If the version of AutoIt is v3.2.5.1 or lower, then the decompiler is located at C:\Program Files\AutoIt3\Extras\Exe2Aut\Exe2Aut.exe by default. The directory may be different if you performed a custom installation. For all other newer versions, the decompiler has been removed.
This includes decompiling scripts users have posted in binary-only form. Under no circumstances are scripts to be decompiled unless the author grants their explicit permission and the script can be decompiled with the official decompiler.
No. It is theoretically possible to modify compiled scripts in a way that it still works but a decompiler fails to extract the source. However, tools that are capable of doing this violate the reverse engineering clause of the AutoIt license (the very same clause the 3rd-party decompiler violates).
As you all asume i lost the source code , now because yet again i have lots and lots of free time i whant to re-learn autoit and i would like to add some more features to my program but i don't have the source anymore . I know for sure that i didn't set any password ( too newb to do that ) but when i put the exe file into the decompiler this is what i get :
I can guarantee that it is my script , and also Jex help me with some features , i think u all know Jex he was/is a great help in autoit forum . I don't need someone else source , i just whant the source to my work )
Depending on the version of AutoIt you used, it CAN'T be decompiled for the decompiler only support scripts compiled with version 3.2.5.1 or older. If by some chance you posted your old code in the forum when you were working on it, that will be your only option to find it. I think I can safely say before you ask, the answer will be no if you ask for someone from the staff to decompile it for you.
During the analysis of an AutoIT compiled malware sample, a message box popped up indicating the possible execution of the sample when using Exe2Aut decompiler. This triggered my interest in how this decompiler works and how AutoIt scripts are compiled in the first place. In this writeup, I will explain how the two most common AutoIT decompilers (Exe2Aut and myAut2Exe) work and how they can be tricked into decompiling a decoy script instead of the real script.
Unlike Exe2Aut, MyAut2Exe extracts the bytecode resource and unpacks and decodes it without the help of the embedded interpreter -- making it a full static decompiler because of this, there is no risk of accidentally executing anything.
MyAut2Exe is more advanced than Exe2Aut. It supports multiple versions of AutoIT and AutoHotkey compiled scripts. Therefore, it has more settings to adjust the extraction and unpacking of the compiled script code. To take the hassle out of correctly configuring it, it comes with a feature called "automate". This brute forces the decompiler settings until a script is successfully decompiled. When the "automate" functionality is used, MyAut2Exe parses the executable for AutoIT magic bytecode signatures. Once found, it extracts and decompiles the code. As the parsing and decompilation stops on the first occurrence of the magic bytecode sequence, MyAut2Exe can be easily tricked into decompiling a decoy script as long as it's placed at a lower offset than the real compiled script resource.
What we can learn from this POC is that we shouldn't always blindly trust the output of our tools. Reverse engineers should be aware of how their tools work and how they can possibly be tricked into returning a misleading output. While the tricks presented here might mislead two decompilers, they don't affect the results of a dynamic analysis in a sandbox.
A while ago I posted a short description on how to decompile 64-bit autoit scripts. Someone pinged me asking on how to actually do it, so I thought it will be handy to simply write a script to do the dirty work for us.
I am new to reverse engineering and I'm wanting to learn more about decompiling PE files for forensics. What is everyone's go to tools? Currently I am in the process of trying to decompile a AutoIT script in which I found a older decompiler but is not working.
After unpacking the UPX (when needed) and filtering the AutoIt executables, I used myAut2Exe, an open-source AutoIt decompiler. One nice thing about myAut2Exe is that you can run it with command-line arguments from a script. I found a number of common AutoIt scripts used to pack or drop different malwares and a couple of full-blown malware written entirely in AutoIt.
The purpose of approve.pdf.exe is to execute anti-analysis detection, obtain persistence, and to drop/execute NanoCore RAT. Using AutoIt decompiler, we can now start to extract and analyze the .au3 file or the AutoIt source code from approve.pdf.exe. As we can see, the malicious script was obfuscated.
LodaRAT is written in AutoIt, a well known scripting language typically used to automate administrative tasks in Windows. AutoIt scripts can be compiled into standalone binaries, allowing them to be executed on a Windows machine whether or not AutoIt is installed on the host. The original source code can be easily retrieved from these compiled binaries by using an AutoIt decompiler.
I'm thinking about adding anti-regex obfuscations after I read your article, this looks like a weak spot of all autoit deobfuscators I've seen. Currently I'm upgrading the parser to handle object method calls (like COM/WMI etc.) and access to object properties (a few days).
Why is it forbidden to ask about decompilation and decompilers for AutoIt? The answer is simple.It's a known weakness of the AutoIt system that the script source code is stored inthe executable file. They try as hard as possible to keep this weakness hidden, to sweep it under the rug.As a professional I find this practice very dishonest towards the AutoIt community.
The first step is open the my_secret_autoit.exe in Resource Hacker. Then we navigate to RCData SCRIPT, and right click to Save Resource to a BIN file. Make sure the extension is .au3.
As a recommendation to avoid infecting your computer with viruses, Trojans, and other similar software, when using any decompiler, try to use a virtual machine or a computer that is immune to viruses and other harmful software.
To understand what an EXE2AUT decompiler does, one must first comprehend what a decompiler is. A decompiler is the inverse of a compiler. While a compiler transforms source code written in a high-level programming language into machine code or bytecode, a decompiler attempts to reverse this process, converting executable (binary) files back to a higher-level source code that can be read and understood by humans.
An EXE2AUT decompiler is tailored for AutoIt scripts. When a script written in AutoIt is compiled into an executable file, the source code is translated into a format that can be executed by a computer but is not easily readable by humans. If the original script is lost or needs to be analyzed or modified, the EXE2AUT decompiler can be used to revert the .exe file back into the script code (.aut file). This process is not always perfect and may not result in the original source code, especially if the executable has been obfuscated or packed.
An EXE2AUT decompiler serves a niche but vital role in the world of AutoIt scripting. It embodies the broader category of decompilers that serve as invaluable tools for software reverse engineering. While it can be a powerful tool for developers, it must be used responsibly and ethically within the bounds of the law. As with any tool that can be used to reverse-engineer software, it should be used with respect for software copyright and intellectual property rights.
If I posted any code, assume that code was written using the latest release version unless stated otherwise. Also, if it doesn't work on XP I can't help with that because I don't have access to XP, and I'm not going to. Give a programmer the correct code and he can do his work for a day. Teach a programmer to debug and he can do his work for a lifetime - by Chirag Gude I hereby grant any person the right to use any code I post, that I am the original author of, on the autoitscript.com forums, unless I've specifically stated otherwise in the code or the thread post. If you do use my code all I ask, as a courtesy, is to make note of where you got it from.
Feb 27, 2018 - To decompile AutoIT scripts compiled as 64-bit exes simply extract the appended script from the 64-bit file and attach it to 32-bit AutoIt exe stub. Web presentation of the retargetable decompiler. Try Out Decompilation In Your Browser. The online decompilation service is disabled. Since RetDec is open source, you can build and run it directly on your PC (visit our GitHub repository).
aa06259810