Static task
static1
Behavioral task
behavioral1
Sample
AutoRun.exe
Resource
win10v2004-20220812-es
General
-
Target
AutoRun.exe
-
Size
252KB
-
MD5
70ca4894e6c7b9b468d1f4f4d03746fc
-
SHA1
cd9c9f6e32b0ee3d3c58891eb4968a507d372019
-
SHA256
3177e5fb3d97e21c33dc7d370689b728ab0a2170fd07c7e12acc2c51c271c8f4
-
SHA512
c27d5d827a52a26a649dfe5827068a2076cb92c0c79335576172bbaad9e5062eced89a577bfcc0db5df9d39cb83d9daef85186fda345f089841f00ce229e9deb
-
SSDEEP
3072:cS5XeMio/lIw6YFLJEqbAJQPIG4Fu5M/5n+JmHW2Si+49dMmuJWoODDQDmzB36i:chMQMEFY5Un+xl4caQDmz
Malware Config
Signatures
Files
-
AutoRun.exe.exe windows x86
e33e751c7577a52c91fecedf4673179a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
PlaySoundA
kernel32
IsBadReadPtr
FileTimeToLocalFileTime
RtlUnwind
ExitProcess
TerminateProcess
GetDriveTypeA
SetEnvironmentVariableA
SetErrorMode
FileTimeToSystemTime
HeapAlloc
GetOEMCP
GetStartupInfoA
GetCommandLineA
SetCurrentDirectoryA
GetCPInfo
HeapReAlloc
HeapSize
GetACP
GetTimeZoneInformation
HeapFree
RaiseException
SetStdHandle
VirtualFree
VirtualAlloc
IsBadWritePtr
SetHandleCount
GetStdHandle
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetFileType
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadCodePtr
CompareStringA
CompareStringW
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThreadId
SetLastError
CreateProcessA
GetExitCodeProcess
Sleep
FormatMessageA
GetVersionExA
GetCurrentThread
GetCurrentProcess
LocalAlloc
LocalFree
WinExec
CreateMutexA
GetLastError
GetFileAttributesA
GetFileTime
GetFileSize
FindFirstFileA
GetFullPathNameA
GetVolumeInformationA
MoveFileA
FindClose
DeleteFileA
LockFile
SetEndOfFile
UnlockFile
WriteFile
FlushFileBuffers
SetFilePointer
DuplicateHandle
ReadFile
CreateFileA
FreeEnvironmentStringsW
GlobalFlags
CloseHandle
GetProcessVersion
GetCurrentDirectoryA
GetEnvironmentStrings
TlsSetValue
TlsGetValue
InterlockedExchange
LocalReAlloc
LeaveCriticalSection
EnterCriticalSection
GlobalReAlloc
GlobalFree
TlsFree
GlobalHandle
InitializeCriticalSection
DeleteCriticalSection
TlsAlloc
FreeLibrary
LoadLibraryA
GetProcAddress
GlobalFindAtomA
GetModuleHandleA
lstrcpynA
lstrcatA
lstrcpyA
GlobalAddAtomA
GlobalUnlock
GlobalGetAtomNameA
GetVersion
WritePrivateProfileStringA
WideCharToMultiByte
MultiByteToWideChar
InterlockedIncrement
lstrlenA
InterlockedDecrement
GetEnvironmentStringsW
LCMapStringA
GetEnvironmentVariableA
HeapDestroy
HeapCreate
user32
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
UnhookWindowsHookEx
GetMessagePos
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
DefWindowProcA
RegisterClassA
GetTopWindow
EndDeferWindowPos
BeginDeferWindowPos
DeferWindowPos
GetSysColor
ClientToScreen
GetDC
ReleaseDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
GetClassNameA
LoadCursorA
GetSysColorBrush
LoadStringA
CharUpperA
GetWindowPlacement
GetSystemMetrics
BringWindowToTop
IsIconic
EqualRect
CopyRect
GetMenuItemCount
GetSubMenu
GetMenuItemID
UnpackDDElParam
ReuseDDElParam
SetForegroundWindow
GetForegroundWindow
SetMenu
GetMenu
GetClassInfoA
LoadMenuA
DestroyMenu
GetWindow
GetCapture
TranslateAcceleratorA
LoadAcceleratorsA
SetRectEmpty
RegisterWindowMessageA
SystemParametersInfoA
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
GetDlgCtrlID
GetWindowTextA
SetWindowTextA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
ShowOwnedPopups
WinHelpA
SetActiveWindow
wsprintfA
PostQuitMessage
ReleaseCapture
SetCapture
InvalidateRect
IsWindow
MapWindowPoints
PtInRect
GetCursorPos
ScreenToClient
AdjustWindowRectEx
DestroyIcon
LoadIconA
SendMessageA
GetDesktopWindow
GetWindowRect
GetClientRect
PostMessageA
RedrawWindow
MessageBoxA
FindWindowA
UpdateWindow
LoadBitmapA
GetMenuCheckMarkDimensions
GetDlgItem
UnregisterClassA
gdi32
CreateBitmap
SetTextColor
SetBkColor
GetClipBox
DeleteDC
GetObjectA
RestoreDC
SelectObject
SaveDC
GetStockObject
SetViewportOrgEx
OffsetViewportOrgEx
SetMapMode
ScaleViewportExtEx
SetViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteObject
GetDeviceCaps
RectVisible
TextOutA
PtVisible
Escape
ExtTextOutA
StretchDIBits
CreateDIBSection
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
AddAccessAllowedAce
InitializeAcl
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
FreeSid
RevertToSelf
AccessCheck
IsValidSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
ImpersonateSelf
OpenThreadToken
GetLengthSid
InitializeSecurityDescriptor
AllocateAndInitializeSid
OpenProcessToken
RegSetValueExA
RegDeleteKeyA
RegCreateKeyExA
shell32
ExtractIconExA
ShellExecuteA
DragFinish
DragQueryFileA
comctl32
ord17
Sections
.text Size: 176KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ