Malware Analysis Report

2024-08-06 12:00

Sample ID 240302-z3cnjshe6v
Target TelegramRAT.exe
SHA256 af9d1582852905516ee58316f875a8df81beff906e28f5406486c4c62463ead4
Tags
toxiceye rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

af9d1582852905516ee58316f875a8df81beff906e28f5406486c4c62463ead4

Threat Level: Known bad

The file TelegramRAT.exe was found to be: Known bad.

Malicious Activity Summary

toxiceye rat trojan

ToxicEye

Toxiceye family

Executes dropped EXE

Deletes itself

Checks computer location settings

Enumerates physical storage devices

Unsigned PE

Delays execution with timeout.exe

Checks SCSI registry key(s)

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Suspicious use of FindShellTrayWindow

Suspicious behavior: EnumeratesProcesses

Uses Task Scheduler COM API

Suspicious use of SendNotifyMessage

Suspicious use of WriteProcessMemory

Enumerates processes with tasklist

Creates scheduled task(s)

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-03-02 21:14

Signatures

Toxiceye family

toxiceye

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-03-02 21:14

Reported

2024-03-02 21:16

Platform

win7-20240221-en

Max time kernel

121s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"

Signatures

ToxicEye

rat trojan toxiceye

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\System32\cmd.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\a\rat.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\System32\schtasks.exe N/A
N/A N/A C:\Windows\System32\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\timeout.exe N/A
N/A N/A C:\Windows\system32\timeout.exe N/A

Enumerates processes with tasklist

Description Indicator Process Target
N/A N/A C:\Windows\system32\tasklist.exe N/A
N/A N/A C:\Windows\system32\tasklist.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\a\rat.exe N/A
N/A N/A C:\a\rat.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\a\rat.exe N/A
Token: SeDebugPrivilege N/A C:\a\rat.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\a\rat.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1632 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe C:\Windows\System32\schtasks.exe
PID 1632 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe C:\Windows\System32\schtasks.exe
PID 1632 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe C:\Windows\System32\schtasks.exe
PID 1632 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe C:\Windows\System32\cmd.exe
PID 1632 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe C:\Windows\System32\cmd.exe
PID 1632 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe C:\Windows\System32\cmd.exe
PID 2652 wrote to memory of 2796 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2652 wrote to memory of 2796 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2652 wrote to memory of 2796 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2652 wrote to memory of 2432 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2652 wrote to memory of 2432 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2652 wrote to memory of 2432 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2652 wrote to memory of 2656 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2652 wrote to memory of 2656 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2652 wrote to memory of 2656 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2652 wrote to memory of 2684 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2652 wrote to memory of 2684 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2652 wrote to memory of 2684 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2652 wrote to memory of 2460 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2652 wrote to memory of 2460 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2652 wrote to memory of 2460 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2652 wrote to memory of 2644 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2652 wrote to memory of 2644 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2652 wrote to memory of 2644 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2652 wrote to memory of 2424 N/A C:\Windows\System32\cmd.exe C:\a\rat.exe
PID 2652 wrote to memory of 2424 N/A C:\Windows\System32\cmd.exe C:\a\rat.exe
PID 2652 wrote to memory of 2424 N/A C:\Windows\System32\cmd.exe C:\a\rat.exe
PID 2424 wrote to memory of 1932 N/A C:\a\rat.exe C:\Windows\System32\schtasks.exe
PID 2424 wrote to memory of 1932 N/A C:\a\rat.exe C:\Windows\System32\schtasks.exe
PID 2424 wrote to memory of 1932 N/A C:\a\rat.exe C:\Windows\System32\schtasks.exe
PID 2424 wrote to memory of 2676 N/A C:\a\rat.exe C:\Windows\system32\WerFault.exe
PID 2424 wrote to memory of 2676 N/A C:\a\rat.exe C:\Windows\system32\WerFault.exe
PID 2424 wrote to memory of 2676 N/A C:\a\rat.exe C:\Windows\system32\WerFault.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe

"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\a\rat.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp225F.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp225F.tmp.bat

C:\Windows\system32\tasklist.exe

Tasklist /fi "PID eq 1632"

C:\Windows\system32\find.exe

find ":"

C:\Windows\system32\timeout.exe

Timeout /T 1 /Nobreak

C:\Windows\system32\tasklist.exe

Tasklist /fi "PID eq 1632"

C:\Windows\system32\find.exe

find ":"

C:\Windows\system32\timeout.exe

Timeout /T 1 /Nobreak

C:\a\rat.exe

"rat.exe"

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\a\rat.exe"

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 2424 -s 1552

Network

Country Destination Domain Proto
US 8.8.8.8:53 google.com udp
US 8.8.8.8:53 api.Telegram.org udp
NL 149.154.167.220:443 api.Telegram.org tcp
NL 149.154.167.220:443 api.Telegram.org tcp

Files

memory/1632-0-0x0000000000980000-0x00000000009A8000-memory.dmp

memory/1632-1-0x000007FEF5870000-0x000007FEF625C000-memory.dmp

memory/1632-2-0x000000001AE70000-0x000000001AEF0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp225F.tmp.bat

MD5 32b660beb78e799789be81b652a1160a
SHA1 9bb6112386bbda01bef340e0d5a09e3b68d110af
SHA256 3530df66d4d3bbebeb9f04b2d434c6794c0453b81abaa59a043bbbfe6cfe0fb7
SHA512 0516cef9586a9209a98dae17d74f9eff3211546210a2fa871b9126b2bc84e865458c0382d4e34dd724317bd8a56ebd4e367be5995d7deb8cf04afc178e3f45ce

memory/1632-6-0x000007FEF5870000-0x000007FEF625C000-memory.dmp

C:\a\rat.exe

MD5 2aba3d65b4410e0dfb8e328cd081e1aa
SHA1 570baf9e4fcd9735d90bd9bc461b70f143e6934a
SHA256 af9d1582852905516ee58316f875a8df81beff906e28f5406486c4c62463ead4
SHA512 4670ae6c28364e54b05d277aa43911b26ea0ed76a4e284cb410050a1cf2913d067e88b1bfa007cef0debea5c231acfdb2fb93f1e1c1540d1c50890d473bcdf60

memory/2424-10-0x0000000000C50000-0x0000000000C78000-memory.dmp

memory/2424-12-0x000000001B0F0000-0x000000001B170000-memory.dmp

memory/2424-11-0x000007FEF4E80000-0x000007FEF586C000-memory.dmp

memory/2424-13-0x000007FEF4E80000-0x000007FEF586C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-03-02 21:14

Reported

2024-03-02 21:14

Platform

win10v2004-20240226-en

Max time kernel

20s

Max time network

8s

Command Line

"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"

Signatures

ToxicEye

rat trojan toxiceye

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation C:\a\rat.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\a\rat.exe N/A

Enumerates physical storage devices

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 C:\Windows\system32\taskmgr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A C:\Windows\system32\taskmgr.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName C:\Windows\system32\taskmgr.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\System32\schtasks.exe N/A
N/A N/A C:\Windows\System32\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\timeout.exe N/A

Enumerates processes with tasklist

Description Indicator Process Target
N/A N/A C:\Windows\system32\tasklist.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\a\rat.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeDebugPrivilege N/A C:\a\rat.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\a\rat.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe

"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\a\rat.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp52E3.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp52E3.tmp.bat

C:\Windows\system32\tasklist.exe

Tasklist /fi "PID eq 3532"

C:\Windows\system32\find.exe

find ":"

C:\Windows\system32\timeout.exe

Timeout /T 1 /Nobreak

C:\a\rat.exe

"rat.exe"

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\a\rat.exe"

C:\Windows\system32\taskmgr.exe

"C:\Windows\system32\taskmgr.exe" /4

Network

Country Destination Domain Proto
US 8.8.8.8:53 5.181.190.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 206.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 google.com udp
US 8.8.8.8:53 api.Telegram.org udp

Files

memory/3532-0-0x000001EAF2F10000-0x000001EAF2F38000-memory.dmp

memory/3532-1-0x00007FF970F20000-0x00007FF9719E1000-memory.dmp

memory/3532-2-0x000001EAF3320000-0x000001EAF3330000-memory.dmp

memory/3532-6-0x00007FF970F20000-0x00007FF9719E1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp52E3.tmp.bat

MD5 283edd9d3eb779f49112b6c4dcd7586b
SHA1 881ff76d7fe2c4d7ca6e738f2182103a6f157fd9
SHA256 a18024c2b016df8abb75b9197537525a7ac655bb1b5387ea530bb59c7d99c463
SHA512 03ebf55ac455b81b301e1371464de6568331ded078acae30b89e66f60dd86770dc22917d5b51cb712624c5bdd9aa6889a6dda3f703b5cb739b13471e5147f946

C:\a\rat.exe

MD5 2aba3d65b4410e0dfb8e328cd081e1aa
SHA1 570baf9e4fcd9735d90bd9bc461b70f143e6934a
SHA256 af9d1582852905516ee58316f875a8df81beff906e28f5406486c4c62463ead4
SHA512 4670ae6c28364e54b05d277aa43911b26ea0ed76a4e284cb410050a1cf2913d067e88b1bfa007cef0debea5c231acfdb2fb93f1e1c1540d1c50890d473bcdf60

memory/2348-11-0x00007FF970F20000-0x00007FF9719E1000-memory.dmp

memory/2348-12-0x000001AFE3820000-0x000001AFE3830000-memory.dmp

memory/4412-13-0x0000024C63870000-0x0000024C63871000-memory.dmp

memory/4412-14-0x0000024C63870000-0x0000024C63871000-memory.dmp

memory/4412-15-0x0000024C63870000-0x0000024C63871000-memory.dmp

memory/4412-19-0x0000024C63870000-0x0000024C63871000-memory.dmp

memory/4412-20-0x0000024C63870000-0x0000024C63871000-memory.dmp

memory/4412-21-0x0000024C63870000-0x0000024C63871000-memory.dmp

memory/4412-22-0x0000024C63870000-0x0000024C63871000-memory.dmp

memory/4412-24-0x0000024C63870000-0x0000024C63871000-memory.dmp

memory/4412-23-0x0000024C63870000-0x0000024C63871000-memory.dmp

memory/4412-25-0x0000024C63870000-0x0000024C63871000-memory.dmp