Analysis
-
max time kernel
85s -
max time network
91s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-03-2024 02:59
Behavioral task
behavioral1
Sample
TelegramRAT.exe
Resource
win7-20240221-en
General
-
Target
TelegramRAT.exe
-
Size
143KB
-
MD5
c19a5df467e2b60b230ebcf5045a3318
-
SHA1
a0772479a4acdc3ed21ae103adc22594fb4630f7
-
SHA256
03493eea453e28386671f1c458cd5956e41c988e95ea9df371c68ea6b92d1fec
-
SHA512
ad82cf0fa1cb1151161e7bbecc147a3bf959cd3fc9bd25a538c7e805d2885bb82e5e71f6454e7a6fcdd5468fc8538e684a163a78f3e11d594c7fe64c41578440
-
SSDEEP
3072:IKoQM7ZNlgOzv0zonwLhMzIf5HOHWHBAF0rkFAbA+UBQW4VCrAZ51Gdm:127ZNlgWFWHmO4FAbt1K
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7040511851:AAEjBKSxADGWlNtLxaKpotGtf53NUQ1UgAo/sendMessage?chat_id=6226815698
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/4976-0-0x000001CF350B0000-0x000001CF350DA000-memory.dmp disable_win_def behavioral2/files/0x0008000000023214-9.dat disable_win_def -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation TelegramRAT.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation rat.exe -
Executes dropped EXE 1 IoCs
pid Process 220 rat.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 30 raw.githubusercontent.com 31 raw.githubusercontent.com 32 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2036 schtasks.exe 4456 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3816 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3412 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4976 TelegramRAT.exe Token: SeDebugPrivilege 3412 tasklist.exe Token: SeDebugPrivilege 220 rat.exe Token: SeDebugPrivilege 220 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 220 rat.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4976 wrote to memory of 2036 4976 TelegramRAT.exe 91 PID 4976 wrote to memory of 2036 4976 TelegramRAT.exe 91 PID 4976 wrote to memory of 2976 4976 TelegramRAT.exe 93 PID 4976 wrote to memory of 2976 4976 TelegramRAT.exe 93 PID 2976 wrote to memory of 3412 2976 cmd.exe 95 PID 2976 wrote to memory of 3412 2976 cmd.exe 95 PID 2976 wrote to memory of 2612 2976 cmd.exe 96 PID 2976 wrote to memory of 2612 2976 cmd.exe 96 PID 2976 wrote to memory of 3816 2976 cmd.exe 98 PID 2976 wrote to memory of 3816 2976 cmd.exe 98 PID 2976 wrote to memory of 220 2976 cmd.exe 99 PID 2976 wrote to memory of 220 2976 cmd.exe 99 PID 220 wrote to memory of 4456 220 rat.exe 102 PID 220 wrote to memory of 4456 220 rat.exe 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\CyberEye\rat.exe"2⤵
- Creates scheduled task(s)
PID:2036
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp6E2B.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp6E2B.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 4976"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2612
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:3816
-
-
C:\Users\CyberEye\rat.exe"rat.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\CyberEye\rat.exe"4⤵
- Creates scheduled task(s)
PID:4456
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188B
MD50c10abf6a996eb38921b24bd539d3c15
SHA1a8be39850d860dfbe355f90239aaa2e103ff1e62
SHA256c3daa502e0b2e0643a1cad374dd84d7adfe885cdbe2300ae5aae342f41a29cb9
SHA5120220d63af9f5bc9074d97ed0c9e38d49b5228a1ecef616bf67b5ba2a85a73e1cd16b932963fdcd5ceca92a10c5b9013cd8ec02d64be7d0e7c7e358226d352fb6
-
Filesize
143KB
MD5c19a5df467e2b60b230ebcf5045a3318
SHA1a0772479a4acdc3ed21ae103adc22594fb4630f7
SHA25603493eea453e28386671f1c458cd5956e41c988e95ea9df371c68ea6b92d1fec
SHA512ad82cf0fa1cb1151161e7bbecc147a3bf959cd3fc9bd25a538c7e805d2885bb82e5e71f6454e7a6fcdd5468fc8538e684a163a78f3e11d594c7fe64c41578440