02-29-2024 01:16 PM
Anyone else using AutoHotkeyU.exe in their environment and experiencing multiple retrospective quarantine events because the file disposition is now malicious?
I understand what it does, but I'm curious why the disposition recently changed
Solved! Go to Solution.
03-01-2024 06:59 AM
03-01-2024 05:08 AM
Could you post the SHA256 hash of the file please? Then we can look into why it was marked malicious.
Thanks,
-Matt
03-01-2024 06:41 AM
@Matthew Franks here are the details:
There appears to be at least 3 versions of AutoHotkey.exe in our environment that are triggering threat detection and retrospective quarantine failure events:
C:\Program Files\AutoHotkey\AutoHotkeyU32.exe / disposition = malicious
SHA256: 9ab9738634810cf54edca5a9937f2eb1ff64f8a221558ca57ef23832b413f5a2
993fcb15d8eb9197f71826d7b60ba86ad407c2c3d31801be2a7e4bac8e1abac3
AutoHotkey.exe / disposition = malicious
945adada6cf6698b949359d9b395a5f905989d0d1eb84f537de492ecc1263148
03-01-2024 06:59 AM
03-01-2024 05:17 AM
If you trust the sha and its affecting your business critical applications then I suggest whitelisting the SHA until Cisco comes back with an explanation.
03-01-2024 06:47 AM
03-01-2024 07:01 AM
Good advice from Ken as always. I submitted the first 3 hashes as FPs because I don't see anything in the report that jumps out to me as overtly malicious. Could you please submit that latest batch if you haven't already and they're showing as malicious?
Thanks,
-Matt
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide