Report - AutoHotkey_1.1.37.02_setup.exe

Generic Malware Malicious Library UPX Malicious Packer PE File PE32 OS Processor Check PE64 CHM Format
ScreenShot
Created 2024.10.14 10:42 Machine s1_win7_x6403
Filename AutoHotkey_1.1.37.02_setup.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
1
Behavior Score
2.4
ZERO API
VT API (file) 8 detected (Unsafe, Malicious, BuckBit, kpuuxe, Static AI, Suspicious SFX, Disco, susgen)
md5 c2e8062052bb2b25d4951b78ba9a5e73
sha256 49a48e879f7480238d2fe17520ac19afe83685aac0b886719f9e1eac818b75cc
ssdeep 98304:m7EROaI2yEbVidvdahm6QAxuE4iLqmzLdtte96g:m4FyMVq4og4iLqmNqMg
imphash fa4d5c869351014d1ce952f2833a7558
impfuzzy 12:SD5B+5QGu4Gv+GXRzGy5yJqhR9F38dPkO4qgOsZB4lJZVljR:SVB+5T0v+GdMqhR9F30kOxgO8B4X9jR
  Network IP location

Signature (7cnts)

Level Description
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice File has been identified by 8 AntiVirus engines on VirusTotal as malicious
info Checks amount of memory in system
info The executable uses a known packer

Rules (13cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info chm_file_format chm file format binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info IsPE64 (no description) binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

USER32.dll
 0x4070d0 MessageBoxA
SHELL32.dll
 0x4070c8 ShellExecuteExW
MSVCRT.dll
 0x407064 _controlfp
 0x407068 _except_handler3
 0x40706c __set_app_type
 0x407070 __p__fmode
 0x407074 __p__commode
 0x407078 _adjust_fdiv
 0x40707c __setusermatherr
 0x407080 _initterm
 0x407084 __getmainargs
 0x407088 _acmdln
 0x40708c exit
 0x407090 _XcptFilter
 0x407094 _exit
 0x407098 memcpy
 0x40709c free
 0x4070a0 malloc
 0x4070a4 wcscmp
 0x4070a8 memcmp
 0x4070ac memmove
 0x4070b0 strlen
 0x4070b4 wcslen
 0x4070b8 wcscpy
 0x4070bc wcscat
 0x4070c0 memset
KERNEL32.dll
 0x407000 GetStartupInfoA
 0x407004 GetModuleHandleA
 0x407008 SetFilePointer
 0x40700c WriteFile
 0x407010 ReadFile
 0x407014 CreateFileW
 0x407018 DeleteFileW
 0x40701c FindNextFileW
 0x407020 RemoveDirectoryW
 0x407024 FindFirstFileW
 0x407028 FindClose
 0x40702c GetModuleFileNameW
 0x407030 GetCommandLineW
 0x407034 GetTempPathW
 0x407038 GetCurrentThreadId
 0x40703c GetTickCount
 0x407040 GetCurrentProcessId
 0x407044 CreateDirectoryW
 0x407048 GetLastError
 0x40704c SetFileTime
 0x407050 SetFileAttributesW
 0x407054 CreateProcessW
 0x407058 CloseHandle
 0x40705c WaitForSingleObject

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure