Analysis
-
max time kernel
149s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 11:08
Behavioral task
behavioral1
Sample
AutoDox.exe
Resource
win7-20240221-en
General
-
Target
AutoDox.exe
-
Size
14.5MB
-
MD5
3c4c29f2d567b20a7a95d64fb362c887
-
SHA1
e5e0437e756644dfddd7fa240f0453e81ba0ebcf
-
SHA256
4a057afcc17d079c4687fced9b5bf135b9e3502252846c1bd4d26c4fd8807940
-
SHA512
02621ce8dc804fedc5a3f0b6494f94fd95c7174e3a82101f2ff1d5476d14432a376c371f325c86f1b8f31d9fd0f6585765c625179edfa0316153c921ae854bd5
-
SSDEEP
393216:6xfdQuslN/m3pqq9AJ4ZoWOv+9fPV4aHJCI5ctyIk10:6RdQu4KhS4ZorvS3bCI50yIk10
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AutoDox.exe AutoDox.exe -
Loads dropped DLL 43 IoCs
pid Process 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe 2252 AutoDox.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 33 IoCs
flow ioc 31 discord.com 38 discord.com 44 discord.com 67 discord.com 68 discord.com 36 discord.com 41 discord.com 45 discord.com 52 discord.com 66 discord.com 28 discord.com 53 discord.com 65 discord.com 69 discord.com 27 discord.com 29 discord.com 33 discord.com 39 discord.com 42 discord.com 57 discord.com 54 discord.com 59 discord.com 62 discord.com 22 discord.com 35 discord.com 37 discord.com 55 discord.com 63 discord.com 64 discord.com 32 discord.com 43 discord.com 58 discord.com 56 discord.com -
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ifconfig.me 14 api.ipify.org 17 api.ipify.org 30 api.ipify.org 50 api.ipify.org 60 api.ipify.org -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1636 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1636 tasklist.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3244 wrote to memory of 2252 3244 AutoDox.exe 86 PID 3244 wrote to memory of 2252 3244 AutoDox.exe 86 PID 2252 wrote to memory of 960 2252 AutoDox.exe 88 PID 2252 wrote to memory of 960 2252 AutoDox.exe 88 PID 2252 wrote to memory of 4948 2252 AutoDox.exe 90 PID 2252 wrote to memory of 4948 2252 AutoDox.exe 90 PID 4948 wrote to memory of 4248 4948 cmd.exe 91 PID 4948 wrote to memory of 4248 4948 cmd.exe 91 PID 2252 wrote to memory of 3168 2252 AutoDox.exe 93 PID 2252 wrote to memory of 3168 2252 AutoDox.exe 93 PID 3168 wrote to memory of 1636 3168 cmd.exe 95 PID 3168 wrote to memory of 1636 3168 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\AutoDox.exe"C:\Users\Admin\AppData\Local\Temp\AutoDox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\AutoDox.exe"C:\Users\Admin\AppData\Local\Temp\AutoDox.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵PID:960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl ifconfig.me"3⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\system32\curl.execurl ifconfig.me4⤵PID:4248
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD50d0450292a5cf48171411cc8bfbbf0f7
SHA15de70c8bab7003bbd4fdcadb5c0736b9e6d0014c
SHA256cb3ce4f65c9e18be6cbb504d79b594b51f38916e390dad73de4177fe88ce9c37
SHA512ba6bbcc394e07fe09bb3a25e4aae9c4286516317d0b71d090b91aaec87fc10f61a4701aa45bc74cb216fff1e4ad881f62eb94d4ee2a3a9c8f04a954221b81d3a
-
Filesize
23KB
MD50f4d8993f0d2bd829fea19a1074e9ce7
SHA14dfe8107d09e4d725bb887dc146b612b19818abf
SHA2566ca8711c8095bbc475d84f81fc8dfff7cd722ffe98e0c5430631ae067913a11f
SHA5121e6f4bc9c682654bd18e1fc4bd26b1e3757c9f89dc5d0764b2e6c45db079af184875d7d3039161ea93d375e67f33e4fb48dcb63eae0c4ee3f98f1d2f7002b103
-
Filesize
25KB
MD58f385dbacd6c787926ab370c59d8bba2
SHA1953bad3e9121577fab4187311cb473d237f6cba3
SHA256ddf0b165c1c4eff98c4ac11e08c7beadcdd8cc76f495980a21df85ba4368762a
SHA512973b80559f238f6b0a83cd00a2870e909a0d34b3df1e6bb4d47d09395c4503ea8112fb25115232c7658e5de360b258b6612373a96e6a23cde098b60fe5579c1c
-
Filesize
21KB
MD5ade53f8427f55435a110f3b5379bdde1
SHA190bdafccfab8b47450f8226b675e6a85c5b4fcce
SHA25655cf117455aa2059367d89e508f5e2ad459545f38d01e8e7b7b0484897408980
SHA5122856d4c1bbdd8d37c419c5df917a9cc158c79d7f2ee68782c23fb615d719d8fe61aaa1b5f5207f80c31dc381cd6d8c9dabd450dbc0c774ff8e0a95337fda18bd
-
Filesize
22KB
MD5b894480d74efb92a7820f0ec1fc70557
SHA107eaf9f40f4fce9babe04f537ff9a4287ec69176
SHA256cdff737d7239fe4f39d76683d931c970a8550c27c3f7162574f2573aee755952
SHA512498d31f040599fe3e4cfd9f586fc2fee7a056635e9c8fd995b418d6263d21f1708f891c60be09c08ccf01f7915e276aafb7abb84554280d11b25da4bdf3f3a75
-
Filesize
24KB
MD596789921c688108cac213fadb4ff2930
SHA1d017053a25549ebff35ec548e76fc79f778d0b09
SHA2567e4b78275516aa6bdea350940df89c0c94fd0ee70ab3f6a9bac6550783a96cad
SHA51261a037b5f7787bb2507f1d2d78a31cf26a9472501fb959585608d8652af6f665922b827d45979711861803102a07d4a2148e9be70ab7033ece9e0484fe110fdf
-
Filesize
21KB
MD58070eb2be9841525034a508cf16a6fd6
SHA184df6bceba52751f22841b1169d7cd090a4bb0c6
SHA256ee59933eba41bca29b66af9421ba53ffc90223ac88ccd35056503af52a2813fe
SHA51233c5f4623a2e5afe404056b92556fdbaf2419d7b7728416d3368d760ddfde44a2739f551de26fa443d59294b8726a05a77733fee66abc3547073d85f2d4ebeee
-
Filesize
106KB
MD5870fea4e961e2fbd00110d3783e529be
SHA1a948e65c6f73d7da4ffde4e8533c098a00cc7311
SHA25676fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644
SHA5120b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88
-
Filesize
62KB
MD54543813a21958d0764975032b09ded7b
SHA1c571dea89ab89b6aab6da9b88afe78ace90dd882
SHA25645c229c3988f30580c79b38fc0c19c81e6f7d5778e64cef6ce04dd188a9ccab5
SHA5123b007ab252cccda210b473ca6e2d4b7fe92c211fb81ade41a5a69c67adde703a9b0bc97990f31dcbe049794c62ba2b70dadf699e83764893a979e95fd6e89d8f
-
Filesize
81KB
MD5bbe89cf70b64f38c67b7bf23c0ea8a48
SHA144577016e9c7b463a79b966b67c3ecc868957470
SHA256775fbc6e9a4c7e9710205157350f3d6141b5a9e8f44cb07b3eac38f2789c8723
SHA5123ee72ba60541116bbca1a62db64074276d40ad8ed7d0ca199a9c51d65c3f0762a8ef6d0e1e9ebf04bf4efe1347f120e4bc3d502dd288339b4df646a59aad0ec1
-
Filesize
177KB
MD56f1b90884343f717c5dc14f94ef5acea
SHA1cca1a4dcf7a32bf698e75d58c5f130fb3572e423
SHA2562093e7e4f5359b38f0819bdef8314fda332a1427f22e09afc416e1edd5910fe1
SHA512e2c673b75162d3432bab497bad3f5f15a9571910d25f1dffb655755c74457ac78e5311bd5b38d29a91aec4d3ef883ae5c062b9a3255b5800145eb997863a7d73
-
Filesize
119KB
MD5ca4cef051737b0e4e56b7d597238df94
SHA1583df3f7ecade0252fdff608eb969439956f5c4a
SHA256e60a2b100c4fa50b0b144cf825fe3cde21a8b7b60b92bfc326cb39573ce96b2b
SHA51217103d6b5fa84156055e60f9e5756ffc31584cdb6274c686a136291c58ba0be00238d501f8acc1f1ca7e1a1fadcb0c7fefddcb98cedb9dd04325314f7e905df3
-
Filesize
60KB
MD5d856a545a960bf2dca1e2d9be32e5369
SHA167a15ecf763cdc2c2aa458a521db8a48d816d91e
SHA256cd33f823e608d3bda759ad441f583a20fc0198119b5a62a8964f172559acb7d3
SHA51234a074025c8b28f54c01a7fd44700fdedb391f55be39d578a003edb90732dec793c2b0d16da3da5cdbd8adbaa7b3b83fc8887872e284800e7a8389345a30a6a4
-
Filesize
153KB
MD50a94c9f3d7728cf96326db3ab3646d40
SHA18081df1dca4a8520604e134672c4be79eb202d14
SHA2560a70e8546fa6038029f2a3764e721ceebea415818e5f0df6b90d6a40788c3b31
SHA5126f047f3bdaead121018623f52a35f7e8b38c58d3a9cb672e8056a5274d02395188975de08cabae948e2cc2c1ca01c74ca7bc1b82e2c23d652e952f3745491087
-
Filesize
47KB
MD502c0f2eff280b9a92003786fded7c440
SHA15a7fe7ed605ff1c49036d001ae60305e309c5509
SHA256f16e595b0a87c32d9abd2035f8ea97b39339548e7c518df16a6cc27ba7733973
SHA5122b05ddf7bc57e8472e5795e68660d52e843271fd08f2e8002376b056a8c20200d31ffd5e194ce486f8a0928a8486951fdb5670246f1c909f82cf4b0929efedac
-
Filesize
29KB
MD552d0a6009d3de40f4fa6ec61db98c45c
SHA15083a2aff5bcce07c80409646347c63d2a87bd25
SHA256007bcf19d9b036a7e73f5ef31f39bfb1910f72c9c10e4a1b0658352cfe7a8b75
SHA512cd552a38efaa8720a342b60318f62320ce20c03871d2e50d3fa3a9a730b84dacdbb8eb4d0ab7a1c8a97215b537826c8dc532c9a55213bcd0c1d13d7d8a9ad824
-
Filesize
75KB
MD50f5e64e33f4d328ef11357635707d154
SHA18b6dcb4b9952b362f739a3f16ae96c44bea94a0e
SHA2568af6d70d44bb9398733f88bcfb6d2085dd1a193cd00e52120b96a651f6e35ebe
SHA5124be9febb583364da75b6fb3a43a8b50ee29ca8fc1dda35b96c0fcc493342372f69b4f27f2604888bca099c8d00f38a16f4c9463c16eff098227d812c29563643
-
Filesize
95KB
MD59f38f603bd8f7559609c4ffa47f23c86
SHA18b0136fc2506c1ccef2009db663e4e7006e23c92
SHA25628090432a18b59eb8cbe8fdcf11a277420b404007f31ca571321488a43b96319
SHA512273a19f2f609bede9634dae7c47d7b28d369c88420b2b62d42858b1268d6c19b450d83877d2dba241e52755a3f67a87f63fea8e5754831c86d16e2a8f214ad72
-
Filesize
155KB
MD59ddb64354ef0b91c6999a4b244a0a011
SHA186a9dc5ea931638699eb6d8d03355ad7992d2fee
SHA256e33b7a4aa5cdd5462ee66830636fdd38048575a43d06eb7e2f688358525ddeab
SHA5124c86478861fa4220680a94699e7d55fbdc90d2785caee10619cecb058f833292ee7c3d6ac2ed1ef34b38fbff628b79d672194a337701727a54bb6bbc5bf9aeca
-
Filesize
23KB
MD5041556420bdb334a71765d33229e9945
SHA10122316e74ee4ada1ce1e0310b8dca1131972ce1
SHA2568b3d4767057c18c1c496e138d4843f25e5c98ddfc6a8d1b0ed46fd938ede5bb6
SHA51218da574b362726ede927d4231cc7f2aebafbaaab47df1e31b233f7eda798253aef4c142bed1a80164464bd629015d387ae97ba36fcd3cedcfe54a5a1e5c5caa3
-
Filesize
1.0MB
MD5f2be44d584a856b2e0c632f26508c59f
SHA1ca9aac098aa0023739bd9fd6324791018125f761
SHA2564c55a0f1975526ff6ea459f414af2c416a4e359017043b86cce44d793836537a
SHA51283da09d00602e500c25ad1bf1010128ddd4ed502407c9fa8695d52a11a0f87e07f1e8a7e9b37c494510cb3986a61ef3670122e4398b775a73283216833517c12
-
Filesize
1.4MB
MD52e9e0dea56fc0622d8e34f195ae4660c
SHA1c8d725f43d2084fe704e4aeac1e8cea4e77a30a4
SHA256e3661eedb6936d7dcf3ebb291bf82c422d8db48d26b7c2ce9b18c6cf66ed2203
SHA512863f34806527f907427d95d57dcb0ff53d15296beab4d81b113c673d6fc215fa6b8dd4a5b092041ba5f729e31a203429571c6dfa7f496a6165b167a9897dad32
-
Filesize
1.1MB
MD56a8ead81f89f9f4bac7fa18727349439
SHA17d690b4fcfad6a76b41810d7148339787e3e745c
SHA256de3e12d015b6e1f92f93181b4901af06ffa8180e32a9382c0ce07b3172bf8b3a
SHA51266e784c67ecab6f33b3a11ce496bd554c12ebbe177df2ec1c27b887a65c021fe570e88e6a5d9a044e805a02c0aca389719f35fe68d34c3b98e9d08117c6755a2
-
Filesize
896KB
MD543c421b98a29459bbeccb2ecbeeacd23
SHA1a999eb93a5fd7fad69e27b3aeeef2f1ffd25f1b4
SHA256f0bac475bd236c92d49dc95f642c07199266afc4aa2efae61552ae5ffdde15d8
SHA51288882c5005dca649ffdf02625aeea1bb70d5a026087e67af0c197f1ba821972326f9231e1b15d7fd62e764a8542b07bdcad0e6c6802b4bea88f75aeace12be9e
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
686KB
MD58769adafca3a6fc6ef26f01fd31afa84
SHA138baef74bdd2e941ccd321f91bfd49dacc6a3cb6
SHA2562aebb73530d21a2273692a5a3d57235b770daf1c35f60c74e01754a5dac05071
SHA512fac22f1a2ffbfb4789bdeed476c8daf42547d40efe3e11b41fadbc4445bb7ca77675a31b5337df55fdeb4d2739e0fb2cbcac2feabfd4cd48201f8ae50a9bd90b
-
Filesize
193KB
MD543e5a1470c298ba773ac9fcf5d99e8f9
SHA106db03daf3194c9e492b2f406b38ed33a8c87ab3
SHA25656984d43be27422d31d8ece87d0abda2c0662ea2ff22af755e49e3462a5f8b65
SHA512a5a1ebb34091ea17c8f0e7748004558d13807fdc16529bc6f8f6c6a3a586ee997bf72333590dc451d78d9812ef8adfa7deabab6c614fce537f56fa38ce669cfc
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989
-
Filesize
674KB
MD5e3b435bc314f27638f5a729e3f3bb257
SHA1fd400fc8951ea9812864455aef4b91b42ba4e145
SHA256568982769735d04d7cc4bdd5c7b2b85ec0880230b36267ce14114639307b7bca
SHA512c94baffbec5cadf98e97e84ba2561269ee6ad60a47cc8661f7c544a5179f9e260fbec1c41548379587b3807670b0face9e640e1d6bca621e78ef93e0bb43efcc
-
Filesize
134KB
MD5a44f3026baf0b288d7538c7277ddaf41
SHA1c23fbdd6a1b0dc69753a00108dce99d7ec7f5ee3
SHA2562984df073a029acf46bcaed4aa868c509c5129555ed70cac0fe2235abdba6e6d
SHA5129699a2629f9f8c74a7d078ae10c9ffe5f30b29c4a2c92d3fcd2096dc2edceb71c59fd84e9448bb0c2fb970e2f4ade8b3c233ebf673c47d83ae40d12a2317ca98
-
Filesize
28KB
MD5c119811a40667dca93dfe6faa418f47a
SHA1113e792b7dcec4366fc273e80b1fc404c309074c
SHA2568f27cd8c5071cb740a2191b3c599e99595b121f461988166f07d9f841e7116b7
SHA512107257dbd8cf2607e4a1c7bef928a6f61ebdfc21be1c4bdc3a649567e067e9bb7ea40c0ac8844d2cedd08682447b963148b52f85adb1837f243df57af94c04b3
-
Filesize
384KB
MD538ebf1df8b0747e475d2adecb0cad08b
SHA191f0a26c9733315bc0ddf164ee18018794c4d6fc
SHA256476b2d93ec97f6f547ecf318c2d322413d565440efb1a22e2e5a1b7f1960d762
SHA51202ca6c8396ba96a31dae8df54131d3751e71ff5c53016c0ec1ef9604e5bcc64e5ded806ffe779e7a2aa15a410ca04cf0eed4118828f3ea2865d3a5e3fffca705
-
Filesize
1.4MB
MD5aaf9fd98bc2161ad7dff996450173a3b
SHA1ab634c09b60aa18ea165084a042d917b65d1fe85
SHA256f1e8b6c4d61ac6a320fa2566da9391fbfd65a5ac34ac2e2013bc37c8b7b41592
SHA512597ffe3c2f0966ab94fbb7ecac27160c691f4a07332311f6a9baf8dec8b16fb16ec64df734c3bdbabf2c0328699e234d14f1b8bd5ac951782d35ea0c78899e5f
-
Filesize
1.1MB
MD54c8af8a30813e9380f5f54309325d6b8
SHA1169a80d8923fb28f89bc26ebf89ffe37f8545c88
SHA2564b6e3ba734c15ec789b5d7469a5097bd082bdfd8e55e636ded0d097cf6511e05
SHA512ea127779901b10953a2bf9233e20a4fab2fba6f97d7baf40c1b314b7cd03549e0f4d2fb9bad0fbc23736e21eb391a418d79a51d64402245c1cd8899e4d765c5a
-
Filesize
136KB
MD5931c91f4f25841115e284b08954c2ad9
SHA1973ea53c89fee686930396eb58d9ff5464b4c892
SHA2567ab0d714e44093649551623b93cc2aea4b30915adcb114bc1b75c548c3135b59
SHA5124a048a7a0949d853ac7568eb4ad4bba8d7165ec4191ce8bc67b0954080364278908001dbce0f4d39a84a1c2295f12d22a7311893f6b2e985c3ad96bd421aa3b8
-
Filesize
29B
MD5155ea3c94a04ceab8bd7480f9205257d
SHA1b46bbbb64b3df5322dd81613e7fa14426816b1c1
SHA256445e2bcecaa0d8d427b87e17e7e53581d172af1b9674cf1a33dbe1014732108b
SHA5123d47449da7c91fe279217a946d2f86e5d95d396f53b55607ec8aca7e9aa545cfaf9cb97914b643a5d8a91944570f9237e18eecec0f1526735be6ceee45ecba05