Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-03-2024 01:13

General

  • Target

    RAT/VanToM-Rat.exe

  • Size

    183KB

  • MD5

    3d4e3f149f3d0cdfe76bf8b235742c97

  • SHA1

    0e0e34b5fd8c15547ca98027e49b1dcf37146d95

  • SHA256

    b15c7cf9097195fb5426d4028fd2f6352325400beb1e32431395393910e0b10a

  • SHA512

    8c9d2a506135431adcfd35446b69b20fe12f39c0694f1464c534a6bf01ebc5f815c948783508e06b14ff4cc33f44e220122bf2a42d2e97afa646b714a88addff

  • SSDEEP

    3072:UurlxKcmWTTt7Zde2vBVQF4EWjFRA229YvepcCBKXnpU:vrlOWFddeAVQF4EWx92iepcCBK3

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RAT\VanToM-Rat.exe
    "C:\Users\Admin\AppData\Local\Temp\RAT\VanToM-Rat.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:940
    • C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe
      "C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:2248
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2276,i,5697607538120380977,9987005253899555344,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2440

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\melt.txt

      Filesize

      52B

      MD5

      043789b31546b4b9db024572fdb74719

      SHA1

      fa162860d98b440196bdf127d2bfdb2457f3c86a

      SHA256

      88695e1d3afa0037384d29fb7bd96e7e63360b3f18e2bdfde9976c95e59a6717

      SHA512

      0a50fb469f41a82185a902b1e4104ae2d4f73e656b391a6ea25bdd3268e797e147747970fe561fdff7adff4ffd9e2666907bba20ba1d7be70cff28c5250a2b5e

    • C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe

      Filesize

      183KB

      MD5

      3d4e3f149f3d0cdfe76bf8b235742c97

      SHA1

      0e0e34b5fd8c15547ca98027e49b1dcf37146d95

      SHA256

      b15c7cf9097195fb5426d4028fd2f6352325400beb1e32431395393910e0b10a

      SHA512

      8c9d2a506135431adcfd35446b69b20fe12f39c0694f1464c534a6bf01ebc5f815c948783508e06b14ff4cc33f44e220122bf2a42d2e97afa646b714a88addff

    • memory/940-5-0x000000001C550000-0x000000001C5EC000-memory.dmp

      Filesize

      624KB

    • memory/940-26-0x00007FF970CA0000-0x00007FF971641000-memory.dmp

      Filesize

      9.6MB

    • memory/940-4-0x000000001BF80000-0x000000001C44E000-memory.dmp

      Filesize

      4.8MB

    • memory/940-0-0x00007FF970CA0000-0x00007FF971641000-memory.dmp

      Filesize

      9.6MB

    • memory/940-6-0x00000000013E0000-0x00000000013E8000-memory.dmp

      Filesize

      32KB

    • memory/940-7-0x000000001C6B0000-0x000000001C6FC000-memory.dmp

      Filesize

      304KB

    • memory/940-8-0x000000001D400000-0x000000001D70E000-memory.dmp

      Filesize

      3.1MB

    • memory/940-9-0x0000000001450000-0x0000000001460000-memory.dmp

      Filesize

      64KB

    • memory/940-2-0x00007FF970CA0000-0x00007FF971641000-memory.dmp

      Filesize

      9.6MB

    • memory/940-3-0x000000001B9D0000-0x000000001BA76000-memory.dmp

      Filesize

      664KB

    • memory/940-1-0x0000000001450000-0x0000000001460000-memory.dmp

      Filesize

      64KB

    • memory/2248-23-0x00007FF970CA0000-0x00007FF971641000-memory.dmp

      Filesize

      9.6MB

    • memory/2248-25-0x00007FF970CA0000-0x00007FF971641000-memory.dmp

      Filesize

      9.6MB

    • memory/2248-27-0x00000000012C0000-0x00000000012D0000-memory.dmp

      Filesize

      64KB

    • memory/2248-24-0x00000000012C0000-0x00000000012D0000-memory.dmp

      Filesize

      64KB

    • memory/2248-29-0x00007FF970CA0000-0x00007FF971641000-memory.dmp

      Filesize

      9.6MB

    • memory/2248-30-0x00000000012C0000-0x00000000012D0000-memory.dmp

      Filesize

      64KB

    • memory/2248-31-0x00000000012C0000-0x00000000012D0000-memory.dmp

      Filesize

      64KB