Analysis Overview
SHA256
03493eea453e28386671f1c458cd5956e41c988e95ea9df371c68ea6b92d1fec
Threat Level: Known bad
The file TelegramRAT.exe was found to be: Known bad.
Malicious Activity Summary
Contains code to disable Windows Defender
ToxicEye
Toxiceye family
Downloads MZ/PE file
Checks computer location settings
Reads user/profile data of web browsers
Executes dropped EXE
Deletes itself
Legitimate hosting services abused for malware hosting/C2
Unsigned PE
Enumerates physical storage devices
Enumerates processes with tasklist
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Delays execution with timeout.exe
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Uses Task Scheduler COM API
Creates scheduled task(s)
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-03-02 02:59
Signatures
Contains code to disable Windows Defender
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Toxiceye family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-03-02 02:59
Reported
2024-03-02 03:02
Platform
win7-20240221-en
Max time kernel
117s
Max time network
117s
Command Line
Signatures
Contains code to disable Windows Defender
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
ToxicEye
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\cmd.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\CyberEye\rat.exe | N/A |
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\System32\schtasks.exe | N/A |
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\timeout.exe | N/A |
Enumerates processes with tasklist
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\CyberEye\rat.exe | N/A |
| N/A | N/A | C:\Users\CyberEye\rat.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\system32\tasklist.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\CyberEye\rat.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\CyberEye\rat.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\CyberEye\rat.exe | N/A |
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe
"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\CyberEye\rat.exe"
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp1101.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp1101.tmp.bat
C:\Windows\system32\tasklist.exe
Tasklist /fi "PID eq 1044"
C:\Windows\system32\find.exe
find ":"
C:\Windows\system32\timeout.exe
Timeout /T 1 /Nobreak
C:\Users\CyberEye\rat.exe
"rat.exe"
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\CyberEye\rat.exe"
C:\Windows\system32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2420 -s 1484
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | google.com | udp |
| US | 8.8.8.8:53 | api.Telegram.org | udp |
| NL | 149.154.167.220:443 | api.Telegram.org | tcp |
| NL | 149.154.167.220:443 | api.Telegram.org | tcp |
Files
memory/1044-0-0x00000000011F0000-0x000000000121A000-memory.dmp
memory/1044-1-0x000007FEF54F0000-0x000007FEF5EDC000-memory.dmp
memory/1044-2-0x000000001B0C0000-0x000000001B140000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp1101.tmp.bat
| MD5 | 6339e8cd3eb19838956823f1a2f764bf |
| SHA1 | f01418bbf95313dc69d47387cea5b658e64b7c3d |
| SHA256 | 0eb3f48a9ac22415744755b31bc6f8aaa6052d128d79329dd33a8fa2f294724c |
| SHA512 | bc4cb84d6fc42ecf72e093e41aaff9f3831ee81b46a551eac80bd35ba2b9215c620f77db2580a0f7fb85cb53da1823d2fc812f2c1d99e7460e381856dba5d501 |
memory/1044-6-0x000007FEF54F0000-0x000007FEF5EDC000-memory.dmp
C:\Users\CyberEye\rat.exe
| MD5 | c19a5df467e2b60b230ebcf5045a3318 |
| SHA1 | a0772479a4acdc3ed21ae103adc22594fb4630f7 |
| SHA256 | 03493eea453e28386671f1c458cd5956e41c988e95ea9df371c68ea6b92d1fec |
| SHA512 | ad82cf0fa1cb1151161e7bbecc147a3bf959cd3fc9bd25a538c7e805d2885bb82e5e71f6454e7a6fcdd5468fc8538e684a163a78f3e11d594c7fe64c41578440 |
memory/2420-10-0x0000000000310000-0x000000000033A000-memory.dmp
memory/2420-11-0x000007FEF4B00000-0x000007FEF54EC000-memory.dmp
memory/2420-12-0x000000001AF80000-0x000000001B000000-memory.dmp
memory/2420-13-0x000007FEF4B00000-0x000007FEF54EC000-memory.dmp
memory/2420-14-0x000000001AF80000-0x000000001B000000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-03-02 02:59
Reported
2024-03-02 03:01
Platform
win10v2004-20240226-en
Max time kernel
85s
Max time network
91s
Command Line
Signatures
Contains code to disable Windows Defender
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
ToxicEye
Downloads MZ/PE file
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation | C:\Users\CyberEye\rat.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\CyberEye\rat.exe | N/A |
Reads user/profile data of web browsers
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | raw.githubusercontent.com | N/A | N/A |
| N/A | raw.githubusercontent.com | N/A | N/A |
| N/A | raw.githubusercontent.com | N/A | N/A |
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\System32\schtasks.exe | N/A |
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\timeout.exe | N/A |
Enumerates processes with tasklist
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\system32\tasklist.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\CyberEye\rat.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\CyberEye\rat.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\CyberEye\rat.exe | N/A |
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe
"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\CyberEye\rat.exe"
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp6E2B.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp6E2B.tmp.bat
C:\Windows\system32\tasklist.exe
Tasklist /fi "PID eq 4976"
C:\Windows\system32\find.exe
find ":"
C:\Windows\system32\timeout.exe
Timeout /T 1 /Nobreak
C:\Users\CyberEye\rat.exe
"rat.exe"
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\CyberEye\rat.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 22.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 180.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | google.com | udp |
| US | 8.8.8.8:53 | api.Telegram.org | udp |
| NL | 149.154.167.220:443 | api.Telegram.org | tcp |
| NL | 149.154.167.220:443 | api.Telegram.org | tcp |
| US | 8.8.8.8:53 | raw.githubusercontent.com | udp |
| US | 185.199.108.133:443 | raw.githubusercontent.com | tcp |
| US | 185.199.108.133:443 | raw.githubusercontent.com | tcp |
| NL | 149.154.167.220:443 | api.Telegram.org | tcp |
| NL | 149.154.167.220:443 | api.Telegram.org | tcp |
| NL | 149.154.167.220:443 | api.Telegram.org | tcp |
| US | 8.8.8.8:53 | 220.167.154.149.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.108.199.185.in-addr.arpa | udp |
| NL | 149.154.167.220:443 | api.Telegram.org | tcp |
| NL | 149.154.167.220:443 | api.Telegram.org | tcp |
| NL | 149.154.167.220:443 | api.Telegram.org | tcp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.135.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 194.178.17.96.in-addr.arpa | udp |
Files
memory/4976-0-0x000001CF350B0000-0x000001CF350DA000-memory.dmp
memory/4976-1-0x00007FFFA11D0000-0x00007FFFA1C91000-memory.dmp
memory/4976-2-0x000001CF36DD0000-0x000001CF36DE0000-memory.dmp
memory/4976-6-0x00007FFFA11D0000-0x00007FFFA1C91000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp6E2B.tmp.bat
| MD5 | 0c10abf6a996eb38921b24bd539d3c15 |
| SHA1 | a8be39850d860dfbe355f90239aaa2e103ff1e62 |
| SHA256 | c3daa502e0b2e0643a1cad374dd84d7adfe885cdbe2300ae5aae342f41a29cb9 |
| SHA512 | 0220d63af9f5bc9074d97ed0c9e38d49b5228a1ecef616bf67b5ba2a85a73e1cd16b932963fdcd5ceca92a10c5b9013cd8ec02d64be7d0e7c7e358226d352fb6 |
C:\Users\CyberEye\rat.exe
| MD5 | c19a5df467e2b60b230ebcf5045a3318 |
| SHA1 | a0772479a4acdc3ed21ae103adc22594fb4630f7 |
| SHA256 | 03493eea453e28386671f1c458cd5956e41c988e95ea9df371c68ea6b92d1fec |
| SHA512 | ad82cf0fa1cb1151161e7bbecc147a3bf959cd3fc9bd25a538c7e805d2885bb82e5e71f6454e7a6fcdd5468fc8538e684a163a78f3e11d594c7fe64c41578440 |
memory/220-11-0x00007FFFA11D0000-0x00007FFFA1C91000-memory.dmp
memory/220-12-0x000001B553860000-0x000001B553870000-memory.dmp
memory/220-15-0x000001B553A00000-0x000001B553A0A000-memory.dmp
memory/220-14-0x000001B553860000-0x000001B553870000-memory.dmp
memory/220-17-0x000001B5539C0000-0x000001B5539D2000-memory.dmp
memory/220-20-0x000001B553860000-0x000001B553870000-memory.dmp
memory/220-44-0x00007FFFA11D0000-0x00007FFFA1C91000-memory.dmp
memory/220-45-0x000001B553860000-0x000001B553870000-memory.dmp
memory/220-46-0x000001B553860000-0x000001B553870000-memory.dmp
memory/220-47-0x000001B553860000-0x000001B553870000-memory.dmp