Analysis

  • max time kernel
    75s
  • max time network
    80s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22-02-2024 20:29

General

  • Target

    DDOSprem.exe

  • Size

    111KB

  • MD5

    2c0d7dd8fc9b8c7fd03bf4f0c829c6d9

  • SHA1

    713f7a8f209a080c2a1d7df2e64a0b7bd09c9e73

  • SHA256

    ac3f5b28adad7993c233ae9affb1b510ef7ea90da15e957c7304eec1f821c8bf

  • SHA512

    4926ccf0087e8ff9b1ebb2d0f9928378f4ead49db290e3f9fd35caadc12bdad8e569237ebc36b53a4f5f5f6aa87799f9c89847081ed3bf8863c9ab743b7098e7

  • SSDEEP

    3072:/b4MbYUuQaS+T8sKXttm2tZ4OYmBGYPbxqH8QWazCrAZuWyN:PYUuQaS+T8sKXttm2tZ4ajbgt

Score
10/10

Malware Config

Extracted

Family

toxiceye

C2

https://api.telegram.org/bot7116690824:AAFtTQVfXjhTbRv6mBTiSeareGJbUS1S-tE/sendMessage?chat_id=737203922

Signatures

  • ToxicEye

    ToxicEye is a trojan written in C#.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\DDOSprem.exe
    "C:\Users\Admin\AppData\Local\Temp\DDOSprem.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4476
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"
      2⤵
      • Creates scheduled task(s)
      PID:5048
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpD39C.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpD39C.tmp.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4088
      • C:\Windows\system32\tasklist.exe
        Tasklist /fi "PID eq 4476"
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:2568
      • C:\Windows\system32\find.exe
        find ":"
        3⤵
          PID:4720
        • C:\Windows\system32\timeout.exe
          Timeout /T 1 /Nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:4716
        • C:\Users\ToxicEye\rat.exe
          "rat.exe"
          3⤵
          • Executes dropped EXE
          • Checks processor information in registry
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2416
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"
            4⤵
            • Creates scheduled task(s)
            PID:3668
    • C:\Windows\system32\notepad.exe
      "C:\Windows\system32\notepad.exe"
      1⤵
        PID:832

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmpD39C.tmp.bat

        Filesize

        185B

        MD5

        ead483f8ba71b3a909863d4e07e2853e

        SHA1

        2768aed67b44186a99592bcd121dc5dcf854004e

        SHA256

        baea1f1762e9f8ea539ad1e86be0ebf6dc2bab0ebdc979c656ea199e070f6626

        SHA512

        87616e37aaa8c42d0137fad8ff22b40e2a7fb65b46f4fe065d6bb0fbb58f8ecbbfbd812a0e1443ace9efa7741c7890082bcad8ee86be24a13273a7d16405c552

      • C:\Users\ToxicEye\keylogs

        Filesize

        73B

        MD5

        8adc874a51f1abc732682af63e4b791f

        SHA1

        bf21480ea29a62ba54190e72d8e7cfed75482c85

        SHA256

        23cbed27d2df3a0e97eca01578281453db45a66336c97db8caadeeef78956439

        SHA512

        735c937a54b7471a35dcdade580011c237ec0874ce4455e4cec0d33962c05c77b2ef50b8560b0a2d3e50df7509dd2a1d9320b1654a8cb0a7fd1764bdac0f4cb1

      • C:\Users\ToxicEye\rat.exe

        Filesize

        3KB

        MD5

        b668f02e18d609c25aef630e40bb4028

        SHA1

        f2a6fc85a1e0b810c0d554fe22921e5b0e2ae543

        SHA256

        b219f01705d0f050697c60b9c235ba5f13f69e7c2698d22e917712e2baf45150

        SHA512

        8e05c66d564e66400f2a639c1cf0737bbd6882fdd1e1483ef83d3c8509ebc45d8bffa6eda618a7a15bdce0d5ca6e7c6c51dc8c8db349aaeaa8c70efd2ca1ea13

      • C:\Users\ToxicEye\rat.exe

        Filesize

        111KB

        MD5

        2c0d7dd8fc9b8c7fd03bf4f0c829c6d9

        SHA1

        713f7a8f209a080c2a1d7df2e64a0b7bd09c9e73

        SHA256

        ac3f5b28adad7993c233ae9affb1b510ef7ea90da15e957c7304eec1f821c8bf

        SHA512

        4926ccf0087e8ff9b1ebb2d0f9928378f4ead49db290e3f9fd35caadc12bdad8e569237ebc36b53a4f5f5f6aa87799f9c89847081ed3bf8863c9ab743b7098e7

      • memory/2416-13-0x0000025A3A640000-0x0000025A3A6B6000-memory.dmp

        Filesize

        472KB

      • memory/2416-11-0x00007FFB15960000-0x00007FFB1634C000-memory.dmp

        Filesize

        9.9MB

      • memory/2416-12-0x0000025A3A000000-0x0000025A3A010000-memory.dmp

        Filesize

        64KB

      • memory/2416-14-0x0000025A3A970000-0x0000025A3AA1A000-memory.dmp

        Filesize

        680KB

      • memory/2416-32-0x00007FFB15960000-0x00007FFB1634C000-memory.dmp

        Filesize

        9.9MB

      • memory/2416-33-0x0000025A3A000000-0x0000025A3A010000-memory.dmp

        Filesize

        64KB

      • memory/4476-6-0x00007FFB15960000-0x00007FFB1634C000-memory.dmp

        Filesize

        9.9MB

      • memory/4476-2-0x000001F845E30000-0x000001F845E40000-memory.dmp

        Filesize

        64KB

      • memory/4476-0-0x000001F845A10000-0x000001F845A32000-memory.dmp

        Filesize

        136KB

      • memory/4476-1-0x00007FFB15960000-0x00007FFB1634C000-memory.dmp

        Filesize

        9.9MB