Overview
overview
7Static
static
3VantaFN.exe
windows7-x64
7VantaFN.exe
windows10-2004-x64
7$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/app-64.7z
windows7-x64
3$PLUGINSDIR/app-64.7z
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
3LICENSES.c...m.html
windows10-2004-x64
5VantaFN.exe
windows7-x64
1VantaFN.exe
windows10-2004-x64
7d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1resources/elevate.exe
windows7-x64
3resources/elevate.exe
windows10-2004-x64
3vk_swiftshader.dll
windows7-x64
1vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows7-x64
1vulkan-1.dll
windows10-2004-x64
1$PLUGINSDI...7z.dll
windows7-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 01:47
Static task
static1
Behavioral task
behavioral1
Sample
VantaFN.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
VantaFN.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/app-64.7z
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/app-64.7z
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
LICENSES.chromium.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
LICENSES.chromium.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
VantaFN.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
VantaFN.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
ffmpeg.dll
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
ffmpeg.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
libEGL.dll
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
libEGL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
libGLESv2.dll
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
libGLESv2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
resources/elevate.exe
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
resources/elevate.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
vk_swiftshader.dll
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
vk_swiftshader.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
vulkan-1.dll
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
vulkan-1.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/app-64.7z
-
Size
76.0MB
-
MD5
2625d430807a9c1cdcf0e106901e3108
-
SHA1
940019e1c5f49374c65d514af06d6adcebd2f892
-
SHA256
f25354b9c10caea58a8d3890842948095843fe273c4254fd12c9d798a263e85a
-
SHA512
f7bdd85642279f3570ecdd888e005d8835b48cae17ec20987a59d794607bfeb7233e5c61c9074fa58898d984b8a57e6436117add78b38464122b8204bb0f4dc7
-
SSDEEP
1572864:KrziNx5qwB2NpjU5RSe84WxpoxIww8tpisRLyqZyBHMmJlNcE/Lhz0:dx5qg2NpjBMuAPLVZyBRlNciVz0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2432 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2432 AcroRd32.exe 2432 AcroRd32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2644 2972 cmd.exe 32 PID 2972 wrote to memory of 2644 2972 cmd.exe 32 PID 2972 wrote to memory of 2644 2972 cmd.exe 32 PID 2644 wrote to memory of 2916 2644 rundll32.exe 33 PID 2644 wrote to memory of 2916 2644 rundll32.exe 33 PID 2644 wrote to memory of 2916 2644 rundll32.exe 33 PID 2916 wrote to memory of 2432 2916 rundll32.exe 35 PID 2916 wrote to memory of 2432 2916 rundll32.exe 35 PID 2916 wrote to memory of 2432 2916 rundll32.exe 35 PID 2916 wrote to memory of 2432 2916 rundll32.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z1⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2432
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ca1851759adfc2e6e47681043c26d64b
SHA12e3a932c9a04b6798e9023529375451cd7e7a6f2
SHA25642a8ff128ebf6078367fc478c768de15c3a51b6da6bbbe2a93958ae198e2258d
SHA512a9b8112a0f664a7fcbc8c4b14ccd4e8c19476137dd25f253dc06f7864668b8ce46c153c18a05b952bbc2446a4dc430c9f9590d2460022cbd014e56e5c3ac3ea1