Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    11-11-2023 14:16

General

  • Target

    NEAS.6859b388a9d83d02a57f5081a74acad0.exe

  • Size

    111KB

  • MD5

    6859b388a9d83d02a57f5081a74acad0

  • SHA1

    c48b9ace80cd328210f7d630eb3655339977eb1e

  • SHA256

    36ea141e35ff3647e1d25f3f7aaa52dafb9bfb387ddb702fa85d5dc7d8312193

  • SHA512

    45a20fee79100ef0e22d69bf99ab6df46e8c054dde80855743b2d43dbcf5266ff26a1246de03061cbcaf0504e11f079f585267439400250bcf2d7e6c3ef1f1dd

  • SSDEEP

    1536:B+bAQRcW6FSM91qQIwiOFJlRxMD029+DVe+bhDqI64QWezCrAZujV6D1:UbTcWWSJOzlPOqbxqH4QWezCrAZujA1

Score
10/10

Malware Config

Signatures

  • ToxicEye

    ToxicEye is a trojan written in C#.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.6859b388a9d83d02a57f5081a74acad0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.6859b388a9d83d02a57f5081a74acad0.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"
      2⤵
      • Creates scheduled task(s)
      PID:2684
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpCFAE.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpCFAE.tmp.bat
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\system32\tasklist.exe
        Tasklist /fi "PID eq 2212"
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:2984
      • C:\Windows\system32\find.exe
        find ":"
        3⤵
          PID:2532
        • C:\Windows\system32\timeout.exe
          Timeout /T 1 /Nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:2636
        • C:\Windows\system32\tasklist.exe
          Tasklist /fi "PID eq 2212"
          3⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:2584
        • C:\Windows\system32\find.exe
          find ":"
          3⤵
            PID:2592
          • C:\Windows\system32\timeout.exe
            Timeout /T 1 /Nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:2424
          • C:\Users\ToxicEye\rat.exe
            "rat.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2932
            • C:\Windows\System32\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"
              4⤵
              • Creates scheduled task(s)
              PID:788
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 2932 -s 1640
              4⤵
                PID:1692

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmpCFAE.tmp.bat

          Filesize

          214B

          MD5

          ea3ba35083307ec10f36dbf41b584ad8

          SHA1

          a3f07cc69ac75649e12237a2f728129fbe7a40d7

          SHA256

          53ba3bde9b18b519d2f3a0c908d233719979d567acfc2dd938c9c8b6accadeea

          SHA512

          af9dcd8c19b7ef42e511b9b311789dfa947f4fa3962ec4a88ef8e1056a94ea2d965b4349f8858c9251462b2644f0aca5a89d065e0d41c4a589f3bddc5954bdc6

        • C:\Users\ToxicEye\rat.exe

          Filesize

          111KB

          MD5

          6859b388a9d83d02a57f5081a74acad0

          SHA1

          c48b9ace80cd328210f7d630eb3655339977eb1e

          SHA256

          36ea141e35ff3647e1d25f3f7aaa52dafb9bfb387ddb702fa85d5dc7d8312193

          SHA512

          45a20fee79100ef0e22d69bf99ab6df46e8c054dde80855743b2d43dbcf5266ff26a1246de03061cbcaf0504e11f079f585267439400250bcf2d7e6c3ef1f1dd

        • C:\Users\ToxicEye\rat.exe

          Filesize

          111KB

          MD5

          6859b388a9d83d02a57f5081a74acad0

          SHA1

          c48b9ace80cd328210f7d630eb3655339977eb1e

          SHA256

          36ea141e35ff3647e1d25f3f7aaa52dafb9bfb387ddb702fa85d5dc7d8312193

          SHA512

          45a20fee79100ef0e22d69bf99ab6df46e8c054dde80855743b2d43dbcf5266ff26a1246de03061cbcaf0504e11f079f585267439400250bcf2d7e6c3ef1f1dd

        • memory/2212-0-0x0000000000E40000-0x0000000000E62000-memory.dmp

          Filesize

          136KB

        • memory/2212-1-0x000007FEF5160000-0x000007FEF5B4C000-memory.dmp

          Filesize

          9.9MB

        • memory/2212-2-0x0000000000480000-0x0000000000500000-memory.dmp

          Filesize

          512KB

        • memory/2212-4-0x000007FEF5160000-0x000007FEF5B4C000-memory.dmp

          Filesize

          9.9MB

        • memory/2212-5-0x0000000000480000-0x0000000000500000-memory.dmp

          Filesize

          512KB

        • memory/2212-8-0x000007FEF5160000-0x000007FEF5B4C000-memory.dmp

          Filesize

          9.9MB

        • memory/2932-12-0x0000000000880000-0x00000000008A2000-memory.dmp

          Filesize

          136KB

        • memory/2932-13-0x000007FEF4770000-0x000007FEF515C000-memory.dmp

          Filesize

          9.9MB

        • memory/2932-14-0x000007FEF4770000-0x000007FEF515C000-memory.dmp

          Filesize

          9.9MB