Malware Analysis Report

2024-08-06 12:03

Sample ID 240222-y9pe9aeg6z
Target DDOSprem.exe
SHA256 ac3f5b28adad7993c233ae9affb1b510ef7ea90da15e957c7304eec1f821c8bf
Tags
toxiceye rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ac3f5b28adad7993c233ae9affb1b510ef7ea90da15e957c7304eec1f821c8bf

Threat Level: Known bad

The file DDOSprem.exe was found to be: Known bad.

Malicious Activity Summary

toxiceye rat trojan

ToxicEye

Toxiceye family

Executes dropped EXE

Enumerates physical storage devices

Unsigned PE

Enumerates processes with tasklist

Suspicious use of SetWindowsHookEx

Checks processor information in registry

Suspicious use of WriteProcessMemory

Creates scheduled task(s)

Delays execution with timeout.exe

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: AddClipboardFormatListener

Uses Task Scheduler COM API

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-02-22 20:29

Signatures

Toxiceye family

toxiceye

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-02-22 20:29

Reported

2024-02-22 20:31

Platform

win10-20240221-en

Max time kernel

75s

Max time network

80s

Command Line

"C:\Users\Admin\AppData\Local\Temp\DDOSprem.exe"

Signatures

ToxicEye

rat trojan toxiceye

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\ToxicEye\rat.exe N/A

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 C:\Users\ToxicEye\rat.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier C:\Users\ToxicEye\rat.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\System32\schtasks.exe N/A
N/A N/A C:\Windows\System32\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\timeout.exe N/A

Enumerates processes with tasklist

Description Indicator Process Target
N/A N/A C:\Windows\system32\tasklist.exe N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Users\ToxicEye\rat.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A
N/A N/A C:\Users\ToxicEye\rat.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\DDOSprem.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Users\ToxicEye\rat.exe N/A
Token: SeDebugPrivilege N/A C:\Users\ToxicEye\rat.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\ToxicEye\rat.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\DDOSprem.exe

"C:\Users\Admin\AppData\Local\Temp\DDOSprem.exe"

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpD39C.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpD39C.tmp.bat

C:\Windows\system32\tasklist.exe

Tasklist /fi "PID eq 4476"

C:\Windows\system32\find.exe

find ":"

C:\Windows\system32\timeout.exe

Timeout /T 1 /Nobreak

C:\Users\ToxicEye\rat.exe

"rat.exe"

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"

C:\Windows\system32\notepad.exe

"C:\Windows\system32\notepad.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 google.com udp
US 8.8.8.8:53 api.telegram.org udp
NL 149.154.167.220:443 api.telegram.org tcp
US 8.8.8.8:53 220.167.154.149.in-addr.arpa udp
NL 149.154.167.220:443 api.telegram.org tcp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp

Files

memory/4476-0-0x000001F845A10000-0x000001F845A32000-memory.dmp

memory/4476-1-0x00007FFB15960000-0x00007FFB1634C000-memory.dmp

memory/4476-2-0x000001F845E30000-0x000001F845E40000-memory.dmp

memory/4476-6-0x00007FFB15960000-0x00007FFB1634C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmpD39C.tmp.bat

MD5 ead483f8ba71b3a909863d4e07e2853e
SHA1 2768aed67b44186a99592bcd121dc5dcf854004e
SHA256 baea1f1762e9f8ea539ad1e86be0ebf6dc2bab0ebdc979c656ea199e070f6626
SHA512 87616e37aaa8c42d0137fad8ff22b40e2a7fb65b46f4fe065d6bb0fbb58f8ecbbfbd812a0e1443ace9efa7741c7890082bcad8ee86be24a13273a7d16405c552

C:\Users\ToxicEye\rat.exe

MD5 2c0d7dd8fc9b8c7fd03bf4f0c829c6d9
SHA1 713f7a8f209a080c2a1d7df2e64a0b7bd09c9e73
SHA256 ac3f5b28adad7993c233ae9affb1b510ef7ea90da15e957c7304eec1f821c8bf
SHA512 4926ccf0087e8ff9b1ebb2d0f9928378f4ead49db290e3f9fd35caadc12bdad8e569237ebc36b53a4f5f5f6aa87799f9c89847081ed3bf8863c9ab743b7098e7

C:\Users\ToxicEye\rat.exe

MD5 b668f02e18d609c25aef630e40bb4028
SHA1 f2a6fc85a1e0b810c0d554fe22921e5b0e2ae543
SHA256 b219f01705d0f050697c60b9c235ba5f13f69e7c2698d22e917712e2baf45150
SHA512 8e05c66d564e66400f2a639c1cf0737bbd6882fdd1e1483ef83d3c8509ebc45d8bffa6eda618a7a15bdce0d5ca6e7c6c51dc8c8db349aaeaa8c70efd2ca1ea13

memory/2416-11-0x00007FFB15960000-0x00007FFB1634C000-memory.dmp

memory/2416-12-0x0000025A3A000000-0x0000025A3A010000-memory.dmp

memory/2416-13-0x0000025A3A640000-0x0000025A3A6B6000-memory.dmp

memory/2416-14-0x0000025A3A970000-0x0000025A3AA1A000-memory.dmp

C:\Users\ToxicEye\keylogs

MD5 8adc874a51f1abc732682af63e4b791f
SHA1 bf21480ea29a62ba54190e72d8e7cfed75482c85
SHA256 23cbed27d2df3a0e97eca01578281453db45a66336c97db8caadeeef78956439
SHA512 735c937a54b7471a35dcdade580011c237ec0874ce4455e4cec0d33962c05c77b2ef50b8560b0a2d3e50df7509dd2a1d9320b1654a8cb0a7fd1764bdac0f4cb1

memory/2416-32-0x00007FFB15960000-0x00007FFB1634C000-memory.dmp

memory/2416-33-0x0000025A3A000000-0x0000025A3A010000-memory.dmp