Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family AutoitInject
This threat is a Trojan, part of the AutoitInject family, designed to inject malicious code into other running processes. It leverages numerous legitimate Windows utilities (LOLBins) like PowerShell, Mshta, and Rundll32 to execute commands, establish persistence via scheduled tasks, and download additional payloads.
Relevant strings associated with this threat: - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT) No specific strings found for this threat
df9bee1b34188c7b8eb31a4d8a785c7c87f2d284f2c0ba5308bf75a5dbae5ff1f9f42e2c9d1ba70bbf9ba7addb14cdb312e1a98fc5476a692ac72928c155bad2951a2c3e7d9643dba8a84bcdddc557055437277b24922f2e3f5945e713955a78cd76ec20ed38677eadb7846c18b12577a9c00f9f10423552437e680b41dd5db30a191015e582ea155d70d7c8507798c8744d4d8cf8670e548e9a74738fc92a79Immediately isolate the affected host from the network. Run a full antivirus scan to quarantine and remove all related components. Manually inspect and remove suspicious scheduled tasks, startup entries, and registry keys. Change all user and administrator passwords for the system as data theft is likely.