Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 11:08
Behavioral task
behavioral1
Sample
AutoDox.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
General
-
Target
AutoDox.exe
-
Size
14.5MB
-
MD5
3c4c29f2d567b20a7a95d64fb362c887
-
SHA1
e5e0437e756644dfddd7fa240f0453e81ba0ebcf
-
SHA256
4a057afcc17d079c4687fced9b5bf135b9e3502252846c1bd4d26c4fd8807940
-
SHA512
02621ce8dc804fedc5a3f0b6494f94fd95c7174e3a82101f2ff1d5476d14432a376c371f325c86f1b8f31d9fd0f6585765c625179edfa0316153c921ae854bd5
-
SSDEEP
393216:6xfdQuslN/m3pqq9AJ4ZoWOv+9fPV4aHJCI5ctyIk10:6RdQu4KhS4ZorvS3bCI50yIk10
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2368 AutoDox.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2368 2856 AutoDox.exe 28 PID 2856 wrote to memory of 2368 2856 AutoDox.exe 28 PID 2856 wrote to memory of 2368 2856 AutoDox.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989