��sա%϶��0�H#�#�������J@��X�-���`���ØKW`>�9��6-� ��#�4�j4�.φ�a��rsJ��O���ܔ��B`�(��`!��Ҫ1��QNw���!c�n٤W�;y��٣� ����SY3ƿ��ݓ�U�(�r�>hAx���tr%"�g���}����M���������RJ�G�$�_��(�H���茭 չ+�',�v"�]���8 �L�A���3/�������a���7_�b��"�����S�i?.���P5& �6A�l)8��Ǽ5�-Lɝic�bû��;�������(�R@�T[�m ��#DL.,�y���㮺p!LB!��I�×��1��l��Β�̍յ������< -�K����׃��,Ƚ��M�T���������S�������C]������/ϼ�@�͆X�ELc&��ѫ��j������+_>�J@��Dl�2���8�e�ῗ"���l��X*��Y[�iH/�6J�� &�"�=�N=8�����F���A�G���z���NQ�E2�<���qm���'�@u-�1������h�尅p#V+�J\��"s���>�i'��X�G7ɉʊ�'��C�jj�w�D��T�������զ�m��� i�������f�6!9�;�^��m)UW���>��B��eEV��� �7��p���:/��[R�L���4��*��֗�W�ĮB~��Y�.N���k��5(́���,��JV9;�F�=U����Mи^��(���.�N�@��h�1B�4�.�GQ���1�}I@;�������6տǴ""V�tP 5�R��;V�^\�Kkp[hd�R�~T�H���Rᅕ���q�T�`d8����@Ʀ�'\% �~U$����y��!)�9H�쵊2a���85���;��7�z���S��Y���[Mi{��Ml��5�\��sQT<�ǘ�a̡M>�E��-%eP̠��7����%d��I�_~Q���0���u�\�������))� oM��G�8�+��$�L�m��1�l���f��it�*�ݰ6]���ͣ8��-Z6����B���9pZ;��,��W4G~U�f�Pj�1*2�:�C��Ir0�̱a��w�ё�d�4a�Z�&#�[����~V�(d�.ٿ�P�ps7���R�:��K�P[*���J�0jfC�i�{����z�ot���`��Xm|�B oe�(R��V&�����& ����ܷ@�R��@�N�I�o��mW���A=y����R���^� o\fy�3�f�u�� 5%h���m��dgu%��z�a fx��y)/g�n��q�j��Z���v^cx��\�1�k�3TO�z0o��j�93���_3�0�����Ɓ�VOͶ�����x���2���* ���jb���%m���đ�����q'��[�~�bP��T'� �464�����D.��΅:���%�|u������Ʉh�a���\g^ۇo�|"�� 8 ��a���u��e)��ء���T)WJ��� �P���z�ks�P��-��^m�*��S��7`-G2�[D/�䎺P����?�����F�Pr猔�L�F �����i]r4�օH���π�LUȪY�'�V�h\�0l�t+_�6� ���.C��U��ʼ�6RN_�����S���u�lI5�J����H�P���hnUa���� �4���,��zsA�rbu) �;�FAnM}L;*� L��%Z4�����c~_H��ö�V�fE6 u~�X���qR����I/�A�ҿ݅9J�s`�+1���K����k�:�۲�n `� �͌�����fY=�Xq��yd\�4�#�2)��BQ���6 �D�p..k�M/�0�o�S�Ɏ�[Y�4$�,<���2r{H��&J�mR��B�X�ȿ��d�㗕.Pw.P���Τ�ၟ��h�hy��\����"-,^��I(���R�f�a<r6)��R�n����U������!�2�Z�e��o%-s���%Z��,�E�r���4R�j �E�rςlDu��r]U��e��h��~s���Wvg�,#�<�#]5��gMz��u��8�|6gf�̷����:J4r�H�g'�Ď|W�e��V��[g%�r���n�� +�����s0�V�hkYg��/F���*/��ߛ�ߑ�x��"�%BL�dA� �3R� ��Ɓy_��Ĉ?^/�U�!(8��x���5"=��{ 7SU�}S�MX_?�&�<h͵{���u�l*�N=Qr��g|�Dp������&��Z������3�At�^�tYDr!F�������x?�7��>�9�Po*�bOމ'$M���u���S��ə���fa��[����j�8?��Z�Px���X��M����a�yq�Z{x�ңw�aa�q�D�\���"�Iw���f�goɂז#�v��� ���.HX ���XP_L�s�{n�0�4�R�Q��,��������-V�����}s��Z�������?�����q�4�q�Su ��Ӛ�E!$'V��}��>��njw8��a�b��C�ْ��#p�闁V�sl.�U��Y���yp��0� 7}�L�4Wإ��������������ߑ'�L�z�wBDT��❚�(�Z3��`�����I�:i�Zs����7���-���l��Wݖ̋�{0YO�Ƨld�y#�-��N\>�d������{�JS���a���fuIr���K����?�������,�͏�����ϓ�?4<8�z��n���w'yzx����Y �<fO�^�� kﱽ���� �6�ȓ��F:{�>JtU���8g��q�U~<��U�m��h@�i�F ������&Mr_�H�ׇ�8<2�COY7Q�T�MN�"��>#.��Z��@?��|�T�m���[=V�����Yϴ�}��W#lTԅ��j�5v���6�4�k��9�q%f�.<�����X�4�(�3�:*B[жjE�FA����?{gq��e�� �0�[�Ok���FM�K��P���(e@���� `l���1�]�oҼ�P�w��Zrۧ�ڨfϧ�j��
Static task
static1
Behavioral task
behavioral1
Sample
c23119570f0c74bae57f5f97e29553d17f5e5210eeabdc4f10dca8e7fae2c2f5.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c23119570f0c74bae57f5f97e29553d17f5e5210eeabdc4f10dca8e7fae2c2f5.exe
Resource
win10v2004-20230915-en
General
-
Target
c23119570f0c74bae57f5f97e29553d17f5e5210eeabdc4f10dca8e7fae2c2f5
-
Size
12.4MB
-
MD5
0f7352e176bdf502e1aa99cff213893f
-
SHA1
62d4d7095e41465e7ab6eaa42832834f598b5bd1
-
SHA256
c23119570f0c74bae57f5f97e29553d17f5e5210eeabdc4f10dca8e7fae2c2f5
-
SHA512
66b26c5ade1fdbca8a5257bacf74b6be425e2809ae70ec87e8eb2830350c19b20df1fd170b8822eb5633ab0ffdd6ab34a025a6cb0a1b7a2bc901ab9087e4888e
-
SSDEEP
393216:8ai9FQB/Vr4U6s/uzJNd4dj1abyBiCXF09PG:Z0eBN8UzoDd4dHXF7
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c23119570f0c74bae57f5f97e29553d17f5e5210eeabdc4f10dca8e7fae2c2f5
Files
-
c23119570f0c74bae57f5f97e29553d17f5e5210eeabdc4f10dca8e7fae2c2f5.exe windows x86
410d3e0240bfbc6287d4174111f86a84
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSACleanup
socket
inet_ntoa
setsockopt
ntohs
recvfrom
ioctlsocket
htons
WSAStartup
__WSAFDIsSet
select
accept
listen
bind
closesocket
WSAGetLastError
recv
sendto
send
inet_addr
gethostbyname
gethostname
connect
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
winmm
timeGetTime
waveOutSetVolume
mciSendStringW
comctl32
ImageList_ReplaceIcon
ImageList_Destroy
ImageList_Remove
ImageList_SetDragCursorImage
ImageList_BeginDrag
ImageList_DragEnter
ImageList_DragLeave
ImageList_EndDrag
ImageList_DragMove
InitCommonControlsEx
ImageList_Create
mpr
WNetUseConnectionW
WNetCancelConnection2W
WNetGetConnectionW
WNetAddConnection2W
wininet
InternetQueryDataAvailable
InternetCloseHandle
InternetOpenW
InternetSetOptionW
InternetCrackUrlW
HttpQueryInfoW
InternetQueryOptionW
HttpOpenRequestW
HttpSendRequestW
FtpOpenFileW
FtpGetFileSize
InternetOpenUrlW
InternetReadFile
InternetConnectW
psapi
GetProcessMemoryInfo
iphlpapi
IcmpCreateFile
IcmpCloseHandle
IcmpSendEcho
userenv
DestroyEnvironmentBlock
UnloadUserProfile
CreateEnvironmentBlock
LoadUserProfileW
uxtheme
IsThemeActive
kernel32
CreateThread
WaitForSingleObject
HeapAlloc
GetProcessHeap
HeapFree
Sleep
GetCurrentThreadId
MultiByteToWideChar
MulDiv
DuplicateHandle
IsWow64Process
GetSystemInfo
FreeLibrary
LoadLibraryA
GetProcAddress
SetErrorMode
GetModuleFileNameW
WideCharToMultiByte
lstrcpyW
lstrlenW
GetModuleHandleW
QueryPerformanceCounter
VirtualFreeEx
OpenProcess
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
CreateFileW
SetFilePointerEx
SetEndOfFile
ReadFile
WriteFile
FlushFileBuffers
TerminateProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetFileTime
GetFileAttributesW
FindFirstFileW
SetCurrentDirectoryW
GetLongPathNameW
GetShortPathNameW
DeleteFileW
FindNextFileW
CopyFileExW
MoveFileW
CreateDirectoryW
RemoveDirectoryW
SetSystemPowerState
QueryPerformanceFrequency
LockResource
SizeofResource
OutputDebugStringW
GetTempPathW
GetTempFileNameW
DeviceIoControl
GetLocalTime
CompareStringW
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
GetStdHandle
CreatePipe
InterlockedExchange
TerminateThread
LoadLibraryExW
CopyFileW
VirtualFree
FormatMessageW
GetExitCodeProcess
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileSectionW
WritePrivateProfileSectionW
GetPrivateProfileSectionNamesW
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetDriveTypeW
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
GetVolumeInformationW
SetVolumeLabelW
CreateHardLinkW
SetFileAttributesW
CreateEventW
SetEvent
GetEnvironmentVariableW
SetEnvironmentVariableW
GlobalLock
GlobalUnlock
GlobalAlloc
GetFileSize
GlobalFree
GlobalMemoryStatusEx
Beep
GetSystemDirectoryW
HeapReAlloc
HeapSize
GetComputerNameW
GetWindowsDirectoryW
GetCurrentProcessId
GetProcessIoCounters
CreateProcessW
GetProcessId
SetPriorityClass
LoadLibraryW
VirtualAlloc
IsDebuggerPresent
GetCurrentDirectoryW
lstrcmpiW
DecodePointer
GetLastError
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InterlockedDecrement
InterlockedIncrement
GetCurrentThread
CloseHandle
GetFullPathNameW
EncodePointer
ExitProcess
GetModuleHandleExW
ExitThread
GetSystemTimeAsFileTime
ResumeThread
GetCommandLineW
IsProcessorFeaturePresent
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetStringTypeW
SetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
RtlUnwind
ReadConsoleW
GetTimeZoneInformation
GetDateFormatW
GetTimeFormatW
LCMapStringW
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteConsoleW
FindClose
SetEnvironmentVariableA
GetVersionExW
VirtualQuery
GetSystemTimeAsFileTime
GetModuleHandleA
CreateEventA
GetModuleFileNameW
LoadLibraryA
TerminateProcess
GetCurrentProcess
CreateToolhelp32Snapshot
Thread32First
GetCurrentProcessId
GetCurrentThreadId
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
WriteProcessMemory
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualFree
GetProcessAffinityMask
SetProcessAffinityMask
GetCurrentThread
SetThreadAffinityMask
Sleep
FreeLibrary
GetTickCount
SystemTimeToFileTime
FileTimeToSystemTime
GlobalFree
LocalAlloc
LocalFree
GetProcAddress
ExitProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleW
LoadResource
MultiByteToWideChar
FindResourceExW
FindResourceExA
WideCharToMultiByte
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
CreateFileW
LoadLibraryW
GetLastError
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetCommandLineA
RaiseException
RtlUnwind
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
HeapReAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
WriteFile
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
SetStdHandle
user32
AdjustWindowRectEx
CopyImage
SetWindowPos
GetCursorInfo
RegisterHotKey
ClientToScreen
GetKeyboardLayoutNameW
IsCharAlphaW
IsCharAlphaNumericW
IsCharLowerW
IsCharUpperW
GetMenuStringW
GetSubMenu
GetCaretPos
IsZoomed
MonitorFromPoint
GetMonitorInfoW
SetWindowLongW
SetLayeredWindowAttributes
FlashWindow
GetClassLongW
TranslateAcceleratorW
IsDialogMessageW
GetSysColor
InflateRect
DrawFocusRect
DrawTextW
FrameRect
DrawFrameControl
FillRect
PtInRect
DestroyAcceleratorTable
CreateAcceleratorTableW
SetCursor
GetWindowDC
GetSystemMetrics
GetActiveWindow
CharNextW
wsprintfW
RedrawWindow
DrawMenuBar
DestroyMenu
SetMenu
GetWindowTextLengthW
CreateMenu
IsDlgButtonChecked
DefDlgProcW
CallWindowProcW
ReleaseCapture
SetCapture
CreateIconFromResourceEx
mouse_event
ExitWindowsEx
SetActiveWindow
FindWindowExW
EnumThreadWindows
SetMenuDefaultItem
InsertMenuItemW
IsMenu
TrackPopupMenuEx
GetCursorPos
DeleteMenu
SetRect
GetMenuItemID
GetMenuItemCount
SetMenuItemInfoW
GetMenuItemInfoW
SetForegroundWindow
IsIconic
FindWindowW
MonitorFromRect
keybd_event
SendInput
GetAsyncKeyState
SetKeyboardState
GetKeyboardState
GetKeyState
VkKeyScanW
DialogBoxParamW
MessageBeep
EndDialog
SendDlgItemMessageW
GetDlgItem
SetWindowTextW
CopyRect
ReleaseDC
GetDC
EndPaint
BeginPaint
GetClientRect
GetMenu
DestroyWindow
EnumWindows
GetDesktopWindow
IsWindow
IsWindowEnabled
IsWindowVisible
EnableWindow
InvalidateRect
GetWindowLongW
GetWindowThreadProcessId
AttachThreadInput
GetFocus
GetWindowTextW
ScreenToClient
SendMessageTimeoutW
EnumChildWindows
CharUpperBuffW
GetParent
GetDlgCtrlID
SendMessageW
MapVirtualKeyW
PostMessageW
GetWindowRect
SetUserObjectSecurity
CloseDesktop
CloseWindowStation
OpenDesktopW
SetProcessWindowStation
GetProcessWindowStation
OpenWindowStationW
GetUserObjectSecurity
MessageBoxW
DefWindowProcW
SetClipboardData
EmptyClipboard
CountClipboardFormats
CloseClipboard
GetClipboardData
IsClipboardFormatAvailable
OpenClipboard
BlockInput
GetMessageW
LockWindowUpdate
DispatchMessageW
TranslateMessage
PeekMessageW
UnregisterHotKey
CheckMenuRadioItem
CharLowerBuffW
MoveWindow
SetFocus
PostQuitMessage
KillTimer
CreatePopupMenu
RegisterWindowMessageW
SetTimer
ShowWindow
CreateWindowExW
RegisterClassExW
LoadIconW
LoadCursorW
GetSysColorBrush
GetForegroundWindow
MessageBoxA
DestroyIcon
SystemParametersInfoW
LoadImageW
GetClassNameW
GetProcessWindowStation
GetUserObjectInformationW
CharUpperBuffW
MessageBoxW
gdi32
StrokePath
DeleteObject
GetTextExtentPoint32W
ExtCreatePen
GetDeviceCaps
EndPath
SetPixel
CloseFigure
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
StretchBlt
GetDIBits
LineTo
AngleArc
MoveToEx
Ellipse
DeleteDC
GetPixel
CreateDCW
GetStockObject
GetTextFaceW
CreateFontW
SetTextColor
PolyDraw
BeginPath
Rectangle
SetViewportOrgEx
GetObjectW
SetBkMode
RoundRect
SetBkColor
CreatePen
CreateSolidBrush
StrokeAndFillPath
comdlg32
GetOpenFileNameW
GetSaveFileNameW
advapi32
GetAce
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
RegSetValueExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegConnectRegistryW
InitializeSecurityDescriptor
InitializeAcl
AdjustTokenPrivileges
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueW
DuplicateTokenEx
CreateProcessAsUserW
CreateProcessWithLogonW
GetLengthSid
CopySid
LogonUserW
AllocateAndInitializeSid
CheckTokenMembership
RegCreateKeyExW
FreeSid
GetTokenInformation
GetSecurityDescriptorDacl
GetAclInformation
AddAce
SetSecurityDescriptorDacl
GetUserNameW
InitiateSystemShutdownExW
shell32
DragQueryPoint
ShellExecuteExW
DragQueryFileW
SHEmptyRecycleBinW
SHGetPathFromIDListW
SHBrowseForFolderW
SHCreateShellItem
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHGetFolderPathW
SHFileOperationW
ExtractIconExW
Shell_NotifyIconW
ShellExecuteW
DragFinish
ole32
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
ProgIDFromCLSID
CLSIDFromProgID
OleSetMenuDescriptor
MkParseDisplayName
OleSetContainedObject
CoCreateInstance
IIDFromString
StringFromGUID2
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
CoInitialize
CoUninitialize
GetRunningObjectTable
CoGetInstanceFromFile
CoGetObject
CoSetProxyBlanket
CoCreateInstanceEx
CoInitializeSecurity
oleaut32
LoadTypeLibEx
VariantCopyInd
SysReAllocString
SysFreeString
SafeArrayDestroyDescriptor
SafeArrayDestroyData
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayAllocData
SafeArrayAllocDescriptorEx
SafeArrayCreateVector
RegisterTypeLi
CreateStdDispatch
DispCallFunc
VariantChangeType
SysStringLen
VariantTimeToSystemTime
VarR8FromDec
SafeArrayGetVartype
VariantCopy
VariantClear
OleLoadPicture
QueryPathOfRegTypeLi
RegisterTypeLibForUser
UnRegisterTypeLibForUser
UnRegisterTypeLi
CreateDispTypeInfo
SysAllocString
VariantInit
wtsapi32
WTSSendMessageW
Exports
Exports
Sections
.text Size: 568KB - Virtual size: 568KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 192KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sni0 Size: 4.5MB - Virtual size: 4.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sni1 Size: 7.1MB - Virtual size: 7.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l1 Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE