Overview
overview
7Static
static
3Vanta-Loader.exe
windows10-2004-x64
7Vanta-Loader.exe
windows11-21h2-x64
7$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3LICENSES.c...m.html
windows10-2004-x64
1LICENSES.c...m.html
windows11-21h2-x64
1d3dcompiler_47.dll
windows10-2004-x64
1d3dcompiler_47.dll
windows11-21h2-x64
1ffmpeg.dll
windows10-2004-x64
1ffmpeg.dll
windows11-21h2-x64
1libEGL.dll
windows10-2004-x64
1libEGL.dll
windows11-21h2-x64
1libGLESv2.dll
windows10-2004-x64
1libGLESv2.dll
windows11-21h2-x64
1resources/elevate.exe
windows10-2004-x64
1resources/elevate.exe
windows11-21h2-x64
1runtimebroker.exe
windows10-2004-x64
7runtimebroker.exe
windows11-21h2-x64
1vk_swiftshader.dll
windows10-2004-x64
1vk_swiftshader.dll
windows11-21h2-x64
1vulkan-1.dll
windows10-2004-x64
1vulkan-1.dll
windows11-21h2-x64
1$PLUGINSDI...7z.dll
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows11-21h2-x64
3Analysis
-
max time kernel
59s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 06:18
Static task
static1
Behavioral task
behavioral1
Sample
Vanta-Loader.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
Vanta-Loader.exe
Resource
win11-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win11-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240426-en
Behavioral task
behavioral7
Sample
LICENSES.chromium.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
LICENSES.chromium.html
Resource
win11-20240508-en
Behavioral task
behavioral9
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
d3dcompiler_47.dll
Resource
win11-20240426-en
Behavioral task
behavioral11
Sample
ffmpeg.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
ffmpeg.dll
Resource
win11-20240419-en
Behavioral task
behavioral13
Sample
libEGL.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
libEGL.dll
Resource
win11-20240426-en
Behavioral task
behavioral15
Sample
libGLESv2.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
libGLESv2.dll
Resource
win11-20240508-en
Behavioral task
behavioral17
Sample
resources/elevate.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
resources/elevate.exe
Resource
win11-20240426-en
Behavioral task
behavioral19
Sample
runtimebroker.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
runtimebroker.exe
Resource
win11-20240508-en
Behavioral task
behavioral21
Sample
vk_swiftshader.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
vk_swiftshader.dll
Resource
win11-20240426-en
Behavioral task
behavioral23
Sample
vulkan-1.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
vulkan-1.dll
Resource
win11-20240426-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win11-20240508-en
General
-
Target
LICENSES.chromium.html
-
Size
6.4MB
-
MD5
c3528648bedbde1223a2faab1a3f9af3
-
SHA1
934d3c8f184258338ff380964ed89053ce69ac5b
-
SHA256
57b8e5a3f2cd62805001aefca035c7348b4d1abac157e6df3d798bb31f2ec3d2
-
SHA512
3e3cc0fd7a55f67ee0afff9696beef33bdc9524375bbe9d8e8f7660fd408c756c1156ca0b02ecccdc22799c7b8e74dbde012732ad6b3ebe0a3cfc54ff5132b35
-
SSDEEP
24576:d7t05kvWS99LVoFIUmf2p6y6E6c666r8HHdE/pG6:RI8j
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133625606388514871" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid Process 4672 chrome.exe 4672 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid Process 4672 chrome.exe 4672 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid Process Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe Token: SeShutdownPrivilege 4672 chrome.exe Token: SeCreatePagefilePrivilege 4672 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid Process 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid Process 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe 4672 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid Process procid_target PID 4672 wrote to memory of 3000 4672 chrome.exe 83 PID 4672 wrote to memory of 3000 4672 chrome.exe 83 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1480 4672 chrome.exe 84 PID 4672 wrote to memory of 1792 4672 chrome.exe 85 PID 4672 wrote to memory of 1792 4672 chrome.exe 85 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86 PID 4672 wrote to memory of 2932 4672 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa740aab58,0x7ffa740aab68,0x7ffa740aab782⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1900,i,10464607981414401776,16876632663524777821,131072 /prefetch:22⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1900,i,10464607981414401776,16876632663524777821,131072 /prefetch:82⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2256 --field-trial-handle=1900,i,10464607981414401776,16876632663524777821,131072 /prefetch:82⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1900,i,10464607981414401776,16876632663524777821,131072 /prefetch:12⤵PID:4024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1900,i,10464607981414401776,16876632663524777821,131072 /prefetch:12⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4360 --field-trial-handle=1900,i,10464607981414401776,16876632663524777821,131072 /prefetch:82⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4640 --field-trial-handle=1900,i,10464607981414401776,16876632663524777821,131072 /prefetch:82⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD51f973e6681ec00dd784730d9c6a56031
SHA1562a6e09c3799023afec7d69f9853efbad4f186d
SHA256a32a2e4e54d931f377b53a4d7f36bb16f618409fb8cf4c20f789975063ce7dd3
SHA51276bf23a0d95d134a90e408dc85fd4b18d9a2a105116d6ba5c6deb97645c481f0be0cf4617be6df5c1f28808dcbd5b6909fbd4de837328ba1c2ebd163db2a33f6
-
Filesize
129KB
MD5102f96d6c3fbbe7e57f89f3dde8f38f6
SHA130fbb2bd9ca2258d7da1012161e3f08b5ca5b30c
SHA2565f8246e31360bf2ba18851fad3692471546ea9af8146823a0f77748b3d60cf8d
SHA512f3b2e28474737be835b78cca59f05a1b8c61ff8e8bcd4b61df0de8a870def92f8b444c87a099a7855ac1b3313afad8ba2d94317c31a963eda9a8fb1eea46726c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e