Static task
static1
Behavioral task
behavioral1
Sample
43e7b80a46e28d606e8991cab4bf110974dee6c01fe4491afe689aaa62849a20.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
43e7b80a46e28d606e8991cab4bf110974dee6c01fe4491afe689aaa62849a20.exe
Resource
win10v2004-20220812-en
General
-
Target
43e7b80a46e28d606e8991cab4bf110974dee6c01fe4491afe689aaa62849a20
-
Size
2.2MB
-
MD5
c7855599d713643c6ea050e8946893bf
-
SHA1
6e04af18c361250eb69ce0e00039c1d6ceb11809
-
SHA256
43e7b80a46e28d606e8991cab4bf110974dee6c01fe4491afe689aaa62849a20
-
SHA512
6627d633b902041a3a17ad44429e8eb7b7240eacf47b52bac7e61061ff7076d1c383c724d058d6fe3c9422e0d01ab9487dbfb736a3043e7dc983c1b85d24058e
-
SSDEEP
49152:ChsTbtLAasY6DwOBfrnvV7UeWtyG00SSgCmP/ZwYj48a0jr:SsTpLgYiwOBpIeWUJnZwQP
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe
Files
-
43e7b80a46e28d606e8991cab4bf110974dee6c01fe4491afe689aaa62849a20.exe windows x86
c6e2b4054a282eaf5192cb5508a890a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreatePipe
GetStartupInfoW
CreateProcessW
ReadFile
GetWindowsDirectoryW
lstrcatW
CreateDirectoryW
lstrcpyW
FindFirstFileW
GetFileAttributesW
SetFileAttributesW
RemoveDirectoryW
DeleteFileW
FindNextFileW
CloseHandle
SetCurrentDirectoryW
Sleep
GetTempPathW
GetWindowsDirectoryA
lstrcatA
CreateMutexW
GetLastError
GetModuleFileNameA
SetCurrentDirectoryA
LoadLibraryW
WriteFile
SizeofResource
LoadResource
FindResourceW
CreateFileW
FindClose
GetModuleHandleW
GetCommandLineW
HeapSetInformation
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
IsProcessorFeaturePresent
EncodePointer
DecodePointer
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetProcAddress
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
ExitProcess
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
RtlUnwind
HeapSize
GetStringTypeW
HeapReAlloc
shell32
SHGetSpecialFolderPathW
ShellExecuteW
shlwapi
SHDeleteKeyW
PathFileExistsA
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ