Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-03-2024 01:39
Behavioral task
behavioral1
Sample
2aba3d65b4410e0dfb8e328cd081e1aa.exe
Resource
win7-20240221-en
General
-
Target
2aba3d65b4410e0dfb8e328cd081e1aa.exe
-
Size
136KB
-
MD5
2aba3d65b4410e0dfb8e328cd081e1aa
-
SHA1
570baf9e4fcd9735d90bd9bc461b70f143e6934a
-
SHA256
af9d1582852905516ee58316f875a8df81beff906e28f5406486c4c62463ead4
-
SHA512
4670ae6c28364e54b05d277aa43911b26ea0ed76a4e284cb410050a1cf2913d067e88b1bfa007cef0debea5c231acfdb2fb93f1e1c1540d1c50890d473bcdf60
-
SSDEEP
3072:c78TXzjFl2Chi74tqiokbPFfmQWegCrAZB0qd:QczjFE4oiokbN0O
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7040511851:AAEjBKSxADGWlNtLxaKpotGtf53NUQ1UgAo/sendMessage?chat_id=6226815698
Signatures
-
Deletes itself 1 IoCs
pid Process 2840 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2600 rat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2588 schtasks.exe 2908 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2496 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2644 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2600 rat.exe 2600 rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2212 2aba3d65b4410e0dfb8e328cd081e1aa.exe Token: SeDebugPrivilege 2644 tasklist.exe Token: SeDebugPrivilege 2600 rat.exe Token: SeDebugPrivilege 2600 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2600 rat.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2588 2212 2aba3d65b4410e0dfb8e328cd081e1aa.exe 30 PID 2212 wrote to memory of 2588 2212 2aba3d65b4410e0dfb8e328cd081e1aa.exe 30 PID 2212 wrote to memory of 2588 2212 2aba3d65b4410e0dfb8e328cd081e1aa.exe 30 PID 2212 wrote to memory of 2840 2212 2aba3d65b4410e0dfb8e328cd081e1aa.exe 32 PID 2212 wrote to memory of 2840 2212 2aba3d65b4410e0dfb8e328cd081e1aa.exe 32 PID 2212 wrote to memory of 2840 2212 2aba3d65b4410e0dfb8e328cd081e1aa.exe 32 PID 2840 wrote to memory of 2644 2840 cmd.exe 34 PID 2840 wrote to memory of 2644 2840 cmd.exe 34 PID 2840 wrote to memory of 2644 2840 cmd.exe 34 PID 2840 wrote to memory of 2384 2840 cmd.exe 35 PID 2840 wrote to memory of 2384 2840 cmd.exe 35 PID 2840 wrote to memory of 2384 2840 cmd.exe 35 PID 2840 wrote to memory of 2496 2840 cmd.exe 36 PID 2840 wrote to memory of 2496 2840 cmd.exe 36 PID 2840 wrote to memory of 2496 2840 cmd.exe 36 PID 2840 wrote to memory of 2600 2840 cmd.exe 37 PID 2840 wrote to memory of 2600 2840 cmd.exe 37 PID 2840 wrote to memory of 2600 2840 cmd.exe 37 PID 2600 wrote to memory of 2908 2600 rat.exe 39 PID 2600 wrote to memory of 2908 2600 rat.exe 39 PID 2600 wrote to memory of 2908 2600 rat.exe 39 PID 2600 wrote to memory of 660 2600 rat.exe 41 PID 2600 wrote to memory of 660 2600 rat.exe 41 PID 2600 wrote to memory of 660 2600 rat.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2aba3d65b4410e0dfb8e328cd081e1aa.exe"C:\Users\Admin\AppData\Local\Temp\2aba3d65b4410e0dfb8e328cd081e1aa.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\a\rat.exe"2⤵
- Creates scheduled task(s)
PID:2588
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp7417.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp7417.tmp.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2212"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2384
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2496
-
-
C:\a\rat.exe"rat.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\a\rat.exe"4⤵
- Creates scheduled task(s)
PID:2908
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2600 -s 15804⤵PID:660
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196B
MD5cbc3d3466acef8392ccf4b3e3edd3d9f
SHA1f561046ffb9c33bc561711a0300714639684b2ec
SHA2561b640f4bcae3091a030faa0d7e01813a5da262d4ce2c34aee41e2e9852972886
SHA512134df12b0540171adcd992becb2cf528b25422aa08a23e02b553788cbb5364348579dd45b75a20f3b577576b4f4a03938279008026a77bb4ef2df77c9f633bb6
-
Filesize
136KB
MD52aba3d65b4410e0dfb8e328cd081e1aa
SHA1570baf9e4fcd9735d90bd9bc461b70f143e6934a
SHA256af9d1582852905516ee58316f875a8df81beff906e28f5406486c4c62463ead4
SHA5124670ae6c28364e54b05d277aa43911b26ea0ed76a4e284cb410050a1cf2913d067e88b1bfa007cef0debea5c231acfdb2fb93f1e1c1540d1c50890d473bcdf60