Static task
static1
Behavioral task
behavioral1
Sample
6814d9f8fb80420b7f312cc2c4d6a3905c79ffd71ca47a9563fd44401736a214.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6814d9f8fb80420b7f312cc2c4d6a3905c79ffd71ca47a9563fd44401736a214.exe
Resource
win10v2004-20220901-en
General
-
Target
6814d9f8fb80420b7f312cc2c4d6a3905c79ffd71ca47a9563fd44401736a214
-
Size
6.5MB
-
MD5
8be14523a8862b1caa98e218acc94958
-
SHA1
c8ef028db2c37b4bbc0b3659aa0708558d5f71f8
-
SHA256
6814d9f8fb80420b7f312cc2c4d6a3905c79ffd71ca47a9563fd44401736a214
-
SHA512
1f5195fb70d2c3c15b23b1b9d11c3423040dab9cfec27d539fa3f21e33bba9e0e99d4611e3281d3868b0f7099bee0f52c2c1e065ebd109b64753980455651dfa
-
SSDEEP
196608:be7k1bSAfCaSAd9tKjwEHl4mRSAIwGuJPy+x+ACN3b:b7c3DUEjZlbwj+x+bb
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule sample autoit_exe
Files
-
6814d9f8fb80420b7f312cc2c4d6a3905c79ffd71ca47a9563fd44401736a214.exe windows x86
a5327f335c294241801df135b2d5987c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
recvfrom
ntohs
ioctlsocket
WSAGetLastError
select
__WSAFDIsSet
recv
sendto
socket
connect
closesocket
bind
listen
htons
accept
inet_addr
gethostbyname
gethostname
WSACleanup
WSAStartup
send
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
winmm
waveOutSetVolume
mciSendStringW
timeGetTime
comctl32
ImageList_EndDrag
ImageList_DragLeave
ImageList_DragMove
ImageList_DragEnter
ImageList_BeginDrag
ImageList_SetDragCursorImage
ImageList_Remove
ImageList_Destroy
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
mpr
WNetUseConnectionW
WNetGetConnectionW
WNetAddConnection2W
WNetCancelConnection2W
kernel32
WaitForSingleObject
SetSystemPowerState
SetFileTime
FindResourceW
GetFileAttributesW
LoadResource
FindFirstFileW
LockResource
FindClose
SizeofResource
EnumResourceNamesW
DeleteFileW
FindNextFileW
lstrcmpiW
MoveFileW
OutputDebugStringW
CopyFileW
GetLastError
CreateDirectoryW
RemoveDirectoryW
TerminateProcess
WideCharToMultiByte
GetLocalTime
MultiByteToWideChar
CompareStringW
InterlockedIncrement
InterlockedDecrement
GetTempPathW
GetTempFileNameW
FormatMessageW
GetExitCodeProcess
DeviceIoControl
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileSectionW
WritePrivateProfileSectionW
SetFileAttributesW
GetPrivateProfileSectionNamesW
GetShortPathNameW
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetDriveTypeW
SetErrorMode
GetDiskFreeSpaceW
GetVolumeInformationW
SetVolumeLabelW
SetFilePointer
GlobalLock
GlobalUnlock
GlobalAlloc
SetProcessWorkingSetSize
GlobalMemoryStatus
Beep
GetFileSize
GetEnvironmentVariableW
SetEnvironmentVariableW
GetWindowsDirectoryW
GetSystemDirectoryW
GetCurrentProcessId
GetComputerNameW
CreatePipe
DuplicateHandle
GetStdHandle
CreateProcessW
SetPriorityClass
LoadLibraryW
WriteFile
GetFileType
PeekNamedPipe
SetLastError
LoadLibraryExW
GlobalFindAtomW
GetModuleHandleA
ResumeThread
GetSystemTimeAsFileTime
CreateThread
ExitThread
HeapFree
HeapAlloc
ExitProcess
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RaiseException
GetModuleFileNameA
DeleteCriticalSection
InitializeCriticalSection
HeapSize
VirtualFree
VirtualAlloc
HeapReAlloc
HeapDestroy
HeapCreate
ReadFile
CreateFileW
ReadProcessMemory
WriteProcessMemory
MapViewOfFile
CreateFileMappingW
OpenProcess
UnmapViewOfFile
CloseHandle
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleHandleW
GetSystemInfo
GetCurrentProcess
GetVersionExW
GetCurrentThreadId
Sleep
GetProcAddress
LoadLibraryA
RtlUnwind
GetConsoleCP
GetConsoleMode
FreeLibrary
GetModuleFileNameW
GetFullPathNameW
SetCurrentDirectoryW
GetCurrentDirectoryW
EnterCriticalSection
LeaveCriticalSection
GetVersionExA
GetProcessHeap
GetStartupInfoW
SetHandleCount
GetStartupInfoA
SetStdHandle
FlushFileBuffers
GetCPInfo
LCMapStringA
LCMapStringW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
GetTickCount
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEndOfFile
CompareStringA
GlobalFree
SetEnvironmentVariableA
user32
wsprintfW
DrawFocusRect
RedrawWindow
DrawTextW
FrameRect
DrawFrameControl
FillRect
DrawMenuBar
PtInRect
DestroyMenu
CreateMenu
SetMenu
SetCursor
GetWindowDC
GetWindowTextLengthW
GetClassWord
GetNextDlgTabItem
GetWindow
IsChild
ReleaseCapture
SetCapture
SubtractRect
OffsetRect
OpenClipboard
CharLowerBuffW
GetMessageW
LockWindowUpdate
DispatchMessageW
TranslateMessage
PeekMessageW
UnregisterHotKey
LoadImageW
CreateIconFromResourceEx
mouse_event
ExitWindowsEx
SetActiveWindow
FindWindowExW
EnumThreadWindows
GetMenuItemInfoW
SetMenuDefaultItem
InsertMenuItemW
IsMenu
CharNextW
GetCursorPos
DeleteMenu
CreateIcon
CheckMenuRadioItem
GetMenuItemID
GetMenuItemCount
SetMenuItemInfoW
IsIconic
FindWindowW
SystemParametersInfoW
IsCharUpperW
keybd_event
VkKeyScanA
GetKeyboardLayoutNameA
SetWindowPos
SetKeyboardState
GetKeyboardState
CharUpperW
LoadStringW
SendDlgItemMessageW
GetDlgItem
SetWindowTextW
DialogBoxParamW
MessageBeep
EndDialog
DestroyWindow
GetMenu
GetClientRect
CopyRect
EndPaint
BeginPaint
EnumWindows
GetDesktopWindow
IsWindow
IsWindowEnabled
IsWindowVisible
EnableWindow
ScreenToClient
InvalidateRect
GetWindowLongW
GetWindowThreadProcessId
AttachThreadInput
InflateRect
GetActiveWindow
GetSysColor
SetClassLongW
IsDialogMessageW
GetSystemMetrics
FlashWindow
SetWindowLongW
IsZoomed
GetCaretPos
GetSubMenu
TrackPopupMenuEx
GetMenuStringW
SendMessageTimeoutW
GetFocus
GetWindowTextW
EnumChildWindows
CharUpperBuffW
GetParent
GetDlgCtrlID
SendMessageW
MapVirtualKeyW
PostMessageW
GetWindowRect
GetClassNameW
MessageBoxW
ShowWindow
CreateWindowExW
RegisterClassExW
LoadIconW
LoadCursorW
GetSysColorBrush
GetForegroundWindow
DefWindowProcW
MoveWindow
IsCharLowerW
IsCharAlphaNumericW
IsCharAlphaW
GetKeyboardLayoutNameW
AdjustWindowRectEx
SetRect
ClientToScreen
RegisterHotKey
ReleaseDC
GetCursor
GetDC
WindowFromPoint
SetClipboardData
EmptyClipboard
GetKeyState
CountClipboardFormats
SetFocus
PostQuitMessage
KillTimer
CreatePopupMenu
MessageBoxA
RegisterWindowMessageW
SetTimer
DestroyIcon
CloseClipboard
CopyImage
GetClipboardData
GetAsyncKeyState
IsClipboardFormatAvailable
SetForegroundWindow
gdi32
AngleArc
MoveToEx
Ellipse
PolyDraw
BeginPath
Rectangle
RoundRect
SetBkColor
CreatePen
CreateSolidBrush
SetTextColor
LineTo
CloseFigure
SetPixel
EndPath
StrokePath
StrokeAndFillPath
ExtCreatePen
PolyBezierTo
SetViewportOrgEx
GetObjectW
SetBkMode
CreateCompatibleBitmap
GetPixel
DeleteDC
GetDIBits
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
CreateFontW
GetDeviceCaps
GetTextFaceW
GetStockObject
CreateDCW
GetTextExtentPoint32W
DeleteObject
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
GetUserNameW
RegConnectRegistryW
RegEnumKeyExW
CloseServiceHandle
UnlockServiceDatabase
LockServiceDatabase
OpenSCManagerW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
shell32
DragQueryPoint
ShellExecuteExW
DragQueryFileW
SHBrowseForFolderW
SHFileOperationW
SHGetPathFromIDListW
SHGetDesktopFolder
SHGetMalloc
Shell_NotifyIconW
ExtractIconExW
ShellExecuteW
DragFinish
ole32
OleSetMenuDescriptor
MkParseDisplayName
OleSetContainedObject
CoCreateInstance
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
CoInitializeSecurity
CoCreateInstanceEx
CoSetProxyBlanket
StringFromCLSID
OleUninitialize
CoTaskMemAlloc
CoTaskMemFree
IIDFromString
StringFromIID
CLSIDFromString
OleInitialize
CreateBindCtx
CLSIDFromProgID
oleaut32
LoadRegTypeLi
SafeArrayDestroyDescriptor
SafeArrayDestroyData
SafeArrayAllocData
SafeArrayAllocDescriptorEx
SysAllocString
OleLoadPicture
SafeArrayUnaccessData
SafeArrayAccessData
VarR4FromDec
VariantTimeToSystemTime
VariantClear
VariantCopy
VariantInit
GetActiveObject
Sections
.text Size: 399KB - Virtual size: 398KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 298KB - Virtual size: 300KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ