Analysis
-
max time kernel
69s -
max time network
78s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
TradingView Desktop.zip
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
TradingView Desktop.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
TradingView_Desktop_(password_github).zip
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
TradingView_Desktop_(password_github).zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
DAC/bin/SqlPackage.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
DAC/bin/SqlPackage.exe
Resource
win10v2004-20240508-en
General
-
Target
TradingView_Desktop_(password_github).zip
-
Size
128.4MB
-
MD5
c5385621c00d45f6819e4e6e72df7a75
-
SHA1
a514cf982c8ee5478ff06d302943a4231e983b25
-
SHA256
6886b82579e34545cad4366f42b8f0d9847d685cbd490d4601f589b7a8ef4300
-
SHA512
1bb8b0fc2b0d129c542b55e7ee9d7cd60fcfc82a1dd8f688ba6f3400c7de23c24511cc8d8b0d2e08e3a5c875009f1fa9c06be30986a6a9cd92ec2fc051c46b35
-
SSDEEP
3145728:YcIC0MaZFniG3LWVQBfWlC8ykvhHDlpWH+igKcCKBUyG:Yc4lHLWkV8ykv7p2+igAD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133614091370996543" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3592 chrome.exe 3592 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3592 wrote to memory of 516 3592 chrome.exe 114 PID 3592 wrote to memory of 516 3592 chrome.exe 114 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 1568 3592 chrome.exe 115 PID 3592 wrote to memory of 3572 3592 chrome.exe 116 PID 3592 wrote to memory of 3572 3592 chrome.exe 116 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117 PID 3592 wrote to memory of 3176 3592 chrome.exe 117
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\TradingView_Desktop_(password_github).zip1⤵PID:2700
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4356,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=4744 /prefetch:81⤵PID:1332
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x120,0x124,0x128,0xf8,0x12c,0x7ffafad5ab58,0x7ffafad5ab68,0x7ffafad5ab782⤵PID:516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1916,i,15792687677110604698,14991814476406500216,131072 /prefetch:22⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1916,i,15792687677110604698,14991814476406500216,131072 /prefetch:82⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2268 --field-trial-handle=1916,i,15792687677110604698,14991814476406500216,131072 /prefetch:82⤵PID:3176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3092 --field-trial-handle=1916,i,15792687677110604698,14991814476406500216,131072 /prefetch:12⤵PID:3496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1916,i,15792687677110604698,14991814476406500216,131072 /prefetch:12⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4300 --field-trial-handle=1916,i,15792687677110604698,14991814476406500216,131072 /prefetch:12⤵PID:5304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4288 --field-trial-handle=1916,i,15792687677110604698,14991814476406500216,131072 /prefetch:82⤵PID:5340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4608 --field-trial-handle=1916,i,15792687677110604698,14991814476406500216,131072 /prefetch:82⤵PID:5352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 --field-trial-handle=1916,i,15792687677110604698,14991814476406500216,131072 /prefetch:82⤵PID:5564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4632 --field-trial-handle=1916,i,15792687677110604698,14991814476406500216,131072 /prefetch:82⤵PID:5636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1916,i,15792687677110604698,14991814476406500216,131072 /prefetch:82⤵PID:5688
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af