{"id":2929,"date":"2024-09-25T20:30:14","date_gmt":"2024-09-25T20:30:14","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2929"},"modified":"2025-07-29T06:46:27","modified_gmt":"2025-07-29T06:46:27","slug":"autoit-trojan-the-swiss-army-knife-of-malware","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/autoit-trojan-the-swiss-army-knife-of-malware\/","title":{"rendered":"AutoIT Trojan \u2013 the swiss army knife of malware"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"424\" height=\"318\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4970062870_c714ddf34c_b.webp\" alt=\"the swiss army knife of malware\" class=\"wp-image-2941\"\/><\/figure>\n<\/div>\n\n\n<p>In its legitimate form, AutoIT is an incredibly handy automation language used for scripting Windows-based applications. In its malicious form, it is used to create malware with a variety of functionality. Once an AutoIT trojan has infected a victim&#8217;s PC, it can alter default browser settings and perform ad-injection, copy itself to USB memory sticks, delete anti-virus software, keep track of browsing activities, add unwanted extensions\/plugins, and redirect users to unknown or malicious websites.<br><br>All in all, AutoIT trojans are a nasty \u2018jack-of-all-trades\u2019 malware. Variants have been used to download further malicious software on the infected PC and even grant attackers remote access \u2013 effectively operating as a back door.<br><br><strong>Distribution<\/strong><br><br>Just as AutoIT trojans have various functionalities, this multi-dexterity extends to distribution techniques.<br><br>The latest variant (which we\u2019ll analyse today) has been distributed by spoofed e-mail messages, malicious links in Yahoo Messenger chats, or via malicious Java Script embedded on websites which allow remote code execution.&nbsp;<br><br>As if that weren\u2019t bad enough, AutoIT also has the ability to copy itself to external or removable drives as a file called \u2018system.exe\u2019.<br><br>When successfully executed, it checks the currently running processes for the following programs:<br><br>\uf0a7&nbsp;&nbsp; &nbsp;Microsoft Management Console (mmc.exe)<br><br>\uf0a7&nbsp;&nbsp; &nbsp;Microsoft Restore Console (rstrui.exe)<br><br>\uf0a7&nbsp;&nbsp; &nbsp;Registry Editor (regedit.exe)<br><br>\uf0a7&nbsp;&nbsp; &nbsp;System Configuration utility (msconfig.exe)<br><br>\uf0a7&nbsp;&nbsp; &nbsp;Task Manager (taskmgr.exe)<br><br>If any of these programs are found running, the Trojan restarts the computer.<br><br>Further, if any of the following processes are discovered, they will be terminated:<br><br>\uf0a7&nbsp;&nbsp; &nbsp;cmd.exe<br><br>\uf0a7&nbsp;&nbsp; &nbsp;handydriver.exe<br><br>\uf0a7&nbsp;&nbsp; &nbsp;kerneldrive.exe<br><br>\uf0a7&nbsp;&nbsp; &nbsp;nod32krn.exe<br><br>\uf0a7&nbsp;&nbsp; &nbsp;nod32kui.exe<br><br>\uf0a7&nbsp;&nbsp; &nbsp;winsystem.exe<br><br>\uf0a7&nbsp;&nbsp; &nbsp;Wscript.exe<br><br><strong>File Details<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>File Type<\/strong><\/td><td>Portable Executable (.exe) file<\/td><\/tr><tr><td><strong>Md5 hash<\/strong><\/td><td>ec721f6f111aae46f2ede8f70e435cc4<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Static analysis\u00a0<\/strong><br><br>The sample we\u2019re analysing has an icon showing it as a document, but when we view its header it was found to be a proper .exe sample:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"610\" height=\"339\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-8-1.webp\" alt=\"\" class=\"wp-image-2931\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"865\" height=\"327\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-8-1.webp\" alt=\"\" class=\"wp-image-2932\"\/><\/figure>\n\n\n\n<p>Static analysis uncovered the following suspicious API calls, all of which indicate malicious properties:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"587\" height=\"620\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-7-1.webp\" alt=\"\" class=\"wp-image-2933\"\/><\/figure>\n\n\n\n<p>After opening the file with winrar, we found it was in fact a combination of multiple file types including document, image, and DAT:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"519\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4-7-1-1024x519.webp\" alt=\"\" class=\"wp-image-2935\"\/><\/figure>\n\n\n\n<p>Below are more suspicious characteristics we discovered:<br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"597\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5-6-1-1024x597.webp\" alt=\"\" class=\"wp-image-2936\" style=\"width:840px;height:auto\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"619\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-6-1-1024x619.webp\" alt=\"\" class=\"wp-image-2937\"\/><\/figure>\n\n\n\n<p><strong><br>Dynamic analysis\u00a0<\/strong><br><br>After executing the sample in a dedicated malware analysis environment, we found AutoIT initiating various child processes including \u2018vwl.exe\u2019 and \u2018RegSvcs.exe\u2019:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"962\" height=\"685\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/7-5-1.webp\" alt=\"\" class=\"wp-image-2938\"\/><\/figure>\n\n\n\n<p>Within a few minutes, all processes except Regsvcs.exe were killed. This process maintains a persistent connection to the IP address &#8220;213.183.40.3&#8221; over port &#8220;2001&#8221;:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1002\" height=\"433\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/8-4-1.webp\" alt=\"\" class=\"wp-image-2939\"\/><\/figure>\n\n\n\n<p>Trojans commonly access this port to gain backdoor entry into victim PCs:<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"966\" height=\"471\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/9-3-1.webp\" alt=\"\" class=\"wp-image-2940\"\/><\/figure>\n\n\n\n<p><br>Throughout the infection cycle, the following files were dropped:<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\but.xl<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\daa.dat<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\dal.ico<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\dhu.dat<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\ebf.mp4<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\ebn.mp3<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\evk.jpg<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\evk.mp3<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\fip.mp4<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\ftr.dat<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\ghk.ico<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\ghm.ppt<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\gib.dat<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\glt.icm<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\gph.ppt<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\ini<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\ixi=xob<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\jcj.bmp<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\jjb.docx<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\jpi.txt<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\jrj.mp3<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\kma.icm<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\lci.docx<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\mnb.dat<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\mto.docx<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\ngb.mp4<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\omu.bmp<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\ooc.icm<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\pjq.pdf<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\qbc.txt<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\qom.jpg<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\rlc.ppt<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\sdo.mp4<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\sug.txt<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\tnl.icm<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\tte.txt<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\twl.ppt<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\ukj.mp3<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\uko.txt<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\unm.mp3<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\ute.docx<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\vwl.exe (md5: 71d8f6d5dc35517275bc38ebcc815f9f)<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\wux.bmp<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\wxl.pdf<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\xxh.ppt<br><br>The following folders were created:<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Roaming\\remcos<br><br>And the following registries were added in order to maintain persistence:<br><br>\u2022\u00a0\u00a0 \u00a0HKU\\S-1-5-21-3006570754-2424674848-4088610848-1000\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\RunMRU\\f: &#8220;C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\\\1&#8221;<br><br>\u2022\u00a0\u00a0 \u00a0HKU\\S-1-5-21-3006570754-2424674848-4088610848-1000\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\WindowsUpdate: &#8220;C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\vwl.exe C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\IXI_XO~1&#8221;<br><br><strong>Command and control<\/strong><br><br>External connection to \u201c213.183.40.3:2001\u201d.<br><br><strong>Indicators of compromise<\/strong><br><br>Malware executable: ec721f6f111aae46f2ede8f70e435cc4<br><br>Vwl.exe: 71d8f6d5dc35517275bc38ebcc815f9f<br><br>IP address: 213.183.40.3<br><br>Registry values added:<br><br>\u2022\u00a0\u00a0 \u00a0HKU\\S-1-5-21-3006570754-2424674848-4088610848-1000\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\RunMRU\\f: &#8220;C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\\\1&#8221;<br><br>\u2022\u00a0\u00a0 \u00a0HKU\\S-1-5-21-3006570754-2424674848-4088610848-1000\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\WindowsUpdate: &#8220;C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\vwl.exe C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\77923311\\IXI_XO~1&#8221;<br><br><strong>Mitigation\/protection<\/strong><br><br>If you\u2019re unlucky enough to fall victim to AutoIT trojan, the below steps will remove the malware:<br><br>\u2022\u00a0\u00a0 \u00a0Reboot your system into Safe Mode with Networking;<br><br>\u2022\u00a0\u00a0 \u00a0Enter the following registry areas;<br><br>o\u00a0\u00a0 \u00a0[HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\<br><br>o\u00a0\u00a0 \u00a0[HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\<br><br>o\u00a0\u00a0 \u00a0[HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Run\\<br><br>\u2022\u00a0\u00a0 \u00a0Check for the display name &#8220;backgroundcontainer&#8221; and delete it<br><br>\u2022\u00a0\u00a0 \u00a0Go to the location: C:\\Users\\{username}\\AppData\\Local and delete the folder &#8220;uqgtmedia&#8221;\u00a0<br><br>\u2022\u00a0\u00a0 \u00a0Open the file C:\\Windows\\System32\\drivers\\etc\\hosts and remove any suspicious IP or domain belonging to some malware or ransomware<br><br>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In its legitimate form, AutoIT is an incredibly handy automation language used for scripting Windows-based applications. In its malicious form, it is used to create malware with a variety of functionality. Once an AutoIT trojan has infected a victim&rsquo;s PC, it can alter default browser settings and perform ad-injection, copy itself to USB memory sticks, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2941,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2929","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2929","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2929"}],"version-history":[{"count":5,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2929\/revisions"}],"predecessor-version":[{"id":4343,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2929\/revisions\/4343"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2941"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2929"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}