Overview
overview
7Static
static
3Vanta-Loader.exe
windows10-2004-x64
7Vanta-Loader.exe
windows11-21h2-x64
7$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3LICENSES.c...m.html
windows10-2004-x64
1LICENSES.c...m.html
windows11-21h2-x64
1d3dcompiler_47.dll
windows10-2004-x64
1d3dcompiler_47.dll
windows11-21h2-x64
1ffmpeg.dll
windows10-2004-x64
1ffmpeg.dll
windows11-21h2-x64
1libEGL.dll
windows10-2004-x64
1libEGL.dll
windows11-21h2-x64
1libGLESv2.dll
windows10-2004-x64
1libGLESv2.dll
windows11-21h2-x64
1resources/elevate.exe
windows10-2004-x64
1resources/elevate.exe
windows11-21h2-x64
1runtimebroker.exe
windows10-2004-x64
7runtimebroker.exe
windows11-21h2-x64
1vk_swiftshader.dll
windows10-2004-x64
1vk_swiftshader.dll
windows11-21h2-x64
1vulkan-1.dll
windows10-2004-x64
1vulkan-1.dll
windows11-21h2-x64
1$PLUGINSDI...7z.dll
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows11-21h2-x64
3Analysis
-
max time kernel
58s -
max time network
52s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-06-2024 06:18
Static task
static1
Behavioral task
behavioral1
Sample
Vanta-Loader.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
Vanta-Loader.exe
Resource
win11-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win11-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240426-en
Behavioral task
behavioral7
Sample
LICENSES.chromium.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
LICENSES.chromium.html
Resource
win11-20240508-en
Behavioral task
behavioral9
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
d3dcompiler_47.dll
Resource
win11-20240426-en
Behavioral task
behavioral11
Sample
ffmpeg.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
ffmpeg.dll
Resource
win11-20240419-en
Behavioral task
behavioral13
Sample
libEGL.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
libEGL.dll
Resource
win11-20240426-en
Behavioral task
behavioral15
Sample
libGLESv2.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
libGLESv2.dll
Resource
win11-20240508-en
Behavioral task
behavioral17
Sample
resources/elevate.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
resources/elevate.exe
Resource
win11-20240426-en
Behavioral task
behavioral19
Sample
runtimebroker.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
runtimebroker.exe
Resource
win11-20240508-en
Behavioral task
behavioral21
Sample
vk_swiftshader.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
vk_swiftshader.dll
Resource
win11-20240426-en
Behavioral task
behavioral23
Sample
vulkan-1.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
vulkan-1.dll
Resource
win11-20240426-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win11-20240508-en
General
-
Target
LICENSES.chromium.html
-
Size
6.4MB
-
MD5
c3528648bedbde1223a2faab1a3f9af3
-
SHA1
934d3c8f184258338ff380964ed89053ce69ac5b
-
SHA256
57b8e5a3f2cd62805001aefca035c7348b4d1abac157e6df3d798bb31f2ec3d2
-
SHA512
3e3cc0fd7a55f67ee0afff9696beef33bdc9524375bbe9d8e8f7660fd408c756c1156ca0b02ecccdc22799c7b8e74dbde012732ad6b3ebe0a3cfc54ff5132b35
-
SSDEEP
24576:d7t05kvWS99LVoFIUmf2p6y6E6c666r8HHdE/pG6:RI8j
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133625606402559285" chrome.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid Process 2180 chrome.exe 2180 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid Process 2180 chrome.exe 2180 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid Process Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeCreatePagefilePrivilege 2180 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid Process 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid Process 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid Process procid_target PID 2180 wrote to memory of 2584 2180 chrome.exe 77 PID 2180 wrote to memory of 2584 2180 chrome.exe 77 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 1472 2180 chrome.exe 78 PID 2180 wrote to memory of 4356 2180 chrome.exe 79 PID 2180 wrote to memory of 4356 2180 chrome.exe 79 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80 PID 2180 wrote to memory of 1684 2180 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffd156bab58,0x7ffd156bab68,0x7ffd156bab782⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1808,i,9278694756072283623,16624829101704040946,131072 /prefetch:22⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=1808,i,9278694756072283623,16624829101704040946,131072 /prefetch:82⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2104 --field-trial-handle=1808,i,9278694756072283623,16624829101704040946,131072 /prefetch:82⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1808,i,9278694756072283623,16624829101704040946,131072 /prefetch:12⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1808,i,9278694756072283623,16624829101704040946,131072 /prefetch:12⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4272 --field-trial-handle=1808,i,9278694756072283623,16624829101704040946,131072 /prefetch:82⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4396 --field-trial-handle=1808,i,9278694756072283623,16624829101704040946,131072 /prefetch:82⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1808,i,9278694756072283623,16624829101704040946,131072 /prefetch:82⤵
- Modifies registry class
PID:4772
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5c6c4a17f7eaf76c2f010174f9cface79
SHA128b3dabd9f9090b6a7ca685ebb0772fee17fde1e
SHA2564ed95d4fa30681789a1f7ef072bb890a0b3cab090fb6d0188379e2b900aaefcf
SHA51295df29f214b0e9e25812853c58adbcada6b62753cd747aacf917b2e5ca94129951f180cf0cb2832e97a43e2aa3c1418d8a999eba19911103f3199cc4c296ac3b
-
Filesize
129KB
MD57a25e515591993621edb68ace5a92e91
SHA1dd0b7928bc1e6672219c86c347d7d99a426331c6
SHA256e4f0f4a25aba8eb976fd9fa9b77fdad8f4d589c5f8b8a4cccb7bdaef306bf7c2
SHA512a1609c5e1e1de67422edd20a4653af120433fa86bda56a4e2213b310bac592647ba388315c054b31094e24f62f3ceb99c2a21a3fc33a1cf1c2f6be4bb113b914
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e