColor
CreatePen
CreateSolidBrush
SetTextColor
AngleArc
LineTo
CloseFigure
SetPixel
EndPath
StrokePath
StrokeAndFillPath
ExtCreatePen
PolyBezierTo
GetObjectW
SetBkMode
CreateCompatibleBitmap
GetPixel
DeleteDC
GetDIBits
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
CreateFontW
GetDeviceCaps
GetTextFaceW
GetStockObject
CreateDCW
GetTextExtentPoint32W
DeleteObject
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
GetUserNameW
RegConnectRegistryW
RegEnumKeyExW
CloseServiceHandle
UnlockServiceDatabase
LockServiceDatabase
OpenSCManagerW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
shell32
DragQueryPoint
ShellExecuteExW
DragQueryFileW
SHBrowseForFolderW
SHFileOperationW
SHGetPathFromIDListW
SHGetDesktopFolder
SHGetMalloc
ExtractIconExW
Shell_NotifyIconW
ShellExecuteW
DragFinish
ole32
OleSetContainedObject
OleSetMenuDescriptor
MkParseDisplayName
CoInitialize
CoUninitialize
CoCreateInstance
CreateStreamOnHGlobal
CoTaskMemAlloc
CoTaskMemFree
IIDFromString
StringFromIID
CLSIDFromString
OleInitialize
CreateBindCtx
CLSIDFromProgID
CoInitializeSecurity
CoCreateInstanceEx
CoSetProxyBlanket
StringFromCLSID
OleUninitialize
oleaut32
LoadRegTypeLi
SafeArrayDestroyDescriptor
SafeArrayDestroyData
SafeArrayAllocData
SafeArrayAllocDescriptorEx
SysAllocString
OleLoadPicture
SafeArrayUnaccessData
SafeArrayAccessData
VarR4FromDec
VariantTimeToSystemTime
VariantClear
VariantCopy
VariantInit
GetActiveObject
Sections
.text Size: 404KB - Virtual size: 404KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.6MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE