Analysis
-
max time kernel
281s -
max time network
274s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 17:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://rnwinternational.com/get/
Resource
win10v2004-20240802-en
General
-
Target
https://rnwinternational.com/get/
Malware Config
Extracted
vidar
11
375b94c37c085fa071ae0bb3b36a96d3
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Signatures
-
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/544-467-0x0000000000BD0000-0x000000000171D000-memory.dmp family_vidar_v7 behavioral1/memory/544-559-0x0000000000BD0000-0x000000000171D000-memory.dmp family_vidar_v7 -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation TradingView Premium Desktop.exe -
Executes dropped EXE 1 IoCs
pid Process 544 TradingView Premium Desktop.exe -
Loads dropped DLL 2 IoCs
pid Process 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TradingView Premium Desktop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TradingView Premium Desktop.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString TradingView Premium Desktop.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 848 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133723637871216774" chrome.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 3316 chrome.exe 3316 chrome.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 544 TradingView Premium Desktop.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3316 chrome.exe 3316 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeRestorePrivilege 1148 7zG.exe Token: 35 1148 7zG.exe Token: SeSecurityPrivilege 1148 7zG.exe Token: SeSecurityPrivilege 1148 7zG.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeRestorePrivilege 64 7zG.exe Token: 35 64 7zG.exe Token: SeSecurityPrivilege 64 7zG.exe Token: SeSecurityPrivilege 64 7zG.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe -
Suspicious use of FindShellTrayWindow 57 IoCs
pid Process 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 1148 7zG.exe 64 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3316 wrote to memory of 4084 3316 chrome.exe 89 PID 3316 wrote to memory of 4084 3316 chrome.exe 89 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 2852 3316 chrome.exe 90 PID 3316 wrote to memory of 848 3316 chrome.exe 91 PID 3316 wrote to memory of 848 3316 chrome.exe 91 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92 PID 3316 wrote to memory of 780 3316 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://rnwinternational.com/get/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc840ccc40,0x7ffc840ccc4c,0x7ffc840ccc582⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,15444549333818326805,18371002394288615205,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2128,i,15444549333818326805,18371002394288615205,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2160 /prefetch:32⤵PID:848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,15444549333818326805,18371002394288615205,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2440 /prefetch:82⤵PID:780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,15444549333818326805,18371002394288615205,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:3372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,15444549333818326805,18371002394288615205,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4620,i,15444549333818326805,18371002394288615205,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4632 /prefetch:82⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4960,i,15444549333818326805,18371002394288615205,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4408 /prefetch:82⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3748,i,15444549333818326805,18371002394288615205,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3768 /prefetch:32⤵PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5008,i,15444549333818326805,18371002394288615205,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4640 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2120
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4088
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3916
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1996,i,5469445176230119590,7931734017267321834,262144 --variations-seed-version --mojo-platform-channel-handle=3988 /prefetch:81⤵PID:540
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:388
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap586:116:7zEvent29961⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1148
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap22628:152:7zEvent63871⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:64
-
C:\Users\Admin\Downloads\TradingView Premium Desktop.exe"C:\Users\Admin\Downloads\TradingView Premium Desktop.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:544 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\JKKEBGCGHIDH" & exit2⤵
- System Location Discovery: System Language Discovery
PID:1412 -
C:\Windows\SysWOW64\timeout.exetimeout /t 103⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:848
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=2784,i,5469445176230119590,7931734017267321834,262144 --variations-seed-version --mojo-platform-channel-handle=2300 /prefetch:31⤵PID:2392
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
649B
MD5817c651ea7da5b6e0d912a3a4bb80756
SHA10c0c9108df1582cfab0fdd0f619f17b87cfb6d09
SHA256cba0cc792038ef315eb617ebe1eb68fc3941d74738476df7bdb85cefeb1f3c27
SHA512b298e677386404c392e03c2881317048e2a4b52ab064813f69fcdda3c8752acd18ac264a57d09b2a65333b39b97cbb0957a49344714e0e83b5d115519d0c0bdc
-
Filesize
44KB
MD57ce32692a7bec45c05946b437e030b26
SHA191089102e0221d95d370372d912c212af71c5269
SHA256dc7fa5405e07f36bcb1edcfe444ffa3e3de447fc8b7122e4bf9122869aeac1c9
SHA5120a2e47606ffa0b585c045d3cdc2f0bf2f63b6cf700abbaa182350f40188b7b80969eecf01a744b8c319d9baae6ebf902c00166047825bb01efc573c487c29b79
-
Filesize
264KB
MD5b4d9fc31bb95b4591c754a52f1727c4a
SHA1d75764b07590698e42cf14b83115321976d0839b
SHA2567072c9415a5a8dc0837d9728f45cc42b2afd51faf7590a53ca5bc912564d76df
SHA512c32a9011bb4f5dd16ece5aae5d5bfc511e62493832c915afd3bf346062b59b72fc9a304543e9c576348cf9a14afb45bac3f44f6082d9d08d8b01b05301cced68
-
Filesize
1.0MB
MD5a14adbf12328eedde3f49494abe4de26
SHA165b8ed0a6d09b1f94341341e691e1c87e442db29
SHA2564e4d6f930448c69bdf6aa163bf3cb5f96a40617f3950f8862276e454ca17659e
SHA512522b82fe5b8e150b7aa591d313d07e861d01aefc760ee31aed9650a9f3016d459602aaf9692917341c85daa2c6e9364ebdb9dc63f4514169c7bd3f6f1fd8aa9f
-
Filesize
160KB
MD5680c8b8823b7d60fe3e68688ea4883ae
SHA1b12c394c37fb25eef3e3c8a588961fc0d31d32aa
SHA256e75920f971faa88e975703aa4e176808af9d510776de2ccbbbabe6db49dd3d56
SHA512f3232f580ae0541d6db23f6ee58907106df74609c10c0453faf9f39b818c7813b79df9e9b03011d7ab163c4d37c62b3dabed0d6d1c34d18ef0feaef9e86387f0
-
Filesize
36KB
MD54ca976bcf79d7b86bcbfc1c4d6fc28f4
SHA1066d85a6273fa0e20928ff1b6b3bf2c72d31d649
SHA2562136f87c57bffc725d15ed3418ad94626a182b4e8995924af7671740bc088faa
SHA512eefa6564fc405525a3a59ff083c4c42402afa0b55d47b367691eebf2d5aa0646f28fac91049e12e6bc215d13a3e754194058fbe0090458cf11924b5cdac61994
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5f4680473bdfa95d4fc15975929e91ee1
SHA167d2cff0d3e6107de4e95fa17b80c95944138f1c
SHA25660920c23ca46b5f85ab3d1d8dd2d591870556eb29fb332d148333bf80c117298
SHA5125d02103145316abc6a63f0075d272e468aad15ba9b215eadfae7876d2167a7af39894408cfa2d523c1720186259ac99944fcba08453e620c5930038c6da746ba
-
Filesize
9KB
MD53ce36f797990342c2c36cad0e30beeae
SHA1722b137de032491b8bc8248921719187570987d9
SHA25690a6b7fadc961a17dbdd4b061dc8e744d5a24dcf6ac106591fb8961ca3b3b95f
SHA5120c866584c958bd69f3bbdc4dd502ff8472b05a75accf6aabb7858a41187f3678a105d38af0fa7f1d8940fa67484b66386f6b3f9eec79c80fdf53dbc646cfc8a0
-
Filesize
9KB
MD55332d233ee7470c265e12cac57ee8d34
SHA14d1a86ff10a6e692f89f3771622bc23d65a0c4cc
SHA2567a2501d5946da0def6d3d013e9a3e9838bdedcba1287a296e3bd644eefe71557
SHA51220e1b77ce955152d2e1e3f77b2c55ba39fd70eb74dda8c47802731876e4ba9d0535d7b98b0a2978e62ef353ddfd3aa03b0e1fb0ac64c3330c1402f0dc196d2c3
-
Filesize
9KB
MD532147d553e10d237d3a19be2ba8fed86
SHA199d04be3c6b2a88d80ca1a0c886a19d65c4ade20
SHA256273faa3e388bc7d662533090119fbec4ae14948def22c6aea5ac7896a02f7217
SHA5120ccb22e63bee76a992f8952237e851dccf8eb8cb73df437a15ec2647ae7b112b581ad4784448a9b9ae63ae7d16b43413dded11cfb9c526d0d923a3d74456e0ea
-
Filesize
9KB
MD58f50deb4e4e10f5798b9f23d2c183d29
SHA1a6be72464d3e665e72e788790ad8d259f14f94f0
SHA256f898b26accccaf8f0fc7ad414bce22f3bb5c89cf775dbc254a2ce8b4be9e1972
SHA512881c1abf1c56910d47347994e2d49810fd0416b5259b98f9edfc1131fde386a522715c8753128056964d38ac2e5c214b676cca642b83bf1c541fdb5bbae4967a
-
Filesize
9KB
MD5ded571b0d206bb08c831d1aa4556cbf3
SHA112c6542941e4375452107021bb5ff0f26333244a
SHA256bc99b10d74c59d0c837d4ed8025cbddac38d0dc6198c3839a99567ab4ad1616a
SHA512503b8b7d05413c650ef78e395ebce3f4ee1b0aa7f93df9c317ce2535ef3fc8c1c6e1fd3b70f79882c9345bd18717007dcc7398cf3c7f21c078f2d1e31f366c1b
-
Filesize
9KB
MD57a25ec403539b3382d6630c75c2fc3bc
SHA102af1f1b33efdc6f9048180498424ee8b3a9b0af
SHA25661cb2edc0dbc24dbbd707ff38d45e9706756e801e622315e180b8cd1c6004445
SHA512e37df1ff9daec0644942c85bb875b5ee8e55907cc6d818857eb90347c7062a047133e262301f4dfd667d570ee158d750900646f6666848e17966fe0055b132bf
-
Filesize
9KB
MD559d625c1bf701318718a4969b4a54152
SHA1adfabb24466cda91b20a80eac0adaeb149cb2a56
SHA256e7c4f5f61f3d7c706105c08951bdc8d5ac4271367980200c6b75e0b399145dd3
SHA5125ec95b6b5fbae4335292a681667752cbc740f0ee56ad879aaf20196675c8fcba9b0d4c9d131a9a928bb66cfd60279fd460367cf122d0ec5f015530a4042a4684
-
Filesize
9KB
MD51ae3b35a5bdc551ddabdd1eeb8917c76
SHA1a1ad68a0131402c36e9e91d4897c4912781d0f6d
SHA25638893a55edb14306139535b627505015bb33ecd8e84dea52648c379a493a34ca
SHA5129bb390afbb614a7f6a733f596f19e7192f65c760aae4b13027ea63a46db47390da5d1101b933801fe34c27294af28ab9e6f56f0f11aec1856722cbc0ba3e4a17
-
Filesize
9KB
MD589e5aeeb8de994837dcedc1db45b31ee
SHA17ca98dd10f0bd27164f113f11d3736953f430ab0
SHA2565691acf28c9dbdab6f10ccdffaf70002e4ac2b6d55b41615f1ea7da89a30c81f
SHA51267310db34c9c0390015e5439caf76f66a019cdaf05298c4c20fdbee04421c83a17b7936f9baaf3e9d554436dbb809e31fed9fab085bedc67a8a8f4508f0f38c5
-
Filesize
9KB
MD561a77661bb5124dc351a1dd739af29fc
SHA105a3f3ab59463ed4c87714d4eba115618723e952
SHA2562eab6d8c11a10f74b896ac657041f90cfe295babb6729c89aad740eeb1e464f4
SHA51270af75ccccb80d5bcc57f392b51704ec97f7d9371bcb5c0eea96b35ee08eb96153691b4ae16f7a09a27c4432b35518ef170be952e81b2768b142e6c42a772076
-
Filesize
9KB
MD59c7f5930801bb3c2f09bb3d25044eea0
SHA1dbcd62ea7516f21ad1621cd76ce543309eefea65
SHA2562e4306bba3eaad501f74b24d5a705d64793e328848daeb0664bd047d8dd0c6cc
SHA512b73d7648887ae213b4706e7150aa9a99ecc41174193e09297ebad69858a41600d4e50bdec5abf7c867b3ece29f83897e020f0161602dc376e3c4788f2cfae712
-
Filesize
9KB
MD584a4105663f0272c6008d007361eb326
SHA18e4f2a744c46522d6ca1d2fe370d67ae8506e6ef
SHA2566266413c58f4c2423c6e744f87e1e1f200fe5abd38d23f020405fe667cca69b3
SHA512e096483567bcf76fc49cf86ee434f94a925cd40ff6e7d5450ccacb720c54cb0d27fce654d30c467d08c3d39406d35ea1315e773f68d922a60466e3ce8bc7abf2
-
Filesize
9KB
MD572c0dbafa2eba27fc5a95a0abe2e627f
SHA1293dcbdd582ab997318df80140e3252564375629
SHA256f3effcba1e36ad712a96ca10533353cb05c85fd3c3646a4355411753b1c22b2b
SHA512467c6e59d9105e731c5c0c57bf25e2291037a8ab2c023a19ec33ab290d9393567928cabe8d9d0879530a546c272267e2bfce78749af82d67c24cd615d2b89cb3
-
Filesize
99KB
MD58cfbb5b20d7c26f5a3dd34104b9c95a1
SHA107ba9b2ce143f7127b2d1eb741b9a3be8d87b8e2
SHA25609550929fe8568ad1345c53f5a8f94105b5d8259afc1056f66836550ca2bdfd1
SHA512cdf250779ce7b753888c9917f61b0046d2ee3b82b628103f4c304d479c17d19df6e83419e32f2db8d5f1ab03ae4be9aeef0d26d7634e7c422c1f29da7a06fa09
-
Filesize
99KB
MD53d44a6a57b9842ad72d76b8138bd2e5a
SHA13f5943868fa930d0dc4d5028b67902fb97712844
SHA2566bc918e6874bd4e9adf1ec759832821132b325ed75517054b38874f0101ec028
SHA5121a7532ca1fd2197356a007b45f09c21a420b1042cee79d4cf38ad60a5f6b14a53f1b778d6b652a11165d8e46c68521ace4e9691e2ccef64bf1677c78273a5439
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
23KB
MD55e54cb9759d1a9416f51ac1e759bbccf
SHA11a033a7aae7c294967b1baba0b1e6673d4eeefc6
SHA256f7e5cae32e2ec2c35346954bfb0b7352f9a697c08586e52494a71ef00e40d948
SHA51232dcca4432ec0d2a8ad35fe555f201fef828b2f467a2b95417b42ff5b5149aee39d626d244bc295dca8a00cd81ef33a20f9e681dd47eb6ee47932d5d8dd2c664