Edit tour
Windows
Analysis Report
Autodesk_Inventor_Professional_2025_1_2_en-US_setup_webinstall.exe
Overview
General Information
Detection
Score: | 6 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 20% |
Signatures
Binary contains a suspicious time stamp
Drops PE files
Found dropped PE file which has not been started or loaded
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
PE file contains sections with non-standard names
PE file does not import any functions
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- Autodesk_Inventor_Professional_2025_1_2_en-US_setup_webinstall.exe (PID: 6800 cmdline:
"C:\Users\ user\Deskt op\Autodes k_Inventor _Professio nal_2025_1 _2_en-US_s etup_webin stall.exe" MD5: 62D98D740B6E423272B99778A3C40FB7) - Setup.exe (PID: 6940 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\7z36D71 A90\Setup. exe MD5: F29EA7AC6D646B296CD573C0DAA33A72) - DownloadManager.exe (PID: 7020 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\7z36D7 1A90\ODIS\ DownloadMa nager.exe" -u "https ://trial2. autodesk.c om/NetSWDL D/ODIS/prd /2025/INVP ROSA/E578C B4E-CF55-3 E4D-9A8A-2 13245140B7 8/WI/Autod esk_Invent or_Profess ional_2025 _en-US_set up.dat" -p "C:\Users \user\AppD ata\Local\ Temp\odis_ download_d est\167189 4965352981 0453\Autod esk_Invent or_Profess ional_2025 _en-US_set up.dat" -- productnam e Bootstra p --produc tversion 2 .10.0.4 MD5: DBDB7199C0DC31E5C65544432D90B12E) - conhost.exe (PID: 7064 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
⊘No yara matches
⊘No Sigma rule has matched
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
There are no malicious signatures, click here to show all signatures.
Source: | Binary or memory string: | memstr_cd9d33f8-8 |
Source: | Static PE information: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |