Static task
static1
Behavioral task
behavioral1
Sample
19b8136db24620cf65488635b8e7f76d3d44a7d27e5d50650dbceeec5914427a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
19b8136db24620cf65488635b8e7f76d3d44a7d27e5d50650dbceeec5914427a.exe
Resource
win10v2004-20220901-en
General
-
Target
19b8136db24620cf65488635b8e7f76d3d44a7d27e5d50650dbceeec5914427a
-
Size
490KB
-
MD5
d7aa4755b6c94170199e5f622bf3c0bc
-
SHA1
30221ccdd43cb3db480a05ce60673c04a0d8f7f4
-
SHA256
19b8136db24620cf65488635b8e7f76d3d44a7d27e5d50650dbceeec5914427a
-
SHA512
e6dbfe6117ff690f399ad18b7957ad114503b0716f0d83b0d31b7e3cd3f9e78446a7aefa7778495e275c703bf1675a92201ce4e2970af5c5841b3b021454c5cd
-
SSDEEP
12288:vvftpmiUkPEKJ2b17t1GZbq96IIvRKGJqx8AU8ZGti:vHjmA6Zt1Gpo6IGRKGMx1U8ZGk
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe
Files
-
19b8136db24620cf65488635b8e7f76d3d44a7d27e5d50650dbceeec5914427a.exe windows x86
dd481b0d64da4945a68f81c8ba2a34d6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
__WSAFDIsSet
recv
send
socket
connect
closesocket
bind
select
accept
htons
sendto
recvfrom
ntohs
WSAGetLastError
ioctlsocket
WSACleanup
inet_addr
gethostbyname
WSAStartup
gethostname
listen
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
winmm
waveOutSetVolume
timeGetTime
mciSendStringA
comctl32
ImageList_SetDragCursorImage
ImageList_EndDrag
ImageList_DragLeave
ImageList_DragMove
ImageList_DragEnter
ImageList_BeginDrag
ImageList_Destroy
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
ImageList_Remove
mpr
WNetUseConnectionA
WNetGetConnectionA
WNetAddConnection2A
WNetCancelConnection2A
kernel32
SetSystemPowerState
SetFileTime
GetFileAttributesA
FindResourceA
FindFirstFileA
LoadResource
FindClose
LockResource
SizeofResource
MultiByteToWideChar
EnumResourceNamesA
DeleteFileA
FindNextFileA
lstrcmpiA
MoveFileA
OutputDebugStringA
CopyFileA
GetLastError
CreateDirectoryA
RemoveDirectoryA
TerminateProcess
WaitForSingleObject
GetLocalTime
WideCharToMultiByte
CompareStringA
InterlockedIncrement
InterlockedDecrement
GetTempPathA
GetTempFileNameA
FormatMessageA
GetExitCodeProcess
SetFileAttributesA
GetPrivateProfileSectionNamesA
GetShortPathNameA
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetDriveTypeA
SetErrorMode
GetDiskFreeSpaceA
GetVolumeInformationA
SetVolumeLabelA
DeviceIoControl
SetFilePointer
WritePrivateProfileStringA
GetPrivateProfileSectionA
WritePrivateProfileSectionA
GlobalAlloc
SetProcessWorkingSetSize
GlobalMemoryStatus
Beep
GetFileSize
GetEnvironmentVariableA
SetEnvironmentVariableA
GlobalFree
GlobalLock
GlobalUnlock
GetCurrentProcessId
GetComputerNameA
GetWindowsDirectoryA
GetSystemDirectoryA
CreatePipe
DuplicateHandle
GetStdHandle
CreateProcessA
SetPriorityClass
WriteFile
GetFileType
PeekNamedPipe
SetLastError
LoadLibraryExA
GlobalFindAtomA
HeapFree
ExitProcess
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
GetProcessHeap
GetStartupInfoA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RaiseException
DeleteCriticalSection
InitializeCriticalSection
HeapSize
ReadFile
CreateFileA
CreateFileMappingA
OpenProcess
UnmapViewOfFile
CloseHandle
ReadProcessMemory
WriteProcessMemory
MapViewOfFile
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleHandleA
GetSystemInfo
GetCurrentProcess
GetVersionExA
GetCurrentThreadId
Sleep
GetProcAddress
LoadLibraryA
HeapDestroy
HeapCreate
VirtualFree
FreeLibrary
GetModuleFileNameA
GetFullPathNameA
SetCurrentDirectoryA
GetCurrentDirectoryA
HeapAlloc
ExitThread
CreateThread
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
RtlUnwind
GetConsoleCP
GetConsoleMode
SetHandleCount
SetStdHandle
ResumeThread
FlushFileBuffers
LCMapStringA
LCMapStringW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
GetPrivateProfileStringA
CompareStringW
user32
wsprintfA
DrawFocusRect
RedrawWindow
DrawTextA
FrameRect
DrawFrameControl
FillRect
DrawMenuBar
PtInRect
DestroyMenu
CreateMenu
SetMenu
SetCursor
GetWindowDC
GetWindowTextLengthA
GetSystemMetrics
IsDialogMessageA
SetClassLongA
GetSysColor
SetCapture
SubtractRect
OffsetRect
GetClassWord
GetNextDlgTabItem
GetWindow
IsChild
ReleaseCapture
TranslateMessage
PeekMessageA
UnregisterHotKey
SetActiveWindow
FindWindowExA
EnumThreadWindows
LoadImageA
CreateIconFromResourceEx
mouse_event
ExitWindowsEx
CreateIcon
CheckMenuRadioItem
GetMenuItemID
GetMenuItemCount
SetMenuItemInfoA
GetMenuItemInfoA
SetMenuDefaultItem
CharNextA
IsMenu
TrackPopupMenuEx
GetCursorPos
DeleteMenu
SetForegroundWindow
IsIconic
SystemParametersInfoA
GetAsyncKeyState
SetKeyboardState
GetKeyboardState
SetWindowPos
CountClipboardFormats
VkKeyScanA
GetKeyboardLayoutNameA
CharUpperA
LoadStringA
DialogBoxParamA
MessageBeep
EndDialog
SendDlgItemMessageA
GetDlgItem
SetWindowTextA
EndPaint
BeginPaint
DestroyWindow
GetMenu
GetClientRect
CopyRect
EnumWindows
GetDesktopWindow
IsWindow
IsWindowEnabled
IsWindowVisible
EnableWindow
ScreenToClient
InvalidateRect
GetWindowLongA
GetWindowThreadProcessId
AttachThreadInput
SendMessageTimeoutA
GetFocus
GetWindowTextA
EnumChildWindows
CharUpperBuffA
InflateRect
GetActiveWindow
FlashWindow
SetWindowLongA
IsZoomed
GetCaretPos
GetSubMenu
GetMenuStringA
IsCharUpperA
IsCharLowerA
IsCharAlphaNumericA
InsertMenuItemA
IsCharAlphaA
GetClassNameA
GetParent
GetDlgCtrlID
SendMessageA
MapVirtualKeyA
PostMessageA
GetWindowRect
CreateWindowExA
RegisterClassExA
LoadIconA
LoadCursorA
GetSysColorBrush
GetForegroundWindow
DefWindowProcA
MoveWindow
SetFocus
PostQuitMessage
KillTimer
CreatePopupMenu
MessageBoxA
RegisterWindowMessageA
SetTimer
CloseClipboard
CopyImage
GetClipboardData
IsClipboardFormatAvailable
OpenClipboard
AdjustWindowRectEx
SetRect
ClientToScreen
RegisterHotKey
ReleaseDC
GetCursor
GetDC
WindowFromPoint
SetClipboardData
GetKeyState
EmptyClipboard
DestroyIcon
ShowWindow
CharLowerBuffA
GetMessageA
LockWindowUpdate
keybd_event
DispatchMessageA
FindWindowA
gdi32
StrokePath
EndPath
SetPixel
CloseFigure
LineTo
AngleArc
CreatePen
CreateSolidBrush
SetTextColor
GetObjectA
SetBkMode
StrokeAndFillPath
ExtCreatePen
PolyBezierTo
SetViewportOrgEx
Rectangle
BeginPath
PolyDraw
Ellipse
MoveToEx
RoundRect
SetBkColor
GetStockObject
CreateDCA
CreateCompatibleBitmap
GetPixel
DeleteDC
GetDIBits
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
CreateFontA
GetDeviceCaps
GetTextFaceA
GetTextExtentPoint32A
DeleteObject
comdlg32
GetSaveFileNameA
GetOpenFileNameA
advapi32
RegEnumValueA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
GetUserNameA
RegConnectRegistryA
RegEnumKeyExA
LookupPrivilegeValueA
OpenProcessToken
CloseServiceHandle
UnlockServiceDatabase
LockServiceDatabase
OpenSCManagerA
AdjustTokenPrivileges
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
shell32
DragQueryPoint
ShellExecuteExA
DragQueryFileA
SHBrowseForFolderA
SHFileOperationA
SHGetPathFromIDListA
SHGetDesktopFolder
SHGetMalloc
ExtractIconExA
Shell_NotifyIconA
ShellExecuteA
DragFinish
ole32
OleSetMenuDescriptor
MkParseDisplayName
OleSetContainedObject
CoInitialize
CoUninitialize
CoCreateInstance
CreateStreamOnHGlobal
CoTaskMemAlloc
CoTaskMemFree
IIDFromString
StringFromIID
CLSIDFromString
OleInitialize
CreateBindCtx
CLSIDFromProgID
CoInitializeSecurity
CoCreateInstanceEx
CoSetProxyBlanket
StringFromCLSID
OleUninitialize
oleaut32
LoadRegTypeLi
SafeArrayDestroyDescriptor
SafeArrayDestroyData
SafeArrayAllocData
SafeArrayAllocDescriptorEx
SysAllocString
OleLoadPicture
SafeArrayUnaccessData
SafeArrayAccessData
VarR4FromDec
VariantTimeToSystemTime
VariantClear
VariantCopy
VariantInit
GetActiveObject
Sections
.text Size: 396KB - Virtual size: 396KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ