Analysis
-
max time kernel
85s -
max time network
91s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-03-2024 02:59
Behavioral task
behavioral1
Sample
TelegramRAT.exe
Resource
win7-20240221-en
General
-
Target
TelegramRAT.exe
-
Size
143KB
-
MD5
c19a5df467e2b60b230ebcf5045a3318
-
SHA1
a0772479a4acdc3ed21ae103adc22594fb4630f7
-
SHA256
03493eea453e28386671f1c458cd5956e41c988e95ea9df371c68ea6b92d1fec
-
SHA512
ad82cf0fa1cb1151161e7bbecc147a3bf959cd3fc9bd25a538c7e805d2885bb82e5e71f6454e7a6fcdd5468fc8538e684a163a78f3e11d594c7fe64c41578440
-
SSDEEP
3072:IKoQM7ZNlgOzv0zonwLhMzIf5HOHWHBAF0rkFAbA+UBQW4VCrAZ51Gdm:127ZNlgWFWHmO4FAbt1K
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7040511851:AAEjBKSxADGWlNtLxaKpotGtf53NUQ1UgAo/sendMessage?chat_id=6226815698
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/memory/4976-0-0x000001CF350B0000-0x000001CF350DA000-memory.dmp disable_win_def C:\Users\CyberEye\rat.exe disable_win_def -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
TelegramRAT.exerat.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation TelegramRAT.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation rat.exe -
Executes dropped EXE 1 IoCs
Processes:
rat.exepid process 220 rat.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes:
flow ioc 30 raw.githubusercontent.com 31 raw.githubusercontent.com 32 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2036 schtasks.exe 4456 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3816 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 56 IoCs
Processes:
rat.exepid process 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe 220 rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
TelegramRAT.exetasklist.exerat.exedescription pid process Token: SeDebugPrivilege 4976 TelegramRAT.exe Token: SeDebugPrivilege 3412 tasklist.exe Token: SeDebugPrivilege 220 rat.exe Token: SeDebugPrivilege 220 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rat.exepid process 220 rat.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
TelegramRAT.execmd.exerat.exedescription pid process target process PID 4976 wrote to memory of 2036 4976 TelegramRAT.exe schtasks.exe PID 4976 wrote to memory of 2036 4976 TelegramRAT.exe schtasks.exe PID 4976 wrote to memory of 2976 4976 TelegramRAT.exe cmd.exe PID 4976 wrote to memory of 2976 4976 TelegramRAT.exe cmd.exe PID 2976 wrote to memory of 3412 2976 cmd.exe tasklist.exe PID 2976 wrote to memory of 3412 2976 cmd.exe tasklist.exe PID 2976 wrote to memory of 2612 2976 cmd.exe find.exe PID 2976 wrote to memory of 2612 2976 cmd.exe find.exe PID 2976 wrote to memory of 3816 2976 cmd.exe timeout.exe PID 2976 wrote to memory of 3816 2976 cmd.exe timeout.exe PID 2976 wrote to memory of 220 2976 cmd.exe rat.exe PID 2976 wrote to memory of 220 2976 cmd.exe rat.exe PID 220 wrote to memory of 4456 220 rat.exe schtasks.exe PID 220 wrote to memory of 4456 220 rat.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\CyberEye\rat.exe"2⤵
- Creates scheduled task(s)
PID:2036
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp6E2B.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp6E2B.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 4976"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2612
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:3816
-
-
C:\Users\CyberEye\rat.exe"rat.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\CyberEye\rat.exe"4⤵
- Creates scheduled task(s)
PID:4456
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188B
MD50c10abf6a996eb38921b24bd539d3c15
SHA1a8be39850d860dfbe355f90239aaa2e103ff1e62
SHA256c3daa502e0b2e0643a1cad374dd84d7adfe885cdbe2300ae5aae342f41a29cb9
SHA5120220d63af9f5bc9074d97ed0c9e38d49b5228a1ecef616bf67b5ba2a85a73e1cd16b932963fdcd5ceca92a10c5b9013cd8ec02d64be7d0e7c7e358226d352fb6
-
Filesize
143KB
MD5c19a5df467e2b60b230ebcf5045a3318
SHA1a0772479a4acdc3ed21ae103adc22594fb4630f7
SHA25603493eea453e28386671f1c458cd5956e41c988e95ea9df371c68ea6b92d1fec
SHA512ad82cf0fa1cb1151161e7bbecc147a3bf959cd3fc9bd25a538c7e805d2885bb82e5e71f6454e7a6fcdd5468fc8538e684a163a78f3e11d594c7fe64c41578440