Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2024, 03:14

General

  • Target

    VANTA private.exe

  • Size

    2.7MB

  • MD5

    df31ea01796208c0dceb8a5cf56ffbae

  • SHA1

    634007f056d056b6a87e9d776591f5c899090576

  • SHA256

    d448511350e143ce0ee7df4cc015c6e4b62fe41fc0eb14ac8eded0440e736866

  • SHA512

    d6b551b497f2037ef96ae8fa50f2bd0d9f65539fe140469b7d936c2508feaa9fd0176c6a582338fc411052c1462c21d71f4717e80e1f50d877873a93598baafe

  • SSDEEP

    49152:WXzhpDtKSK1cb8PGK+Tfuqmpc3elWo8GnQAsYZEVIkRW:WXzhW148Pd+Tf1mpcOldJQ3/V6

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 5 IoCs
  • Themida packer 18 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Drops file in Windows directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 47 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VANTA private.exe
    "C:\Users\Admin\AppData\Local\Temp\VANTA private.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3120
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3496
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2904
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1072
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Drops file in System32 directory
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3708
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:3856
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /7
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    2.6MB

    MD5

    bfc60beb9c3172499479b56c56e4deb3

    SHA1

    f239a5480f83594deeeae72871a0ff94f4d2aa0c

    SHA256

    d53f1948b3d79d97ac738fa3dbcfeefa301c77c99691e1902a80b009f89ab792

    SHA512

    94603c670cbe80c360987eb9012b49a40261cf24f9339b2655e70d45f401bd803cf616275b7ba0f014885b7ee6c5f774a88661d5bd3c524e9954e99858cd52cb

  • C:\Windows\Resources\Themes\icsys.icn.exe

    Filesize

    2.6MB

    MD5

    d74d80fb13174ab7f44bae29f16a7ce9

    SHA1

    7e2a7b26523bdb70df50ca924e8ae348a08cc168

    SHA256

    be7cb333ce60a4e5d3cc325dd52e14e43277bc8ec874be6bc414dc7995e04787

    SHA512

    beb01a47787f02b72e56ae35a5973dabdf72c98b401b9bb714a84498707b987a0f5f6feb521081fdeed2f0d8daf38b3a6b7a718c772ddde8d43351611d4664ef

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    2.6MB

    MD5

    045689eaa51f9aff14d2c42ac5cedb2c

    SHA1

    a6adb544a2568c38dbdf0b62119cab1f4e2e6d39

    SHA256

    26333178c3e6bd50cb7b49ba86c76a76272bf5ddf0c0eec17c33da991e386775

    SHA512

    8176d231b80b9808ee03a55ec4c1c42a7ac840fd9ab438ba73045864be88be8275832197fe68c4a5292960fc82a58ecb27435448a03e18d47915632f875f7bf0

  • C:\Windows\Resources\svchost.exe

    Filesize

    2.6MB

    MD5

    462bdfa07d9f74e38f78ff0088d0f531

    SHA1

    9268ca5eae7a2a5dd9b6191a540ff7c84794e5e1

    SHA256

    89cfe016451d5d1ffc172282ed6237d30792f8040a54f035fc91dca67ea00e24

    SHA512

    052212e4320b066e512a575d619a7a356f3ebac3fc2fb94ec03ebcecf41ea065a3f6f165c89e12d41e498c3b3fb50e9a320d88f2795467ad62de4fbb2f2fd8e2

  • memory/1072-28-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/1072-49-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/2512-74-0x00000292A3740000-0x00000292A3741000-memory.dmp

    Filesize

    4KB

  • memory/2512-73-0x00000292A3740000-0x00000292A3741000-memory.dmp

    Filesize

    4KB

  • memory/2512-69-0x00000292A3740000-0x00000292A3741000-memory.dmp

    Filesize

    4KB

  • memory/2512-70-0x00000292A3740000-0x00000292A3741000-memory.dmp

    Filesize

    4KB

  • memory/2512-75-0x00000292A3740000-0x00000292A3741000-memory.dmp

    Filesize

    4KB

  • memory/2512-72-0x00000292A3740000-0x00000292A3741000-memory.dmp

    Filesize

    4KB

  • memory/2512-71-0x00000292A3740000-0x00000292A3741000-memory.dmp

    Filesize

    4KB

  • memory/2512-64-0x00000292A3740000-0x00000292A3741000-memory.dmp

    Filesize

    4KB

  • memory/2512-65-0x00000292A3740000-0x00000292A3741000-memory.dmp

    Filesize

    4KB

  • memory/2512-63-0x00000292A3740000-0x00000292A3741000-memory.dmp

    Filesize

    4KB

  • memory/2904-78-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/2904-53-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/2904-18-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/2904-80-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/2904-88-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/3120-1-0x0000000077E54000-0x0000000077E56000-memory.dmp

    Filesize

    8KB

  • memory/3120-52-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/3120-0-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/3496-51-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/3708-37-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/3708-55-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/3708-79-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB

  • memory/3856-46-0x0000000000400000-0x0000000000A16000-memory.dmp

    Filesize

    6.1MB