Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2023 18:41

General

  • Target

    7a40ca48bc128c6eeff29d4a8cac46fa.exe

  • Size

    111KB

  • MD5

    7a40ca48bc128c6eeff29d4a8cac46fa

  • SHA1

    fa00aac627e3ebd38a724398264c81f2e5922063

  • SHA256

    e5b1c4c0553a9de4a7e5cea6bff98ffdb51ca04e3a9d1fce807621ac2bb74895

  • SHA512

    46be169801f7e49acc6fed273cd7649cc4b7cd486b5885574e187395702c95cb53b8fd848d36af587554653913609ff3ad26837be91505540623a45084fc3a23

  • SSDEEP

    3072:XbiZnYUuQaS+T8sERvc7LLqRI5LUluqb4qOhQW0zCrAZu6gO:uBYUuQaS+T8sERvc7yIalBbpn

Score
10/10

Malware Config

Extracted

Family

toxiceye

C2

https://api.telegram.org/bot1929200100:AAFApHmZ6GD9WbEolE1gi0bnOTW4ipj-SSA/sendMessage?chat_id=1917426247

Signatures

  • ToxicEye

    ToxicEye is a trojan written in C#.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a40ca48bc128c6eeff29d4a8cac46fa.exe
    "C:\Users\Admin\AppData\Local\Temp\7a40ca48bc128c6eeff29d4a8cac46fa.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3772
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Alien\Alien.exe"
      2⤵
      • Creates scheduled task(s)
      PID:928
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp7417.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp7417.tmp.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3704
      • C:\Windows\system32\tasklist.exe
        Tasklist /fi "PID eq 3772"
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:4952
      • C:\Windows\system32\find.exe
        find ":"
        3⤵
          PID:4340
        • C:\Windows\system32\timeout.exe
          Timeout /T 1 /Nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:1680
        • C:\Users\Alien\Alien.exe
          "Alien.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:380
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Alien\Alien.exe"
            4⤵
            • Creates scheduled task(s)
            PID:1544

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp7417.tmp.bat

      Filesize

      208B

      MD5

      63ae0611a6aa5d42097c192c54e53f1a

      SHA1

      29c2770aac23ffcba4075e978be60f65a9555eca

      SHA256

      a0568fe66549ffe4825acf615782111e5d136c9cf8dbe9fcb59541c5a01fc3d4

      SHA512

      c67da1794e5694f40ab2163c9281c63369a72b5de5d4252879bc1d981da5c4ee30e15c8f84607d69b98fdafdc82e3217d388895c851533abd98d8d818a5957fc

    • C:\Users\Alien\Alien.exe

      Filesize

      111KB

      MD5

      7a40ca48bc128c6eeff29d4a8cac46fa

      SHA1

      fa00aac627e3ebd38a724398264c81f2e5922063

      SHA256

      e5b1c4c0553a9de4a7e5cea6bff98ffdb51ca04e3a9d1fce807621ac2bb74895

      SHA512

      46be169801f7e49acc6fed273cd7649cc4b7cd486b5885574e187395702c95cb53b8fd848d36af587554653913609ff3ad26837be91505540623a45084fc3a23

    • memory/380-12-0x000002349A040000-0x000002349A050000-memory.dmp

      Filesize

      64KB

    • memory/380-11-0x00007FFCE9B50000-0x00007FFCEA611000-memory.dmp

      Filesize

      10.8MB

    • memory/380-13-0x000002349A040000-0x000002349A050000-memory.dmp

      Filesize

      64KB

    • memory/380-14-0x00007FFCE9B50000-0x00007FFCEA611000-memory.dmp

      Filesize

      10.8MB

    • memory/380-15-0x000002349A040000-0x000002349A050000-memory.dmp

      Filesize

      64KB

    • memory/380-16-0x000002349A040000-0x000002349A050000-memory.dmp

      Filesize

      64KB

    • memory/3772-0-0x0000019DBE6A0000-0x0000019DBE6C2000-memory.dmp

      Filesize

      136KB

    • memory/3772-1-0x00007FFCE9B50000-0x00007FFCEA611000-memory.dmp

      Filesize

      10.8MB

    • memory/3772-2-0x0000019DBEB00000-0x0000019DBEB10000-memory.dmp

      Filesize

      64KB

    • memory/3772-6-0x00007FFCE9B50000-0x00007FFCEA611000-memory.dmp

      Filesize

      10.8MB