Analysis
-
max time kernel
569s -
max time network
599s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 02:41
Behavioral task
behavioral1
Sample
Vanta Loader.exe
Resource
win7-20241010-en
General
-
Target
Vanta Loader.exe
-
Size
203KB
-
MD5
79f7a0a3ba719b25ca6166e794f7d2f1
-
SHA1
80bf9c6c15c5d6bae6970f0a6d96f17525e4f2d8
-
SHA256
a427b8231cb4b763971bba0105900049e70309c6fb1d9c2ab975f01e6d9533ed
-
SHA512
340401e6d0cf89daa8dd934102261e8e4c15387a9341f0678d785308f41c6ca91794c3c59dea0180dbbd956d9a2fea6e10910824d462aa4e26d4277ca7e8fa0f
-
SSDEEP
3072:AzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIlTpbjZhDkIIRL+XYMQbWmlekJ:ALV6Bta6dtJmakIM5cz9XYMQb3bYbxls
Malware Config
Signatures
-
Nanocore family
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LAN Service = "C:\\Program Files (x86)\\LAN Service\\lansv.exe" Vanta Loader.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Vanta Loader.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\LAN Service\lansv.exe Vanta Loader.exe File opened for modification C:\Program Files (x86)\LAN Service\lansv.exe Vanta Loader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vanta Loader.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings Vanta Loader.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe 3076 Vanta Loader.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3076 Vanta Loader.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3076 Vanta Loader.exe Token: SeDebugPrivilege 3076 Vanta Loader.exe Token: 33 1552 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1552 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3848 OpenWith.exe 3848 OpenWith.exe 3848 OpenWith.exe 3848 OpenWith.exe 3848 OpenWith.exe 3848 OpenWith.exe 3848 OpenWith.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Vanta Loader.exe"C:\Users\Admin\AppData\Local\Temp\Vanta Loader.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3076
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4dc 0x2ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3848
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2