Analysis
-
max time kernel
56s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 17:15
Static task
static1
Behavioral task
behavioral1
Sample
eb65763fbd4c28c3afac6d08ab63c318.exe
Resource
win7-20231215-en
General
-
Target
eb65763fbd4c28c3afac6d08ab63c318.exe
-
Size
900KB
-
MD5
eb65763fbd4c28c3afac6d08ab63c318
-
SHA1
9297b49103ab3beff2851a441b4458a58a986fcc
-
SHA256
2aebd9a1bc61ad562d8f8e1115cf21247281b3f5e5ab41305406c5bdc7c4b0ff
-
SHA512
3397ec9a0b04e8c43bfabe1fbf30894e4bd973a46488252e6223ad4e41c869c5bf08aa4194b5f492f90c489909819ec6ae1e8dafbeb226470416a16d557f6288
-
SSDEEP
12288:W22iNv4sjaq8c+6Rq0mHtRAex8AIb2IRzQqX2Su9Oqql6c+NnHIbwhgT16Ovl:R1usjatrgPeyNcqXMjqlxEH+wlO
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot1912175024:AAFyX2DSTB35kTZDCQUzmiHwTx6F5gwOlaE/sendMessage?chat_id=1854909459
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
eb65763fbd4c28c3afac6d08ab63c318.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions eb65763fbd4c28c3afac6d08ab63c318.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
eb65763fbd4c28c3afac6d08ab63c318.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools eb65763fbd4c28c3afac6d08ab63c318.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
eb65763fbd4c28c3afac6d08ab63c318.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eb65763fbd4c28c3afac6d08ab63c318.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eb65763fbd4c28c3afac6d08ab63c318.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
eb65763fbd4c28c3afac6d08ab63c318.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum eb65763fbd4c28c3afac6d08ab63c318.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 eb65763fbd4c28c3afac6d08ab63c318.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4464 schtasks.exe 2208 schtasks.exe 4876 schtasks.exe 2052 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2944 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb65763fbd4c28c3afac6d08ab63c318.exe"C:\Users\Admin\AppData\Local\Temp\eb65763fbd4c28c3afac6d08ab63c318.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jgQtVF" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4735.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\eb65763fbd4c28c3afac6d08ab63c318.exe"{path}"2⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp5186.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp5186.tmp.bat3⤵
-
C:\Windows\SysWOW64\find.exefind ":"4⤵
-
C:\Windows\SysWOW64\tasklist.exeTasklist /fi "PID eq 2436"4⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\timeout.exeTimeout /T 1 /Nobreak4⤵
- Delays execution with timeout.exe
-
C:\Users\ToxicEye\rat.exe"rat.exe"4⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jgQtVF" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFBFF.tmp"5⤵
- Creates scheduled task(s)
-
C:\Users\ToxicEye\rat.exe"{path}"5⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"6⤵
- Creates scheduled task(s)
-
C:\Users\ToxicEye\rat.exe"{path}"5⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\eb65763fbd4c28c3afac6d08ab63c318.exe.logFilesize
1KB
MD5e08f822522c617a40840c62e4b0fb45e
SHA1ae516dca4da5234be6676d3f234c19ec55725be7
SHA256bd9d5e9f7fe6fcff17d873555d4077d15f7d6cdda1183e7f7d278b735ffe1fd7
SHA512894a7fb7bbc18ac6ba13378f58a7db80ad00d6080be9a66b01cae8e23e41d9d2d4cd53c1e20669356b73590c8a3ebfda4bdda3258f81240db56c4a81b7313fe4
-
C:\Users\Admin\AppData\Local\Temp\tmp4735.tmpFilesize
1KB
MD57f5c5c2e40c374c842b7424f2c54b0ca
SHA199201b442dc8b76a0edbe1444f9aff361f6a0f60
SHA256032003840f68fdb8a7142b4c97946898c9d573f6d9903f8b9c07662a2634770f
SHA5127ff4b63fde9dc756c0ecd5c0cd925ba86ae5b6d1a99cad6f430b6503017f2a6075695ec2c2d271994a38a54f1dd4d5158131589f082c6e8a7f58fb60af520351
-
C:\Users\Admin\AppData\Local\Temp\tmp5186.tmp.batFilesize
209B
MD56be6eaffaeaa4ffecea9485d34edbf94
SHA14f10161b92c14aaae5b5059414f85648395f98a8
SHA256ea55c64ecb1f751d51225cd6fa28842afc37b39e5f6927ea7a26fa1510196f92
SHA5126ac854941ffec39d1a176742d147e6cc8308330b4966eb96e1704bdd6944e956989b67042eeeffa3183ad19131d66d08f440b868c48ac3b2d5b0ceaebaee4957
-
C:\Users\ToxicEye\rat.exeFilesize
70KB
MD5deeafa23984d09b28a24a5ce66c7ac2e
SHA1b7ee18883151afb41dca7052ef0b8c05c5338c56
SHA256645ed3f41fb0dad1d210e754959682f43d5adc169b688948bf3df46f505c1cb6
SHA51299f1c9e6a01c979e248eaacda1c1bcb3ff6e1a94d57a024b0b42c3c766f1a00b9c476f4c6df4027774f0048b45a4d94231728e8047f0977c1e7b235ea52404e8
-
C:\Users\ToxicEye\rat.exeFilesize
79KB
MD522e195c9bfe7f705337f128690a9360b
SHA1eeb29d2759ac5f0c6054f8e48586ce957ccd0aca
SHA2566cb167ce3aacadefe0a85438b432e87d70e86dc9bb4643ec4a8bfe4a656138af
SHA5124a092bb4c485955fa214479f538e477305fb54f6ba133729a076eecdb51347be03627181da464c3e76dfc5ae5a6231d9911f3f548b67e92c5a9a124cd03b1d09
-
C:\Users\ToxicEye\rat.exeFilesize
90KB
MD525570e48a2a602ad729898ad976903a4
SHA1718ec4cefbe198830e98c6fca0679d2b8076ac71
SHA2565f6b305f5a2c2f542ccfced74b152da9e39d3a16da87349dae6ea486994d17c5
SHA512d6deb1e1deca43cb9da4542991e63b060aaae13cb9dde4b27d760b2647bdfbc6ab3fa5087c98464fd6b21303361bca230a6ed38aa79e78b1ec6bdfa725c7cef4
-
C:\Users\ToxicEye\rat.exeFilesize
149KB
MD58088252b9ac97aa2c57077021113e5eb
SHA12409f89e2e0523ea0874ac9f4883bbf0f91770b4
SHA256ac1aaf210d996cf01ccc62fd0a68e97e4d7c64b53dd2e4db8890de6d2b8f9dff
SHA51286f22252c17e3e9d46d601a7a9e8ff31e13ca2d24d2354bc01200901b06cb75f78c0c9a9f23b0dd2c1ece72cc0bebe5d6adc3a8eb7672675d97e40fa02d3fefe
-
memory/444-44-0x0000000075330000-0x0000000075AE0000-memory.dmpFilesize
7.7MB
-
memory/444-42-0x0000000005910000-0x0000000005920000-memory.dmpFilesize
64KB
-
memory/444-41-0x0000000075330000-0x0000000075AE0000-memory.dmpFilesize
7.7MB
-
memory/444-43-0x0000000005910000-0x0000000005920000-memory.dmpFilesize
64KB
-
memory/444-45-0x0000000005910000-0x0000000005920000-memory.dmpFilesize
64KB
-
memory/444-46-0x0000000005910000-0x0000000005920000-memory.dmpFilesize
64KB
-
memory/2436-21-0x0000000005050000-0x0000000005060000-memory.dmpFilesize
64KB
-
memory/2436-20-0x0000000075330000-0x0000000075AE0000-memory.dmpFilesize
7.7MB
-
memory/2436-25-0x0000000075330000-0x0000000075AE0000-memory.dmpFilesize
7.7MB
-
memory/2436-16-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/2876-9-0x0000000005920000-0x0000000005930000-memory.dmpFilesize
64KB
-
memory/2876-19-0x0000000075330000-0x0000000075AE0000-memory.dmpFilesize
7.7MB
-
memory/2876-12-0x000000000DC40000-0x000000000DCA6000-memory.dmpFilesize
408KB
-
memory/2876-11-0x000000000ABD0000-0x000000000AC3A000-memory.dmpFilesize
424KB
-
memory/2876-10-0x0000000008680000-0x0000000008738000-memory.dmpFilesize
736KB
-
memory/2876-0-0x0000000075330000-0x0000000075AE0000-memory.dmpFilesize
7.7MB
-
memory/2876-1-0x0000000000E10000-0x0000000000EF6000-memory.dmpFilesize
920KB
-
memory/2876-5-0x00000000058F0000-0x00000000058FA000-memory.dmpFilesize
40KB
-
memory/2876-2-0x0000000005E70000-0x0000000006414000-memory.dmpFilesize
5.6MB
-
memory/2876-3-0x0000000005960000-0x00000000059F2000-memory.dmpFilesize
584KB
-
memory/2876-8-0x0000000075330000-0x0000000075AE0000-memory.dmpFilesize
7.7MB
-
memory/2876-4-0x0000000005920000-0x0000000005930000-memory.dmpFilesize
64KB
-
memory/2876-7-0x0000000006CC0000-0x0000000006D5C000-memory.dmpFilesize
624KB
-
memory/2876-6-0x0000000005C90000-0x0000000005C98000-memory.dmpFilesize
32KB
-
memory/3324-29-0x0000000075330000-0x0000000075AE0000-memory.dmpFilesize
7.7MB
-
memory/3324-40-0x0000000075330000-0x0000000075AE0000-memory.dmpFilesize
7.7MB
-
memory/3324-32-0x0000000005270000-0x0000000005280000-memory.dmpFilesize
64KB
-
memory/3324-31-0x0000000075330000-0x0000000075AE0000-memory.dmpFilesize
7.7MB
-
memory/3324-30-0x0000000005270000-0x0000000005280000-memory.dmpFilesize
64KB