Overview
overview
10Static
static
10TPSPoxR1tj...17.zip
windows7-x64
1TPSPoxR1tj...17.zip
windows10-2004-x64
1Defender_Settings.vbs
windows7-x64
3Defender_Settings.vbs
windows10-2004-x64
1ReadMe.txt
windows7-x64
1ReadMe.txt
windows10-2004-x64
1VantaFN.exe
windows7-x64
10VantaFN.exe
windows10-2004-x64
10dControl.exe
windows7-x64
7dControl.exe
windows10-2004-x64
7out.exe
windows7-x64
out.exe
windows10-2004-x64
dControl.ini
windows7-x64
1dControl.ini
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-04-2024 14:17
Behavioral task
behavioral1
Sample
TPSPoxR1tjvrw3nqDARFwixDWzQkPxHBxmBosA17.zip
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
TPSPoxR1tjvrw3nqDARFwixDWzQkPxHBxmBosA17.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Defender_Settings.vbs
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Defender_Settings.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
ReadMe.txt
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
ReadMe.txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
VantaFN.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
VantaFN.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
dControl.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
dControl.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
out.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
out.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
dControl.ini
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
dControl.ini
Resource
win10v2004-20240226-en
General
-
Target
VantaFN.exe
-
Size
3.8MB
-
MD5
84699018b1132b73d8063290faa07789
-
SHA1
7d1eec5ae60f0a0383f723f1e001dfc6c2c76aac
-
SHA256
d35c91227f48c494930749f5486054244686328ad8e02960a6b0b10226bc174c
-
SHA512
d7d29eaeacb5d4289aa0a3bbdf071f2e875bf307e326829432cfbbcff1b19e3eaccfc81ec5ebcbf2beab7dee8aff05ad8c086ac0e61a0837339f4febabef5ade
-
SSDEEP
1536:ftTXAtyLaVfblJpAGUbVh9CU5uodpqKmY7:fWyaVPaGUbVjzGz
Malware Config
Extracted
asyncrat
Default
Δ2cΕmVO比L西IVurs诶Eש8
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/z5PQ82wE
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral7/files/0x000e00000001224e-17.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2468 svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 4 pastebin.com 5 pastebin.com 8 6.tcp.eu.ngrok.io 19 6.tcp.eu.ngrok.io 22 6.tcp.eu.ngrok.io 29 6.tcp.eu.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2460 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2608 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1712 VantaFN.exe 1712 VantaFN.exe 1712 VantaFN.exe 1712 VantaFN.exe 1712 VantaFN.exe 1712 VantaFN.exe 1712 VantaFN.exe 1712 VantaFN.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe 2468 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1712 VantaFN.exe Token: SeDebugPrivilege 2468 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2548 1712 VantaFN.exe 29 PID 1712 wrote to memory of 2548 1712 VantaFN.exe 29 PID 1712 wrote to memory of 2548 1712 VantaFN.exe 29 PID 1712 wrote to memory of 2724 1712 VantaFN.exe 31 PID 1712 wrote to memory of 2724 1712 VantaFN.exe 31 PID 1712 wrote to memory of 2724 1712 VantaFN.exe 31 PID 2548 wrote to memory of 2460 2548 cmd.exe 33 PID 2548 wrote to memory of 2460 2548 cmd.exe 33 PID 2548 wrote to memory of 2460 2548 cmd.exe 33 PID 2724 wrote to memory of 2608 2724 cmd.exe 34 PID 2724 wrote to memory of 2608 2724 cmd.exe 34 PID 2724 wrote to memory of 2608 2724 cmd.exe 34 PID 2724 wrote to memory of 2468 2724 cmd.exe 35 PID 2724 wrote to memory of 2468 2724 cmd.exe 35 PID 2724 wrote to memory of 2468 2724 cmd.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\VantaFN.exe"C:\Users\Admin\AppData\Local\Temp\VantaFN.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:2460
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp9BA3.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2608
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
151B
MD5516d2038e8984a9cc7ceaf28b8984d37
SHA19b34c7e1da055c0712a2474676ab77408123d4c7
SHA256ba2b1856344fb6c8898a9d33f32109d03b877bb3c047d6aa2312ea1b0da91dc3
SHA5121827c557d9e7afe788228a8426598741488ea0b60f3fad593855fbb55f70920240f2bd02c25fd20c2223ce99f23d6840f6905a0fa981239d595dd03ce207d87e
-
Filesize
3.8MB
MD584699018b1132b73d8063290faa07789
SHA17d1eec5ae60f0a0383f723f1e001dfc6c2c76aac
SHA256d35c91227f48c494930749f5486054244686328ad8e02960a6b0b10226bc174c
SHA512d7d29eaeacb5d4289aa0a3bbdf071f2e875bf307e326829432cfbbcff1b19e3eaccfc81ec5ebcbf2beab7dee8aff05ad8c086ac0e61a0837339f4febabef5ade