Analysis

  • max time kernel
    142s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 03:20

General

  • Target

    Antares Auto-Tune bundle V9 CE.exe

  • Size

    110.0MB

  • MD5

    cda53632778d1ced63a7c0809b71cb86

  • SHA1

    f7d30963a0d45f35cc015f5c5e5ed58276b0e628

  • SHA256

    fb83741f29e99b8af74f9e182c3f1eaebeb2f401a5c6886f1c045d406e282c23

  • SHA512

    8b6cd507fc76d75aa2d96d5546ef1d12f0c25c015bd195cee914d5501ec277b41801f1adb171ba67b164a3e7e68fd3d232ea9f7903cf11443f9a83db0be18b2e

  • SSDEEP

    3145728:8aDfXHRtVR2oE76WDIJZZPlPZrbsAjHMZN1cy:86vHRtVRu7JsnN5ZfsAjsn1H

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 3 IoCs
  • Drops file in Program Files directory 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Antares Auto-Tune bundle V9 CE.exe
    "C:\Users\Admin\AppData\Local\Temp\Antares Auto-Tune bundle V9 CE.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Local\Temp\is-4MG8E.tmp\Antares Auto-Tune bundle V9 CE.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-4MG8E.tmp\Antares Auto-Tune bundle V9 CE.tmp" /SL5="$400F4,114584709,763392,C:\Users\Admin\AppData\Local\Temp\Antares Auto-Tune bundle V9 CE.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      PID:2076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Steinberg\VSTPlugins\Antares\is-79NDO.tmp

    Filesize

    126B

    MD5

    798095cd31340606c8e81d0a5107d57e

    SHA1

    39d058c4d45ef84b188f7ece620106124eb3d74e

    SHA256

    5526ef6345adee7c693e58354dd72b095df152be62ff7298b4c6f6d0f91e2f83

    SHA512

    9ca995c89d3f23cd2a977fb2826da1f75dc4caa4fe965f9aac3a6d486f6558429a44eaeea35217f85d94ba6d7c2c54ab520c9a1786133b2edd103e36159e53a1

  • C:\Program Files\Steinberg\VSTPlugins\Antares\is-E6IES.tmp

    Filesize

    45KB

    MD5

    6e03b680fbee54e69e52a15245989862

    SHA1

    0136100d693fa2cf4eba38ac0314951b7be22c9b

    SHA256

    00999004190475604537034d99d9a2cc84355579e4b199045dc6c8c3479e3600

    SHA512

    1a2e8770e676bfe9c84f81185584fdf347271897637f18ccbcb1f1dfb7f4afac4cf65ab0d19d7f34044b5f5b304d7b54c9c85c8049fee0a4a3e4cabe3ae7c578

  • C:\Users\Admin\AppData\Local\Temp\is-4MG8E.tmp\Antares Auto-Tune bundle V9 CE.tmp

    Filesize

    2.5MB

    MD5

    ebbb655a85d61e4adad34d9ade0ea184

    SHA1

    41d3a5ab6de2cd4c45bd9545906c53ba9eaf345d

    SHA256

    4cfcbcffe82bc6943890fa818ded2708f46c4f85ec368de00836ac708acdb080

    SHA512

    a84a4104356c23fa5a618368fa4ba2793435832f3eefb6b243d1513d7ac586002449f127abc6bbb3cf199a930bdd718c6d1ec273738e1d9796d423ddb312eb50

  • \ProgramData\Antares\unins000.exe

    Filesize

    2.5MB

    MD5

    f9f5ebf1286b47f1a57486bea7506ede

    SHA1

    776b3b46334e0ea2db686a24524526e131f74869

    SHA256

    0ec27dff2bd94ac109857f4995e51b1ca6054debf988ae60536f950abaab2884

    SHA512

    7ca8d4d9b60f4523e4ff24eab49c4e87c9e0e3462cb822c25c473af8a83076fba95d33615546bd7d6344b873b8197bec25ddb4d273f1cda451844ab9f176bc1f

  • memory/2076-9-0x0000000000400000-0x0000000000683000-memory.dmp

    Filesize

    2.5MB

  • memory/2076-11-0x0000000000400000-0x0000000000683000-memory.dmp

    Filesize

    2.5MB

  • memory/2076-72-0x0000000000400000-0x0000000000683000-memory.dmp

    Filesize

    2.5MB

  • memory/2076-325-0x0000000000400000-0x0000000000683000-memory.dmp

    Filesize

    2.5MB

  • memory/2392-0-0x0000000000400000-0x00000000004C8000-memory.dmp

    Filesize

    800KB

  • memory/2392-2-0x0000000000401000-0x00000000004A9000-memory.dmp

    Filesize

    672KB

  • memory/2392-10-0x0000000000400000-0x00000000004C8000-memory.dmp

    Filesize

    800KB