S0129 AutoIt backdoor
AutoIt backdoor is malware that has been used by the actors responsible for the MONSOON campaign. The actors frequently used it in weaponized .pps files exploiting CVE-2014-6352. 1 This malware makes use of the legitimate scripting language for Windows GUI automation with the same name.
| Item | Value | 
|---|---|
| ID | S0129 | 
| Associated Names | |
| Type | MALWARE | 
| Version | 1.1 | 
| Created | 31 May 2017 | 
| Last Modified | 30 March 2020 | 
| Navigation Layer | View In ATT&CK® Navigator | 
Techniques Used
| Domain | ID | Name | Use | 
|---|---|---|---|
| enterprise | T1548 | Abuse Elevation Control Mechanism | - | 
| enterprise | T1548.002 | Bypass User Account Control | AutoIt backdoor attempts to escalate privileges by bypassing User Access Control.1 | 
| enterprise | T1059 | Command and Scripting Interpreter | - | 
| enterprise | T1059.001 | PowerShell | AutoIt backdoor downloads a PowerShell script that decodes to a typical shellcode loader.1 | 
| enterprise | T1132 | Data Encoding | - | 
| enterprise | T1132.001 | Standard Encoding | AutoIt backdoor has sent a C2 response that was base64-encoded.1 | 
| enterprise | T1083 | File and Directory Discovery | AutoIt backdoor is capable of identifying documents on the victim with the following extensions: .doc; .pdf, .csv, .ppt, .docx, .pst, .xls, .xlsx, .pptx, and .jpeg.1 | 
Groups That Use This Software
| ID | Name | References | 
|---|---|---|
| G0040 | Patchwork | 1 | 
| G0064 | APT33 | 2 |