Overview
overview
10Static
static
10Defender_Settings.vbs
windows10-1703-x64
3Defender_Settings.vbs
windows10-2004-x64
1Defender_Settings.vbs
windows11-21h2-x64
1VantaFN.exe
windows10-1703-x64
10VantaFN.exe
windows10-2004-x64
10VantaFN.exe
windows11-21h2-x64
10dControl.exe
windows10-1703-x64
7dControl.exe
windows10-2004-x64
7dControl.exe
windows11-21h2-x64
7out.exe
windows10-1703-x64
out.exe
windows10-2004-x64
out.exe
windows11-21h2-x64
3Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07-04-2024 17:57
Behavioral task
behavioral1
Sample
Defender_Settings.vbs
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Defender_Settings.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Defender_Settings.vbs
Resource
win11-20240319-en
Behavioral task
behavioral4
Sample
VantaFN.exe
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
VantaFN.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral6
Sample
VantaFN.exe
Resource
win11-20240221-en
Behavioral task
behavioral7
Sample
dControl.exe
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
dControl.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
dControl.exe
Resource
win11-20240221-en
Behavioral task
behavioral10
Sample
out.exe
Resource
win10-20240319-en
Behavioral task
behavioral11
Sample
out.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
out.exe
Resource
win11-20240221-en
General
-
Target
VantaFN.exe
-
Size
3.8MB
-
MD5
84699018b1132b73d8063290faa07789
-
SHA1
7d1eec5ae60f0a0383f723f1e001dfc6c2c76aac
-
SHA256
d35c91227f48c494930749f5486054244686328ad8e02960a6b0b10226bc174c
-
SHA512
d7d29eaeacb5d4289aa0a3bbdf071f2e875bf307e326829432cfbbcff1b19e3eaccfc81ec5ebcbf2beab7dee8aff05ad8c086ac0e61a0837339f4febabef5ade
-
SSDEEP
1536:ftTXAtyLaVfblJpAGUbVh9CU5uodpqKmY7:fWyaVPaGUbVjzGz
Malware Config
Extracted
asyncrat
Default
Δ2cΕmVO比L西IVurs诶Eש8
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/z5PQ82wE
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral5/files/0x000800000002320a-12.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation VantaFN.exe -
Executes dropped EXE 1 IoCs
pid Process 3440 svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 21 pastebin.com 22 pastebin.com 23 0.tcp.eu.ngrok.io 74 0.tcp.eu.ngrok.io 77 0.tcp.eu.ngrok.io 96 0.tcp.eu.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2108 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3204 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3732 VantaFN.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe 3440 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3732 VantaFN.exe Token: SeDebugPrivilege 3440 svchost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3732 wrote to memory of 4968 3732 VantaFN.exe 85 PID 3732 wrote to memory of 4968 3732 VantaFN.exe 85 PID 3732 wrote to memory of 4744 3732 VantaFN.exe 87 PID 3732 wrote to memory of 4744 3732 VantaFN.exe 87 PID 4744 wrote to memory of 3204 4744 cmd.exe 89 PID 4744 wrote to memory of 3204 4744 cmd.exe 89 PID 4968 wrote to memory of 2108 4968 cmd.exe 90 PID 4968 wrote to memory of 2108 4968 cmd.exe 90 PID 4744 wrote to memory of 3440 4744 cmd.exe 93 PID 4744 wrote to memory of 3440 4744 cmd.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\VantaFN.exe"C:\Users\Admin\AppData\Local\Temp\VantaFN.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:2108
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp5B8D.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3204
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3440
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5ceb5679f9fb99301621dcd7778b347c6
SHA1f2231ac864a97704f55a0eb85db873d2fdd48ff7
SHA2560fbabb8cb511297194217b5fa2b246b0ce6653a656adf4025d1c2024262905cb
SHA5123802bbc49742504a9fe17df1a3b9756006df3e5da476df5e606129b404df3d500151140f9e2c2fd936b766770291fb6b9f0126550abc6f2ae1f646b8aba75f32
-
Filesize
3.8MB
MD584699018b1132b73d8063290faa07789
SHA17d1eec5ae60f0a0383f723f1e001dfc6c2c76aac
SHA256d35c91227f48c494930749f5486054244686328ad8e02960a6b0b10226bc174c
SHA512d7d29eaeacb5d4289aa0a3bbdf071f2e875bf307e326829432cfbbcff1b19e3eaccfc81ec5ebcbf2beab7dee8aff05ad8c086ac0e61a0837339f4febabef5ade