Analysis
-
max time kernel
42s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 18:25
Static task
static1
Behavioral task
behavioral1
Sample
eb65763fbd4c28c3afac6d08ab63c318.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
eb65763fbd4c28c3afac6d08ab63c318.exe
Resource
win10v2004-20231222-en
General
-
Target
eb65763fbd4c28c3afac6d08ab63c318.exe
-
Size
900KB
-
MD5
eb65763fbd4c28c3afac6d08ab63c318
-
SHA1
9297b49103ab3beff2851a441b4458a58a986fcc
-
SHA256
2aebd9a1bc61ad562d8f8e1115cf21247281b3f5e5ab41305406c5bdc7c4b0ff
-
SHA512
3397ec9a0b04e8c43bfabe1fbf30894e4bd973a46488252e6223ad4e41c869c5bf08aa4194b5f492f90c489909819ec6ae1e8dafbeb226470416a16d557f6288
-
SSDEEP
12288:W22iNv4sjaq8c+6Rq0mHtRAex8AIb2IRzQqX2Su9Oqql6c+NnHIbwhgT16Ovl:R1usjatrgPeyNcqXMjqlxEH+wlO
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot1912175024:AAFyX2DSTB35kTZDCQUzmiHwTx6F5gwOlaE/sendMessage?chat_id=1854909459
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
eb65763fbd4c28c3afac6d08ab63c318.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions eb65763fbd4c28c3afac6d08ab63c318.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
eb65763fbd4c28c3afac6d08ab63c318.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools eb65763fbd4c28c3afac6d08ab63c318.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
eb65763fbd4c28c3afac6d08ab63c318.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eb65763fbd4c28c3afac6d08ab63c318.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eb65763fbd4c28c3afac6d08ab63c318.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
eb65763fbd4c28c3afac6d08ab63c318.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum eb65763fbd4c28c3afac6d08ab63c318.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 eb65763fbd4c28c3afac6d08ab63c318.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1012 564 WerFault.exe rat.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 540 schtasks.exe 1776 schtasks.exe 1568 schtasks.exe 2636 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1756 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb65763fbd4c28c3afac6d08ab63c318.exe"C:\Users\Admin\AppData\Local\Temp\eb65763fbd4c28c3afac6d08ab63c318.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\eb65763fbd4c28c3afac6d08ab63c318.exe"{path}"2⤵PID:2744
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"3⤵
- Creates scheduled task(s)
PID:2636
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpB70F.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpB70F.tmp.bat3⤵PID:2832
-
C:\Users\ToxicEye\rat.exe"rat.exe"4⤵PID:1824
-
C:\Users\ToxicEye\rat.exe"{path}"5⤵PID:564
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"6⤵
- Creates scheduled task(s)
PID:1776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 16806⤵
- Program crash
PID:1012
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jgQtVF" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5F01.tmp"5⤵
- Creates scheduled task(s)
PID:540
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jgQtVF" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB2DB.tmp"2⤵
- Creates scheduled task(s)
PID:1568
-
-
C:\Windows\SysWOW64\find.exefind ":"1⤵PID:1072
-
C:\Windows\SysWOW64\timeout.exeTimeout /T 1 /Nobreak1⤵
- Delays execution with timeout.exe
PID:1756
-
C:\Windows\SysWOW64\tasklist.exeTasklist /fi "PID eq 2744"1⤵
- Enumerates processes with tasklist
PID:1328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59072303221755fd067bb9d00e994cb94
SHA1eeeaa7ae90d696f1c2aacc305daf15a782960ea2
SHA256a02346e6436db4b3e8a4bd9667d08c9c8146ec2476922a2e049ec362622e329d
SHA512a29a9e95fee73700aecbd45607735040436621a7adff39b5ad92fd63afb4281be4a7baca49b049f11a5c5b8fc8cb41565f7645ac929e3a7a8981a5f9bedbd49f
-
Filesize
59KB
MD5ff2953f85f4a2d44212682e743e4f7da
SHA1e582fa2d7cd2a17332b0265311685755a28003c2
SHA25660d3d1bf2d8632c7d2dee02e7d85d9c82072dd5d2422ce6ac810a2bca7e6be94
SHA512ca53a93b07e6576ad8949a96781dd73989e0b7e0bf1a07b7f37915076d8562c8ade3b75d2237fce55d35984f96eb4b370f7968fd4bb247a05567a5db81bf3af0
-
Filesize
44KB
MD538479017c9fb0a738a182954edcf2d80
SHA1abeaf26bdbb551700bf12f30b68fee3ab7ad2245
SHA256cf21bf746570d006212813ff5574fa0198c1683533094b5c1567d50ef092cb80
SHA512c44df130f8e3d7f7063c751471b61d3f894f8536781eae195f7bd29b6c9a45684e4c80808a556cc794c7b61a271dac2bb02b7c61cefcd1c279c2728ca393060a
-
Filesize
70KB
MD5a4988be0da8ec3df4b9fc4f0034dbb3c
SHA1ae683e9d9149589ed886ef98bb4df5990a7b13b6
SHA256c24399c2ebd9c11f842a1a31415a560ecde1e0fa88b3e2a3481e40a69cdefed9
SHA51297f16d576f171a392c8b014cc7aa3b09a597c2ec16891591d0016ac628efe07148c942d315054c97cc106b3390e1f89d3a9964fbf96dc5c0426a5c00d25de21d
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
28KB
MD5032b5a7717ff917eb8d4f34516f5fa7f
SHA18a44735d764311f748cbff5cdd6fef21a44c30d6
SHA25606600b30a9ba1e9e6342a64dcaeaf7b630d8cf17558f608734cf25398c45a237
SHA512b16149cdefe39c698b8a13319911bebcae565b86704f0921b2ea4b160e0bea51f82d8654b488e5832a3fc2939a6dab09e347509ffb6ee3cde666712eb8a6e32b