Static task
static1
Behavioral task
behavioral1
Sample
1b3af04b26db52667c7ee87e2956985d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1b3af04b26db52667c7ee87e2956985d.exe
Resource
win10v2004-20231215-en
General
-
Target
1b3af04b26db52667c7ee87e2956985d
-
Size
594KB
-
MD5
1b3af04b26db52667c7ee87e2956985d
-
SHA1
f69533becca989e86031eebd85b9694332ef308f
-
SHA256
e5e5b0f64dd929738e574d796c44e4e417d1f6bbbd61122734a27091a29a0573
-
SHA512
ddd8b272172dea49d4054c92827e9c01eeebbe8d17956dd38906da555f76a5c911e3fd32bbbc050a815f2291b83e044d5f1ec25d2ceafe84f96b9959a228dfe9
-
SSDEEP
12288:J7y339tFutykeePe1rvt1Jee8sriBcY52oQ:JWdTueePe1J1Jee8sWBH52P
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b3af04b26db52667c7ee87e2956985d
Files
-
1b3af04b26db52667c7ee87e2956985d.exe windows:4 windows x86 arch:x86
f205c9d20045158e8d360310398af2b7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
__WSAFDIsSet
recv
send
socket
connect
closesocket
bind
select
accept
htons
sendto
recvfrom
ntohs
WSAGetLastError
ioctlsocket
WSACleanup
inet_addr
gethostbyname
WSAStartup
gethostname
listen
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
winmm
waveOutSetVolume
timeGetTime
mciSendStringA
comctl32
ImageList_EndDrag
ImageList_DragLeave
ImageList_DragMove
ImageList_DragEnter
ImageList_BeginDrag
ImageList_SetDragCursorImage
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
ImageList_Remove
ImageList_Destroy
mpr
WNetUseConnectionA
WNetGetConnectionA
WNetAddConnection2A
WNetCancelConnection2A
kernel32
SetFilePointer
FindClose
LockResource
SizeofResource
MultiByteToWideChar
EnumResourceNamesA
DeleteFileA
FindNextFileA
lstrcmpiA
MoveFileA
OutputDebugStringA
CopyFileA
GetLastError
CreateDirectoryA
RemoveDirectoryA
TerminateProcess
WaitForSingleObject
SetSystemPowerState
SetFileTime
GetFileAttributesA
FindResourceA
FindFirstFileA
LoadResource
GetLocalTime
WideCharToMultiByte
CompareStringA
InterlockedIncrement
InterlockedDecrement
GetTempPathA
GetTempFileNameA
GetExitCodeProcess
VirtualFree
FormatMessageA
GetDriveTypeA
SetErrorMode
GetDiskFreeSpaceA
GetVolumeInformationA
SetVolumeLabelA
DeviceIoControl
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileSectionA
WritePrivateProfileSectionA
SetFileAttributesA
ReadFile
GetShortPathNameA
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
SetProcessWorkingSetSize
GlobalMemoryStatus
Beep
GetFileSize
GetEnvironmentVariableA
SetEnvironmentVariableA
GlobalFree
GlobalLock
GlobalUnlock
GlobalAlloc
GetComputerNameA
GetWindowsDirectoryA
GetSystemDirectoryA
GetCurrentProcessId
CreatePipe
DuplicateHandle
GetStdHandle
CreateProcessA
SetPriorityClass
VirtualAlloc
WriteFile
GetFileType
PeekNamedPipe
SetLastError
LoadLibraryExA
GlobalFindAtomA
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
ResumeThread
GetCommandLineA
GetProcessHeap
GetStartupInfoA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RaiseException
DeleteCriticalSection
CreateFileA
ReadProcessMemory
WriteProcessMemory
MapViewOfFile
CreateFileMappingA
OpenProcess
UnmapViewOfFile
CloseHandle
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleHandleA
GetSystemInfo
GetCurrentProcess
GetVersionExA
GetCurrentThreadId
Sleep
GetCurrentDirectoryA
GetModuleFileNameA
GetFullPathNameA
HeapSize
HeapReAlloc
SetCurrentDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
InitializeCriticalSection
CreateThread
ExitProcess
HeapAlloc
HeapFree
HeapDestroy
HeapCreate
RtlUnwind
GetConsoleCP
GetConsoleMode
SetHandleCount
SetStdHandle
ExitThread
FlushFileBuffers
LCMapStringA
LCMapStringW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
GetPrivateProfileSectionNamesA
CompareStringW
user32
GetSysColor
GetActiveWindow
InflateRect
CharNextA
wsprintfA
DrawFocusRect
RedrawWindow
DrawTextA
FrameRect
DrawFrameControl
FillRect
DrawMenuBar
PtInRect
DestroyMenu
CreateMenu
SetMenu
SetCursor
GetWindowDC
GetWindowTextLengthA
GetSystemMetrics
IsDialogMessageA
SetClassLongA
ReleaseCapture
SetCapture
SubtractRect
OffsetRect
GetClassWord
GetNextDlgTabItem
GetWindow
IsChild
mouse_event
ExitWindowsEx
SetActiveWindow
FindWindowExA
EnumThreadWindows
LoadImageA
CreateIconFromResourceEx
CreateIcon
CheckMenuRadioItem
GetMenuItemID
GetMenuItemCount
SetMenuItemInfoA
GetMenuItemInfoA
SetMenuDefaultItem
InsertMenuItemA
FlashWindow
TrackPopupMenuEx
GetCursorPos
DeleteMenu
SetForegroundWindow
IsIconic
FindWindowA
SystemParametersInfoA
VkKeyScanA
GetAsyncKeyState
SetKeyboardState
EmptyClipboard
GetKeyState
keybd_event
CharUpperA
LoadStringA
DialogBoxParamA
MessageBeep
EndDialog
SendDlgItemMessageA
GetDlgItem
SetWindowTextA
GetMenu
GetClientRect
CopyRect
EndPaint
BeginPaint
DestroyWindow
EnumWindows
GetDesktopWindow
IsWindow
IsWindowEnabled
IsWindowVisible
EnableWindow
ScreenToClient
InvalidateRect
GetWindowLongA
GetWindowThreadProcessId
AttachThreadInput
SendMessageTimeoutA
GetFocus
GetWindowTextA
EnumChildWindows
CharUpperBuffA
GetClassNameA
GetParent
GetDlgCtrlID
SetWindowLongA
IsZoomed
GetCaretPos
GetSubMenu
GetMenuStringA
IsCharLowerA
IsCharAlphaNumericA
IsCharAlphaA
IsCharUpperA
GetDC
WindowFromPoint
IsMenu
SetClipboardData
SendMessageA
MapVirtualKeyA
PostMessageA
GetWindowRect
CreatePopupMenu
MessageBoxA
RegisterWindowMessageA
SetTimer
DestroyIcon
ShowWindow
CreateWindowExA
RegisterClassExA
LoadIconA
LoadCursorA
GetSysColorBrush
GetForegroundWindow
DefWindowProcA
MoveWindow
SetFocus
PostQuitMessage
KillTimer
LockWindowUpdate
CountClipboardFormats
SetWindowPos
CloseClipboard
CopyImage
GetClipboardData
IsClipboardFormatAvailable
OpenClipboard
AdjustWindowRectEx
SetRect
ClientToScreen
RegisterHotKey
ReleaseDC
GetCursor
CharLowerBuffA
GetMessageA
UnregisterHotKey
DispatchMessageA
TranslateMessage
GetKeyboardState
PeekMessageA
GetKeyboardLayoutNameA
gdi32
LineTo
AngleArc
MoveToEx
Ellipse
PolyDraw
BeginPath
GetObjectA
SetBkMode
RoundRect
SetBkColor
CreatePen
CloseFigure
SetPixel
EndPath
StrokePath
StrokeAndFillPath
ExtCreatePen
PolyBezierTo
SetViewportOrgEx
Rectangle
CreateSolidBrush
SetTextColor
CreateFontA
GetDeviceCaps
GetTextFaceA
GetStockObject
CreateDCA
CreateCompatibleBitmap
GetPixel
DeleteDC
GetDIBits
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
GetTextExtentPoint32A
DeleteObject
comdlg32
GetSaveFileNameA
GetOpenFileNameA
advapi32
RegEnumValueA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
GetUserNameA
RegConnectRegistryA
RegEnumKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseServiceHandle
UnlockServiceDatabase
LockServiceDatabase
OpenSCManagerA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
shell32
DragQueryPoint
ShellExecuteExA
DragQueryFileA
SHBrowseForFolderA
SHFileOperationA
SHGetPathFromIDListA
SHGetDesktopFolder
SHGetMalloc
ExtractIconExA
Shell_NotifyIconA
ShellExecuteA
DragFinish
ole32
MkParseDisplayName
OleSetContainedObject
OleSetMenuDescriptor
CoCreateInstance
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
IIDFromString
StringFromIID
CLSIDFromString
OleInitialize
CreateBindCtx
CLSIDFromProgID
CoInitializeSecurity
CoCreateInstanceEx
CoSetProxyBlanket
StringFromCLSID
OleUninitialize
CoTaskMemAlloc
CoTaskMemFree
oleaut32
SafeArrayAllocData
SafeArrayAllocDescriptorEx
SysAllocString
GetActiveObject
LoadRegTypeLi
SafeArrayDestroyDescriptor
OleLoadPicture
SafeArrayUnaccessData
SafeArrayAccessData
VarR4FromDec
VariantTimeToSystemTime
VariantInit
VariantClear
VariantCopy
SafeArrayDestroyData
Sections
.text Size: 399KB - Virtual size: 399KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ