Analysis
-
max time kernel
1556s -
max time network
1810s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21/11/2023, 16:11
Behavioral task
behavioral1
Sample
Vanta.exe
Resource
win7-20231020-en
General
-
Target
Vanta.exe
-
Size
2.5MB
-
MD5
2b9ec7f6f4cf6b33327e851b1874e314
-
SHA1
08b7b7bee63c54419d2a0f5ea9ed327c877b2ea9
-
SHA256
31283efe572fee109e86b73f1718e69387fc7ea14e59c8bad26621e599fd050c
-
SHA512
89bb9bce6223b4376932ee5fc5d7e06d11f874df73f93a4b11bc347985492efa39f30188e1885e16ce3a3fee6d9ef8a3aceea4eecf9573e0de307ed107317309
-
SSDEEP
1536:DeQPc25j5BnihYUbfh9pfFeJuMdpqKmY7:DeDY9BnaYUbfNfkvGz
Malware Config
Extracted
asyncrat
Default
127.0.0.1:3232
2.56.245.187:3232
西rXm9HV5FnΙ开YRmi1
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 4 IoCs
resource yara_rule behavioral1/memory/2508-0-0x00000000008D0000-0x00000000008E6000-memory.dmp asyncrat behavioral1/files/0x00070000000120b7-17.dat asyncrat behavioral1/files/0x00070000000120b7-16.dat asyncrat behavioral1/memory/3000-18-0x0000000000DF0000-0x0000000000E06000-memory.dmp asyncrat -
Executes dropped EXE 1 IoCs
pid Process 3000 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2712 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2700 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2508 Vanta.exe 2508 Vanta.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3000 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2508 Vanta.exe Token: SeDebugPrivilege 3000 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2516 2508 Vanta.exe 28 PID 2508 wrote to memory of 2516 2508 Vanta.exe 28 PID 2508 wrote to memory of 2516 2508 Vanta.exe 28 PID 2508 wrote to memory of 2888 2508 Vanta.exe 29 PID 2508 wrote to memory of 2888 2508 Vanta.exe 29 PID 2508 wrote to memory of 2888 2508 Vanta.exe 29 PID 2516 wrote to memory of 2712 2516 cmd.exe 32 PID 2516 wrote to memory of 2712 2516 cmd.exe 32 PID 2516 wrote to memory of 2712 2516 cmd.exe 32 PID 2888 wrote to memory of 2700 2888 cmd.exe 33 PID 2888 wrote to memory of 2700 2888 cmd.exe 33 PID 2888 wrote to memory of 2700 2888 cmd.exe 33 PID 2888 wrote to memory of 3000 2888 cmd.exe 34 PID 2888 wrote to memory of 3000 2888 cmd.exe 34 PID 2888 wrote to memory of 3000 2888 cmd.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Vanta.exe"C:\Users\Admin\AppData\Local\Temp\Vanta.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:2712
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp90BB.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2700
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
151B
MD56a6f24f84a1293c8ccf36917d5512e83
SHA100151880780525ee04583e458059f061e650bfa5
SHA2562e04d3ae6cf61aa2f14b8b6c88cd134e96f6eb356e570204d032fe0933064685
SHA512d146f89b0060cbd4e8e19f7119989708f13bf8d7fa41b2653da351b605d9093d3bd5a54fec069bf33f8b381136ac3073a445ca549ddb942b384a3548d138efba
-
Filesize
151B
MD56a6f24f84a1293c8ccf36917d5512e83
SHA100151880780525ee04583e458059f061e650bfa5
SHA2562e04d3ae6cf61aa2f14b8b6c88cd134e96f6eb356e570204d032fe0933064685
SHA512d146f89b0060cbd4e8e19f7119989708f13bf8d7fa41b2653da351b605d9093d3bd5a54fec069bf33f8b381136ac3073a445ca549ddb942b384a3548d138efba
-
Filesize
2.5MB
MD52b9ec7f6f4cf6b33327e851b1874e314
SHA108b7b7bee63c54419d2a0f5ea9ed327c877b2ea9
SHA25631283efe572fee109e86b73f1718e69387fc7ea14e59c8bad26621e599fd050c
SHA51289bb9bce6223b4376932ee5fc5d7e06d11f874df73f93a4b11bc347985492efa39f30188e1885e16ce3a3fee6d9ef8a3aceea4eecf9573e0de307ed107317309
-
Filesize
2.5MB
MD52b9ec7f6f4cf6b33327e851b1874e314
SHA108b7b7bee63c54419d2a0f5ea9ed327c877b2ea9
SHA25631283efe572fee109e86b73f1718e69387fc7ea14e59c8bad26621e599fd050c
SHA51289bb9bce6223b4376932ee5fc5d7e06d11f874df73f93a4b11bc347985492efa39f30188e1885e16ce3a3fee6d9ef8a3aceea4eecf9573e0de307ed107317309