Static task
static1
Behavioral task
behavioral1
Sample
655bf5396e958106c382e047c6c28d417ab0a7c1f5c6138ab1b0076780b536c3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
655bf5396e958106c382e047c6c28d417ab0a7c1f5c6138ab1b0076780b536c3.exe
Resource
win10v2004-20220812-en
General
-
Target
655bf5396e958106c382e047c6c28d417ab0a7c1f5c6138ab1b0076780b536c3
-
Size
661KB
-
MD5
0e72f667660cc69d546fdfdd4efe26fc
-
SHA1
25bbacdb383fa4347ae8ebf7963cd29b504e5c43
-
SHA256
655bf5396e958106c382e047c6c28d417ab0a7c1f5c6138ab1b0076780b536c3
-
SHA512
4e8c7d6f51d55c3eabce9828d96225257f42aad33be44ba33aaa121a543597961ce2be4807079e19e76ba151f8857ee3bbc86a8e724a74b7bb51603c559f6183
-
SSDEEP
12288:T6SKqT31T6WpJY6V765jKqostkm3ObVn28bZxiqdMauFIm:mxqT31T6WE6I5jKqosOm+bVn28bZ4qde
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe
Files
-
655bf5396e958106c382e047c6c28d417ab0a7c1f5c6138ab1b0076780b536c3.exe windows x86
2a3100a777f218dc13b45804af8d5e54
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
recv
send
socket
connect
closesocket
bind
listen
__WSAFDIsSet
htons
sendto
recvfrom
ntohs
ioctlsocket
select
WSAGetLastError
WSACleanup
inet_addr
gethostbyname
WSAStartup
gethostname
accept
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
winmm
waveOutSetVolume
mciSendStringW
timeGetTime
comctl32
ImageList_DragMove
ImageList_EndDrag
ImageList_DragLeave
ImageList_DragEnter
ImageList_BeginDrag
ImageList_SetDragCursorImage
ImageList_Destroy
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
ImageList_Remove
mpr
WNetUseConnectionW
WNetGetConnectionW
WNetAddConnection2W
WNetCancelConnection2W
kernel32
UnmapViewOfFile
OpenProcess
CreateFileMappingW
MapViewOfFile
WriteProcessMemory
ReadProcessMemory
CreateFileW
ReadFile
SetFilePointer
SetFileTime
FindResourceW
LoadResource
GetFileAttributesW
LockResource
FindFirstFileW
SizeofResource
FindClose
EnumResourceNamesW
DeleteFileW
FindNextFileW
lstrcmpiW
MoveFileW
OutputDebugStringW
CopyFileW
CreateDirectoryW
RemoveDirectoryW
TerminateProcess
SetSystemPowerState
GetLocalTime
MultiByteToWideChar
WideCharToMultiByte
CompareStringW
InterlockedIncrement
InterlockedDecrement
WriteFile
CreatePipe
GetStdHandle
InterlockedExchange
EnterCriticalSection
TerminateThread
LeaveCriticalSection
DeleteCriticalSection
GetTempPathW
GetTempFileNameW
VirtualFree
FormatMessageW
GetExitCodeProcess
GetDriveTypeW
QueryPerformanceFrequency
GetVolumeInformationW
SetVolumeLabelW
DeviceIoControl
SetErrorMode
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileSectionW
SetFileAttributesW
WritePrivateProfileSectionW
GetShortPathNameW
GetPrivateProfileSectionNamesW
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetEnvironmentVariableW
GetFileSize
SetEnvironmentVariableW
GlobalFree
GlobalLock
GlobalUnlock
GlobalAlloc
SetProcessWorkingSetSize
GlobalMemoryStatus
Beep
GetComputerNameW
GetWindowsDirectoryW
GetSystemDirectoryW
GetCurrentProcessId
GetCurrentThread
CreateProcessW
SetPriorityClass
VirtualAlloc
LoadLibraryExW
GetModuleHandleA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RaiseException
GetModuleFileNameA
HeapSize
HeapReAlloc
HeapDestroy
HeapCreate
RtlUnwind
QueryPerformanceCounter
GetModuleHandleW
GetSystemInfo
GetVersionExW
GetCurrentThreadId
Sleep
WaitForSingleObject
CreateThread
DuplicateHandle
GetLastError
HeapAlloc
GetProcessHeap
HeapFree
CloseHandle
GetCurrentProcess
LoadLibraryA
GetModuleFileNameW
GetFullPathNameW
SetCurrentDirectoryW
GetConsoleCP
GetConsoleMode
SetHandleCount
GetCurrentDirectoryW
FreeLibrary
InitializeCriticalSection
GetProcAddress
LoadLibraryW
GetStartupInfoW
GetVersionExA
ExitProcess
ExitThread
GetSystemTimeAsFileTime
GetFileType
GetStartupInfoA
SetStdHandle
ResumeThread
FlushFileBuffers
LCMapStringA
LCMapStringW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
GetTickCount
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEndOfFile
CompareStringA
GetDiskFreeSpaceW
SetEnvironmentVariableA
user32
SetWindowLongW
FlashWindow
GetActiveWindow
InflateRect
CharNextW
DrawFocusRect
wsprintfW
DrawTextW
RedrawWindow
FrameRect
DrawFrameControl
FillRect
DrawMenuBar
PtInRect
DestroyMenu
SetMenu
DestroyAcceleratorTable
CreateAcceleratorTableW
GetWindowTextLengthW
SetCursor
GetWindowDC
TranslateAcceleratorW
GetSystemMetrics
IsDialogMessageW
CreateMenu
IsDlgButtonChecked
GetSysColor
DefDlgProcW
ReleaseCapture
SetCapture
SetActiveWindow
FindWindowExW
EnumThreadWindows
LoadImageW
CreateIconFromResourceEx
mouse_event
SetMenuDefaultItem
InsertMenuItemW
IsMenu
TrackPopupMenuEx
GetCursorPos
DeleteMenu
CheckMenuRadioItem
GetMenuItemID
GetMenuItemCount
IsZoomed
GetMenuItemInfoW
SetForegroundWindow
IsIconic
FindWindowW
SystemParametersInfoW
GetAsyncKeyState
SetKeyboardState
GetKeyboardState
GetKeyState
DispatchMessageW
GetDC
GetKeyboardLayoutNameA
LoadStringW
DialogBoxParamW
MessageBeep
EndDialog
SendDlgItemMessageW
GetDlgItem
SetWindowTextW
DestroyWindow
GetMenu
GetClientRect
CopyRect
EndPaint
BeginPaint
EnumWindows
GetDesktopWindow
IsWindow
IsWindowEnabled
IsWindowVisible
EnableWindow
InvalidateRect
GetWindowLongW
GetWindowThreadProcessId
AttachThreadInput
SendMessageTimeoutW
GetFocus
GetWindowTextW
ScreenToClient
EnumChildWindows
CharUpperBuffW
GetClassNameW
GetParent
GetDlgCtrlID
SendMessageW
MapVirtualKeyW
GetCaretPos
GetSubMenu
GetMenuStringW
IsCharUpperW
IsCharLowerW
IsCharAlphaNumericW
IsCharAlphaW
GetKeyboardLayoutNameW
ClientToScreen
RegisterHotKey
ReleaseDC
SetMenuItemInfoW
GetCursor
PostMessageW
GetWindowRect
MessageBoxW
GetForegroundWindow
DefWindowProcW
MoveWindow
SetFocus
PostQuitMessage
KillTimer
CreatePopupMenu
MessageBoxA
RegisterWindowMessageW
DestroyIcon
SetTimer
ShowWindow
CreateWindowExW
RegisterClassExW
LoadIconW
LoadCursorW
GetSysColorBrush
TranslateMessage
PeekMessageW
WindowFromPoint
SetClipboardData
EmptyClipboard
CountClipboardFormats
SetWindowPos
CopyImage
CloseClipboard
GetClipboardData
IsClipboardFormatAvailable
OpenClipboard
AdjustWindowRectEx
SetRect
CharLowerBuffW
GetMessageW
VkKeyScanA
LockWindowUpdate
UnregisterHotKey
keybd_event
ExitWindowsEx
CharUpperW
gdi32
LineTo
AngleArc
MoveToEx
Ellipse
PolyDraw
BeginPath
SetTextColor
GetObjectW
SetBkMode
RoundRect
SetBkColor
CloseFigure
SetPixel
EndPath
StrokePath
StrokeAndFillPath
ExtCreatePen
PolyBezierTo
SetViewportOrgEx
Rectangle
CreatePen
CreateSolidBrush
CreateCompatibleBitmap
GetPixel
DeleteDC
GetDIBits
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
CreateFontW
GetDeviceCaps
GetTextFaceW
GetStockObject
CreateDCW
GetTextExtentPoint32W
DeleteObject
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
GetUserNameW
RegConnectRegistryW
RegEnumKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
CloseServiceHandle
UnlockServiceDatabase
LockServiceDatabase
OpenSCManagerW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
shell32
DragQueryPoint
ShellExecuteExW
DragQueryFileW
SHBrowseForFolderW
SHFileOperationW
SHGetPathFromIDListW
SHGetDesktopFolder
SHGetMalloc
ExtractIconExW
Shell_NotifyIconW
ShellExecuteW
DragFinish
ole32
OleSetMenuDescriptor
MkParseDisplayName
OleSetContainedObject
CoInitialize
CoUninitialize
CoCreateInstance
CreateStreamOnHGlobal
CoTaskMemAlloc
CoTaskMemFree
IIDFromString
StringFromIID
CLSIDFromString
OleInitialize
CreateBindCtx
CLSIDFromProgID
CoInitializeSecurity
CoCreateInstanceEx
CoSetProxyBlanket
StringFromCLSID
OleUninitialize
oleaut32
LoadRegTypeLi
SafeArrayDestroyDescriptor
SafeArrayDestroyData
SafeArrayAllocData
SafeArrayAllocDescriptorEx
SysAllocString
OleLoadPicture
VarR8FromDec
VariantTimeToSystemTime
SafeArrayUnaccessData
SafeArrayAccessData
VariantClear
VariantCopy
VariantInit
GetActiveObject
Sections
.text Size: 408KB - Virtual size: 407KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ