Analysis
-
max time kernel
204s -
max time network
224s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:20
Static task
static1
Behavioral task
behavioral1
Sample
Antl-Setup-v2.05.83_x64(1).exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Antl-Setup-v2.05.83_x64(1).exe
Resource
win10v2004-20221111-en
General
-
Target
Antl-Setup-v2.05.83_x64(1).exe
-
Size
97.2MB
-
MD5
d1d5bddab1d1985e1dee0696b7c9c1fa
-
SHA1
fb73395cfd6f7f37df8bb20020d0c5bf6fe9daad
-
SHA256
f920ffbbd07b725e4318bc71366b30f2ad01b40cd6250294f54badf28e93cefd
-
SHA512
1e823e00e3e5d58712d6c52c44427bcd6ff9337dfcdc92d6de6c8463aa450b2886cba0f71258598a4c0246254de02b4aadeb15a8c9c5275b91195401340160db
-
SSDEEP
3145728:v2LPmPwJOHt9eFpc13E1oD8mF5TvYrdknEP5g16:uziwc8pc13OMs5Q6
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
Antl-Setup-v2.05.83_x64(1).exepid process 3268 Antl-Setup-v2.05.83_x64(1).exe 3268 Antl-Setup-v2.05.83_x64(1).exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\nso8379.tmp\System.dllFilesize
29KB
MD526c8a92678f1b970ac2a700bb844c309
SHA1c821a5980c31b0b35f1505cde836d6769f45e3a3
SHA2562a7b5d1cab96a5280b0694d0ed54510129626a1ba36a51bd34d546972b7d18b8
SHA512fba6e371853fd6c27097eb7cce7ffc59d71e4f0a9b5e55de06472d094b70c44a409bd82f39d9a27a814e826ab8468c59e947401a3c3ead1f057cbac236588860
-
C:\Users\Admin\AppData\Local\Temp\nso8379.tmp\nsDialogs.dllFilesize
14KB
MD58f45e78d9d02ca8a9f9c274a8bfe2a57
SHA19b3838e1d2d4fbc1c84e1252747e96aa1b223d83
SHA25678f9594721361fd3415b8c5194f9c9b87c580d6a70ddb95f2c4743c61ce68ebe
SHA512125f1bcf833e0c233ebee552c164d9726769f06e5163467888abea08048fdae60a94b903ef97ba82ca9cf684f3c027d9605d54e9efe794df3e452f9b20e4ca96