Static task
static1
Behavioral task
behavioral1
Sample
1b6dbad17bd337d4304f8f71befce2bd4a4462ab7fe1fb5dad831845bd97989b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1b6dbad17bd337d4304f8f71befce2bd4a4462ab7fe1fb5dad831845bd97989b.exe
Resource
win10v2004-20221111-en
General
-
Target
1b6dbad17bd337d4304f8f71befce2bd4a4462ab7fe1fb5dad831845bd97989b
-
Size
1.1MB
-
MD5
d0fb66de2dc34b89fa10690e555d39ec
-
SHA1
5347b8efef17250f3a0a7f4432f21369ecc41305
-
SHA256
1b6dbad17bd337d4304f8f71befce2bd4a4462ab7fe1fb5dad831845bd97989b
-
SHA512
4a7b1f820d465523bec14be1c16d2943348719dd015dd15194bad4ef10db979a4ee9b7606079f33a35a886d79fae08634a396abebb4423e7e26f7dc621dc90e1
-
SSDEEP
24576:Bc2ryNv5aXxUG23RSjbQlQKqTmHepnezAV0yzXItYl:9ryjSxM3RcbAqsNyjAm
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe
Files
-
1b6dbad17bd337d4304f8f71befce2bd4a4462ab7fe1fb5dad831845bd97989b.exe windows x86
aaea3b6ea941192ba763f0c2b48d6ff8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
__WSAFDIsSet
recv
send
socket
connect
closesocket
bind
select
accept
htons
sendto
recvfrom
ntohs
WSAGetLastError
ioctlsocket
WSACleanup
inet_addr
gethostbyname
WSAStartup
gethostname
listen
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
winmm
waveOutSetVolume
timeGetTime
mciSendStringA
comctl32
ImageList_DragEnter
ImageList_DragMove
ImageList_EndDrag
ImageList_DragLeave
ImageList_BeginDrag
ImageList_SetDragCursorImage
ImageList_Destroy
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
ImageList_Remove
mpr
WNetCancelConnection2A
WNetGetConnectionA
WNetAddConnection2A
WNetUseConnectionA
kernel32
OpenProcess
CreateFileMappingA
MapViewOfFile
WriteProcessMemory
ReadProcessMemory
CreateFileA
ReadFile
SetFilePointer
MoveFileA
OutputDebugStringA
CopyFileA
CreateDirectoryA
RemoveDirectoryA
TerminateProcess
SetSystemPowerState
SetFileTime
FindResourceA
GetFileAttributesA
LoadResource
FindFirstFileA
LockResource
FindClose
SizeofResource
MultiByteToWideChar
EnumResourceNamesA
DeleteFileA
FindNextFileA
lstrcmpiA
GetLocalTime
WideCharToMultiByte
CompareStringA
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
WriteFile
CreatePipe
GetStdHandle
InterlockedExchange
EnterCriticalSection
TerminateThread
LeaveCriticalSection
GetTempPathA
GetTempFileNameA
VirtualFree
UnmapViewOfFile
GetExitCodeProcess
GetDiskFreeSpaceA
GetVolumeInformationA
SetVolumeLabelA
DeviceIoControl
SetErrorMode
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileSectionA
SetFileAttributesA
WritePrivateProfileSectionA
GetShortPathNameA
GetPrivateProfileSectionNamesA
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetDriveTypeA
GlobalAlloc
SetProcessWorkingSetSize
GlobalMemoryStatus
Beep
GetEnvironmentVariableA
GetFileSize
SetEnvironmentVariableA
GlobalFree
GlobalLock
GlobalUnlock
GetCurrentProcessId
GetComputerNameA
GetWindowsDirectoryA
GetSystemDirectoryA
CreateProcessA
SetPriorityClass
VirtualAlloc
GetCurrentThread
LoadLibraryExA
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleHandleA
GetSystemInfo
GetVersionExA
GetCurrentThreadId
Sleep
WaitForSingleObject
CreateThread
DuplicateHandle
GetLastError
HeapAlloc
GetProcessHeap
HeapFree
CloseHandle
ExitProcess
ExitThread
GetSystemTimeAsFileTime
ResumeThread
GetCommandLineA
GetStartupInfoA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RaiseException
GetCurrentProcess
GetModuleFileNameA
GetFullPathNameA
SetCurrentDirectoryA
GetCurrentDirectoryA
FreeLibrary
InitializeCriticalSection
GetProcAddress
LoadLibraryA
HeapCreate
RtlUnwind
GetConsoleCP
GetConsoleMode
SetHandleCount
GetFileType
FlushFileBuffers
SetStdHandle
LCMapStringA
LCMapStringW
GetTimeZoneInformation
HeapSize
HeapReAlloc
HeapDestroy
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
FormatMessageA
CompareStringW
user32
GetSubMenu
GetCaretPos
IsZoomed
SetWindowLongA
FlashWindow
GetMenuStringA
DestroyMenu
SetMenu
DestroyAcceleratorTable
CreateAcceleratorTableA
GetWindowTextLengthA
SetCursor
GetWindowDC
TranslateAcceleratorA
GetSystemMetrics
IsDialogMessageA
CreateMenu
IsDlgButtonChecked
GetSysColor
GetActiveWindow
InflateRect
CharNextA
DrawFocusRect
wsprintfA
DrawTextA
RedrawWindow
FrameRect
DrawFrameControl
FillRect
DrawMenuBar
PtInRect
ReleaseCapture
SetCapture
DefDlgProcA
RegisterHotKey
ReleaseDC
GetCursor
GetDC
WindowFromPoint
SetClipboardData
EmptyClipboard
CountClipboardFormats
CharLowerBuffA
GetMessageA
LockWindowUpdate
DispatchMessageA
TranslateMessage
IsCharUpperA
UnregisterHotKey
LoadImageA
CreateIconFromResourceEx
mouse_event
ExitWindowsEx
SetActiveWindow
FindWindowExA
EnumThreadWindows
CheckMenuRadioItem
GetMenuItemID
GetMenuItemCount
SetMenuItemInfoA
GetMenuItemInfoA
SetMenuDefaultItem
InsertMenuItemA
IsMenu
TrackPopupMenuEx
GetCursorPos
DeleteMenu
SystemParametersInfoA
SetForegroundWindow
IsIconic
FindWindowA
GetKeyboardState
GetKeyState
keybd_event
VkKeyScanA
GetKeyboardLayoutNameA
GetAsyncKeyState
SetKeyboardState
CharUpperA
LoadStringA
MessageBeep
EndDialog
SendDlgItemMessageA
GetDlgItem
SetWindowTextA
GetMenu
GetClientRect
CopyRect
EndPaint
BeginPaint
DestroyWindow
GetDesktopWindow
IsWindow
EnumWindows
IsWindowEnabled
IsWindowVisible
IsCharLowerA
IsCharAlphaNumericA
IsCharAlphaA
SetWindowPos
CopyImage
CloseClipboard
GetClipboardData
IsClipboardFormatAvailable
OpenClipboard
AdjustWindowRectEx
SetRect
PeekMessageA
ClientToScreen
EnableWindow
InvalidateRect
GetWindowLongA
GetWindowTextA
ScreenToClient
EnumChildWindows
CharUpperBuffA
GetWindowThreadProcessId
AttachThreadInput
SendMessageTimeoutA
GetFocus
GetClassNameA
GetParent
GetDlgCtrlID
SendMessageA
MapVirtualKeyA
PostMessageA
GetWindowRect
DefWindowProcA
MoveWindow
SetFocus
PostQuitMessage
KillTimer
CreatePopupMenu
MessageBoxA
RegisterWindowMessageA
DestroyIcon
SetTimer
ShowWindow
CreateWindowExA
RegisterClassExA
LoadIconA
LoadCursorA
GetSysColorBrush
GetForegroundWindow
DialogBoxParamA
gdi32
Ellipse
MoveToEx
AngleArc
LineTo
CloseFigure
SetPixel
EndPath
CreateSolidBrush
StrokePath
PolyDraw
DeleteObject
GetTextExtentPoint32A
CreateDCA
BeginPath
Rectangle
SetViewportOrgEx
PolyBezierTo
ExtCreatePen
StrokeAndFillPath
RoundRect
SetBkColor
SetTextColor
GetObjectA
SetBkMode
CreateCompatibleBitmap
GetPixel
DeleteDC
GetDIBits
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
CreateFontA
GetDeviceCaps
GetTextFaceA
GetStockObject
CreatePen
comdlg32
GetSaveFileNameA
GetOpenFileNameA
advapi32
LookupPrivilegeValueA
RegEnumValueA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
GetUserNameA
RegConnectRegistryA
RegEnumKeyExA
AdjustTokenPrivileges
OpenProcessToken
CloseServiceHandle
UnlockServiceDatabase
LockServiceDatabase
OpenSCManagerA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
shell32
DragQueryPoint
ShellExecuteExA
DragQueryFileA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetDesktopFolder
SHGetMalloc
SHFileOperationA
ExtractIconExA
Shell_NotifyIconA
ShellExecuteA
DragFinish
ole32
OleSetContainedObject
OleSetMenuDescriptor
MkParseDisplayName
CoCreateInstance
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
IIDFromString
StringFromIID
CLSIDFromString
OleInitialize
CreateBindCtx
CLSIDFromProgID
CoInitializeSecurity
CoCreateInstanceEx
CoSetProxyBlanket
StringFromCLSID
OleUninitialize
CoTaskMemAlloc
CoTaskMemFree
oleaut32
VariantTimeToSystemTime
VarR8FromDec
SafeArrayAccessData
SafeArrayUnaccessData
VariantClear
SafeArrayDestroyData
SafeArrayDestroyDescriptor
LoadRegTypeLi
GetActiveObject
SysAllocString
VariantCopy
VariantInit
SafeArrayAllocData
OleLoadPicture
SafeArrayAllocDescriptorEx
Sections
.text Size: 403KB - Virtual size: 403KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ