Malware Analysis Report

2024-08-06 11:59

Sample ID 240113-sfhgysbccj
Target 59048850afb594c657d732a4e0b39471
SHA256 e266f576625221648379d9a1d512d19bfce7379b7e2ae0192e3ea2e69de14b0d
Tags
toxiceye rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e266f576625221648379d9a1d512d19bfce7379b7e2ae0192e3ea2e69de14b0d

Threat Level: Known bad

The file 59048850afb594c657d732a4e0b39471 was found to be: Known bad.

Malicious Activity Summary

toxiceye rat trojan

ToxicEye

Deletes itself

Executes dropped EXE

Enumerates physical storage devices

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious use of SetWindowsHookEx

Uses Task Scheduler COM API

Suspicious use of AdjustPrivilegeToken

Creates scheduled task(s)

Suspicious behavior: EnumeratesProcesses

Delays execution with timeout.exe

Enumerates processes with tasklist

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-01-13 15:03

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-01-13 15:03

Reported

2024-01-13 15:06

Platform

win7-20231215-en

Max time kernel

121s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\59048850afb594c657d732a4e0b39471.exe"

Signatures

ToxicEye

rat trojan toxiceye

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\System32\cmd.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\users\Chrome_Update.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\System32\schtasks.exe N/A
N/A N/A C:\Windows\System32\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\timeout.exe N/A
N/A N/A C:\Windows\system32\timeout.exe N/A

Enumerates processes with tasklist

Description Indicator Process Target
N/A N/A C:\Windows\system32\tasklist.exe N/A
N/A N/A C:\Windows\system32\tasklist.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\users\Chrome_Update.exe N/A
N/A N/A C:\Users\users\Chrome_Update.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\59048850afb594c657d732a4e0b39471.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Users\users\Chrome_Update.exe N/A
Token: SeDebugPrivilege N/A C:\Users\users\Chrome_Update.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\users\Chrome_Update.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 356 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\59048850afb594c657d732a4e0b39471.exe C:\Windows\System32\schtasks.exe
PID 356 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\59048850afb594c657d732a4e0b39471.exe C:\Windows\System32\schtasks.exe
PID 356 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\59048850afb594c657d732a4e0b39471.exe C:\Windows\System32\schtasks.exe
PID 356 wrote to memory of 2924 N/A C:\Users\Admin\AppData\Local\Temp\59048850afb594c657d732a4e0b39471.exe C:\Windows\System32\cmd.exe
PID 356 wrote to memory of 2924 N/A C:\Users\Admin\AppData\Local\Temp\59048850afb594c657d732a4e0b39471.exe C:\Windows\System32\cmd.exe
PID 356 wrote to memory of 2924 N/A C:\Users\Admin\AppData\Local\Temp\59048850afb594c657d732a4e0b39471.exe C:\Windows\System32\cmd.exe
PID 2924 wrote to memory of 2728 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2924 wrote to memory of 2728 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2924 wrote to memory of 2728 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2924 wrote to memory of 3032 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2924 wrote to memory of 3032 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2924 wrote to memory of 3032 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2924 wrote to memory of 2164 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2924 wrote to memory of 2164 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2924 wrote to memory of 2164 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2924 wrote to memory of 2612 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2924 wrote to memory of 2612 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2924 wrote to memory of 2612 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2924 wrote to memory of 2624 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2924 wrote to memory of 2624 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2924 wrote to memory of 2624 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2924 wrote to memory of 3036 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2924 wrote to memory of 3036 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2924 wrote to memory of 3036 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2924 wrote to memory of 2812 N/A C:\Windows\System32\cmd.exe C:\Users\users\Chrome_Update.exe
PID 2924 wrote to memory of 2812 N/A C:\Windows\System32\cmd.exe C:\Users\users\Chrome_Update.exe
PID 2924 wrote to memory of 2812 N/A C:\Windows\System32\cmd.exe C:\Users\users\Chrome_Update.exe
PID 2812 wrote to memory of 2908 N/A C:\Users\users\Chrome_Update.exe C:\Windows\System32\schtasks.exe
PID 2812 wrote to memory of 2908 N/A C:\Users\users\Chrome_Update.exe C:\Windows\System32\schtasks.exe
PID 2812 wrote to memory of 2908 N/A C:\Users\users\Chrome_Update.exe C:\Windows\System32\schtasks.exe
PID 2812 wrote to memory of 1356 N/A C:\Users\users\Chrome_Update.exe C:\Windows\system32\WerFault.exe
PID 2812 wrote to memory of 1356 N/A C:\Users\users\Chrome_Update.exe C:\Windows\system32\WerFault.exe
PID 2812 wrote to memory of 1356 N/A C:\Users\users\Chrome_Update.exe C:\Windows\system32\WerFault.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\59048850afb594c657d732a4e0b39471.exe

"C:\Users\Admin\AppData\Local\Temp\59048850afb594c657d732a4e0b39471.exe"

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\users\Chrome_Update.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp205C.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp205C.tmp.bat

C:\Windows\system32\find.exe

find ":"

C:\Windows\system32\tasklist.exe

Tasklist /fi "PID eq 356"

C:\Windows\system32\timeout.exe

Timeout /T 1 /Nobreak

C:\Windows\system32\find.exe

find ":"

C:\Windows\system32\tasklist.exe

Tasklist /fi "PID eq 356"

C:\Windows\system32\timeout.exe

Timeout /T 1 /Nobreak

C:\Users\users\Chrome_Update.exe

"Chrome_Update.exe"

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\users\Chrome_Update.exe"

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 2812 -s 1596

Network

Country Destination Domain Proto
US 8.8.8.8:53 google.com udp
US 8.8.8.8:53 api.telegram.org udp
NL 149.154.167.220:443 api.telegram.org tcp

Files

memory/356-0-0x0000000000B50000-0x0000000000B64000-memory.dmp

memory/356-2-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

memory/356-1-0x0000000000350000-0x0000000000372000-memory.dmp

memory/356-3-0x000000001AF60000-0x000000001AFE0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp205C.tmp.bat

MD5 135c861e33e94a83472997fd3388ee13
SHA1 26f741e51841de430515ee51b006d8ec9b21f04f
SHA256 5ba54eaf1cbfe179048a99c693544aa53037f2bd4fb60eaefe18ce46518e7e8a
SHA512 f75e3e56e29d2bb4bc7cb1551d073f03b062e7c3870bfa17ed56bb9fc54204d680bbe476ef45756092cd955ea0c8b0a46d6c72d5e65a790c05d04a8c3e4e3464

memory/356-7-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

C:\Users\users\Chrome_Update.exe

MD5 59048850afb594c657d732a4e0b39471
SHA1 84710fbc564f6db75ca86d5646ac437b1f714f45
SHA256 e266f576625221648379d9a1d512d19bfce7379b7e2ae0192e3ea2e69de14b0d
SHA512 ac84f9b235d1f4a7c8089479067906c9267aba74ac14dbf8eb4779a2caf408c51041fa14210ab2955ca42f156f44439b91801363f50a5433a07d0c8fec4d1fad

memory/2812-11-0x0000000000120000-0x0000000000134000-memory.dmp

memory/2812-13-0x000000001AE90000-0x000000001AF10000-memory.dmp

memory/2812-12-0x000007FEF5260000-0x000007FEF5C4C000-memory.dmp

memory/2812-14-0x000007FEF5260000-0x000007FEF5C4C000-memory.dmp

memory/2812-15-0x000000001AE90000-0x000000001AF10000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-01-13 15:03

Reported

2024-01-13 15:06

Platform

win10v2004-20231215-en

Max time kernel

1s

Max time network

26s

Command Line

"C:\Users\Admin\AppData\Local\Temp\59048850afb594c657d732a4e0b39471.exe"

Signatures

ToxicEye

rat trojan toxiceye

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\System32\schtasks.exe N/A
N/A N/A C:\Windows\System32\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\timeout.exe N/A

Enumerates processes with tasklist

Description Indicator Process Target
N/A N/A C:\Windows\system32\tasklist.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\59048850afb594c657d732a4e0b39471.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\59048850afb594c657d732a4e0b39471.exe

"C:\Users\Admin\AppData\Local\Temp\59048850afb594c657d732a4e0b39471.exe"

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\users\Chrome_Update.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp59B9.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp59B9.tmp.bat

C:\Windows\system32\tasklist.exe

Tasklist /fi "PID eq 2460"

C:\Windows\system32\find.exe

find ":"

C:\Windows\system32\timeout.exe

Timeout /T 1 /Nobreak

C:\Users\users\Chrome_Update.exe

"Chrome_Update.exe"

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\users\Chrome_Update.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 19.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 20.231.121.79:80 tcp
US 8.8.8.8:53 google.com udp
US 8.8.8.8:53 api.telegram.org udp
NL 149.154.167.220:443 api.telegram.org tcp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 220.167.154.149.in-addr.arpa udp

Files

memory/2460-0-0x00000278C5C30000-0x00000278C5C44000-memory.dmp

memory/2460-1-0x00000278C6000000-0x00000278C6022000-memory.dmp

memory/2460-2-0x00007FFE86510000-0x00007FFE86FD1000-memory.dmp

memory/2460-3-0x00000278C60B0000-0x00000278C60C0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp59B9.tmp.bat

MD5 0a89a3b7f8d7c2a26ba2b2e63e7fdbcc
SHA1 7552780459e7f5cd828bc325a0793e0c7cfecdb2
SHA256 cb68fb3d52fdeadd185677921d7305ed92948075ea5c76f4cd725136ed44bc22
SHA512 a04516d7a3dc900ac55c4ad8324b3ff403da446b8b63e075b32b2df8ad0c51060636659ffbc517eddde28d30f9e1f7be6b570fa1cc065d19a29e6af2b9cac091

memory/2460-8-0x00007FFE86510000-0x00007FFE86FD1000-memory.dmp

C:\Users\users\Chrome_Update.exe

MD5 59048850afb594c657d732a4e0b39471
SHA1 84710fbc564f6db75ca86d5646ac437b1f714f45
SHA256 e266f576625221648379d9a1d512d19bfce7379b7e2ae0192e3ea2e69de14b0d
SHA512 ac84f9b235d1f4a7c8089479067906c9267aba74ac14dbf8eb4779a2caf408c51041fa14210ab2955ca42f156f44439b91801363f50a5433a07d0c8fec4d1fad

memory/1704-13-0x00000261CB3C0000-0x00000261CB3D0000-memory.dmp

memory/1704-12-0x00007FFE86180000-0x00007FFE86C41000-memory.dmp