Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2024 15:03

General

  • Target

    59048850afb594c657d732a4e0b39471.exe

  • Size

    55KB

  • MD5

    59048850afb594c657d732a4e0b39471

  • SHA1

    84710fbc564f6db75ca86d5646ac437b1f714f45

  • SHA256

    e266f576625221648379d9a1d512d19bfce7379b7e2ae0192e3ea2e69de14b0d

  • SHA512

    ac84f9b235d1f4a7c8089479067906c9267aba74ac14dbf8eb4779a2caf408c51041fa14210ab2955ca42f156f44439b91801363f50a5433a07d0c8fec4d1fad

  • SSDEEP

    1536:3NQyUmnyAxXJkjjr2QULyLlIkECBkQ6NVAaXZMR:3NQRmnkr21GLlIkECBkQ6NVAaXY

Score
10/10

Malware Config

Signatures

  • ToxicEye

    ToxicEye is a trojan written in C#.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\59048850afb594c657d732a4e0b39471.exe
    "C:\Users\Admin\AppData\Local\Temp\59048850afb594c657d732a4e0b39471.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:356
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\users\Chrome_Update.exe"
      2⤵
      • Creates scheduled task(s)
      PID:2696
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp205C.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp205C.tmp.bat
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2924
      • C:\Windows\system32\find.exe
        find ":"
        3⤵
          PID:3032
        • C:\Windows\system32\tasklist.exe
          Tasklist /fi "PID eq 356"
          3⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:2728
        • C:\Windows\system32\timeout.exe
          Timeout /T 1 /Nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:2164
        • C:\Windows\system32\find.exe
          find ":"
          3⤵
            PID:2624
          • C:\Windows\system32\tasklist.exe
            Tasklist /fi "PID eq 356"
            3⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:2612
          • C:\Windows\system32\timeout.exe
            Timeout /T 1 /Nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:3036
          • C:\Users\users\Chrome_Update.exe
            "Chrome_Update.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2812
            • C:\Windows\System32\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\users\Chrome_Update.exe"
              4⤵
              • Creates scheduled task(s)
              PID:2908
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 2812 -s 1596
              4⤵
                PID:1356

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmp205C.tmp.bat

          Filesize

          215B

          MD5

          135c861e33e94a83472997fd3388ee13

          SHA1

          26f741e51841de430515ee51b006d8ec9b21f04f

          SHA256

          5ba54eaf1cbfe179048a99c693544aa53037f2bd4fb60eaefe18ce46518e7e8a

          SHA512

          f75e3e56e29d2bb4bc7cb1551d073f03b062e7c3870bfa17ed56bb9fc54204d680bbe476ef45756092cd955ea0c8b0a46d6c72d5e65a790c05d04a8c3e4e3464

        • C:\Users\users\Chrome_Update.exe

          Filesize

          55KB

          MD5

          59048850afb594c657d732a4e0b39471

          SHA1

          84710fbc564f6db75ca86d5646ac437b1f714f45

          SHA256

          e266f576625221648379d9a1d512d19bfce7379b7e2ae0192e3ea2e69de14b0d

          SHA512

          ac84f9b235d1f4a7c8089479067906c9267aba74ac14dbf8eb4779a2caf408c51041fa14210ab2955ca42f156f44439b91801363f50a5433a07d0c8fec4d1fad

        • memory/356-0-0x0000000000B50000-0x0000000000B64000-memory.dmp

          Filesize

          80KB

        • memory/356-2-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

          Filesize

          9.9MB

        • memory/356-1-0x0000000000350000-0x0000000000372000-memory.dmp

          Filesize

          136KB

        • memory/356-3-0x000000001AF60000-0x000000001AFE0000-memory.dmp

          Filesize

          512KB

        • memory/356-7-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

          Filesize

          9.9MB

        • memory/2812-11-0x0000000000120000-0x0000000000134000-memory.dmp

          Filesize

          80KB

        • memory/2812-13-0x000000001AE90000-0x000000001AF10000-memory.dmp

          Filesize

          512KB

        • memory/2812-12-0x000007FEF5260000-0x000007FEF5C4C000-memory.dmp

          Filesize

          9.9MB

        • memory/2812-14-0x000007FEF5260000-0x000007FEF5C4C000-memory.dmp

          Filesize

          9.9MB

        • memory/2812-15-0x000000001AE90000-0x000000001AF10000-memory.dmp

          Filesize

          512KB