Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-03-2024 02:28
Behavioral task
behavioral1
Sample
TelegramRAT.exe
Resource
win7-20240221-en
General
-
Target
TelegramRAT.exe
-
Size
143KB
-
MD5
5ed0d420fc1b4641d8b88cf909be6e4e
-
SHA1
a324050949e558a339cfc02e761e12dd657f1ee2
-
SHA256
a0790e8195c00714a8486ea9c7a9902e8dd9efc498c3c31737b1e753ac319d09
-
SHA512
f3d000019faa786fa589bee3fb07abcd7c928220066b56ecac69c46077feb742cbd6dfa6a6bdb3fb4861154751b12d99ef71b487b12655b41127d132fc2e628e
-
SSDEEP
3072:OhcmsSrI7vLHvWk4EqvE2Rf2p65dd54f/iaK9N4bve0ZQWf5CrAZuC+C:Ov4v8Ef/iayubWa
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7040511851:AAEjBKSxADGWlNtLxaKpotGtf53NUQ1UgAo/sendMessage?chat_id=6226815698
Signatures
-
Contains code to disable Windows Defender 5 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral1/memory/3048-0-0x0000000001100000-0x000000000112A000-memory.dmp disable_win_def behavioral1/memory/3048-2-0x000000001AE50000-0x000000001AED0000-memory.dmp disable_win_def C:\Users\CyberEye\rat.exe disable_win_def behavioral1/memory/2396-10-0x0000000000B60000-0x0000000000B8A000-memory.dmp disable_win_def behavioral1/memory/2396-12-0x000000001AE50000-0x000000001AED0000-memory.dmp disable_win_def -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2720 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
rat.exepid process 2396 rat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2276 schtasks.exe 1728 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 2468 timeout.exe 2464 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 2728 tasklist.exe 2532 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rat.exepid process 2396 rat.exe 2396 rat.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
TelegramRAT.exetasklist.exetasklist.exerat.exedescription pid process Token: SeDebugPrivilege 3048 TelegramRAT.exe Token: SeDebugPrivilege 2728 tasklist.exe Token: SeDebugPrivilege 2532 tasklist.exe Token: SeDebugPrivilege 2396 rat.exe Token: SeDebugPrivilege 2396 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rat.exepid process 2396 rat.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
TelegramRAT.execmd.exerat.exedescription pid process target process PID 3048 wrote to memory of 2276 3048 TelegramRAT.exe schtasks.exe PID 3048 wrote to memory of 2276 3048 TelegramRAT.exe schtasks.exe PID 3048 wrote to memory of 2276 3048 TelegramRAT.exe schtasks.exe PID 3048 wrote to memory of 2720 3048 TelegramRAT.exe cmd.exe PID 3048 wrote to memory of 2720 3048 TelegramRAT.exe cmd.exe PID 3048 wrote to memory of 2720 3048 TelegramRAT.exe cmd.exe PID 2720 wrote to memory of 2728 2720 cmd.exe tasklist.exe PID 2720 wrote to memory of 2728 2720 cmd.exe tasklist.exe PID 2720 wrote to memory of 2728 2720 cmd.exe tasklist.exe PID 2720 wrote to memory of 1984 2720 cmd.exe find.exe PID 2720 wrote to memory of 1984 2720 cmd.exe find.exe PID 2720 wrote to memory of 1984 2720 cmd.exe find.exe PID 2720 wrote to memory of 2468 2720 cmd.exe timeout.exe PID 2720 wrote to memory of 2468 2720 cmd.exe timeout.exe PID 2720 wrote to memory of 2468 2720 cmd.exe timeout.exe PID 2720 wrote to memory of 2532 2720 cmd.exe tasklist.exe PID 2720 wrote to memory of 2532 2720 cmd.exe tasklist.exe PID 2720 wrote to memory of 2532 2720 cmd.exe tasklist.exe PID 2720 wrote to memory of 2420 2720 cmd.exe find.exe PID 2720 wrote to memory of 2420 2720 cmd.exe find.exe PID 2720 wrote to memory of 2420 2720 cmd.exe find.exe PID 2720 wrote to memory of 2464 2720 cmd.exe timeout.exe PID 2720 wrote to memory of 2464 2720 cmd.exe timeout.exe PID 2720 wrote to memory of 2464 2720 cmd.exe timeout.exe PID 2720 wrote to memory of 2396 2720 cmd.exe rat.exe PID 2720 wrote to memory of 2396 2720 cmd.exe rat.exe PID 2720 wrote to memory of 2396 2720 cmd.exe rat.exe PID 2396 wrote to memory of 1728 2396 rat.exe schtasks.exe PID 2396 wrote to memory of 1728 2396 rat.exe schtasks.exe PID 2396 wrote to memory of 1728 2396 rat.exe schtasks.exe PID 2396 wrote to memory of 2812 2396 rat.exe WerFault.exe PID 2396 wrote to memory of 2812 2396 rat.exe WerFault.exe PID 2396 wrote to memory of 2812 2396 rat.exe WerFault.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\CyberEye\rat.exe"2⤵
- Creates scheduled task(s)
PID:2276
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp86AD.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp86AD.tmp.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 3048"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:1984
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2468
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 3048"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2420
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2464
-
-
C:\Users\CyberEye\rat.exe"rat.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\CyberEye\rat.exe"4⤵
- Creates scheduled task(s)
PID:1728
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2396 -s 15644⤵PID:2812
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188B
MD5630ab1d005a9a31ddd0306242c128758
SHA18126800efa383201467b304a74c4d82bccd00930
SHA25658ba2935d7b759b59371281023f9a9e2db970d14ffc90025e3fb583442602b3f
SHA5122f4620d3f65f7f949e271335d384c2097bdbd6deac7849ee8884cc864155aae84ef543b1ae468f1d176b551ce94ff4269ade38e9148c5af6d3d83792aa5070a7
-
Filesize
143KB
MD55ed0d420fc1b4641d8b88cf909be6e4e
SHA1a324050949e558a339cfc02e761e12dd657f1ee2
SHA256a0790e8195c00714a8486ea9c7a9902e8dd9efc498c3c31737b1e753ac319d09
SHA512f3d000019faa786fa589bee3fb07abcd7c928220066b56ecac69c46077feb742cbd6dfa6a6bdb3fb4861154751b12d99ef71b487b12655b41127d132fc2e628e