Analysis
-
max time kernel
11s -
max time network
12s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-04-2024 09:05
Behavioral task
behavioral1
Sample
AudioSwitcher.AudioApi.CoreAudio.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
AudioSwitcher.AudioApi.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
Sodium.dll
Resource
win10v2004-20240426-en
Errors
General
-
Target
TelegramRAT.exe
-
Size
119KB
-
MD5
41bd68b9e01c2019478cb811b44cffb0
-
SHA1
6fa177eb529a76f734361fc321854a4b0d938fad
-
SHA256
c83adba97cd5425d70aa5f5cc452554573e61312c835e18d9d050edf84924fc5
-
SHA512
e4134d34f2fe34f6cd630547abe82f868646d6ee72a173c90280847eaa6caad6297f94e0f285de340a90a1717e0f40bb7d2297a53c8b2395e8a74628b72f9812
-
SSDEEP
3072:ZaztXZwwoPpqDecIIbxqH4QWVzCrAZuD4x:U1nDeBIbUk
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7005624592:AAFT1GroRFjOnavaa8nJipFR-iCuYT3f2xQ/sendMessage?chat_id=6235796510
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rat.exeTelegramRAT.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation rat.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation TelegramRAT.exe -
Executes dropped EXE 1 IoCs
Processes:
rat.exepid process 2864 rat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3616 schtasks.exe 2616 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4616 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
rat.exepid process 2864 rat.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rat.exepid process 2864 rat.exe 2864 rat.exe 2864 rat.exe 2864 rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
TelegramRAT.exetasklist.exerat.exedescription pid process Token: SeDebugPrivilege 1528 TelegramRAT.exe Token: SeDebugPrivilege 2328 tasklist.exe Token: SeDebugPrivilege 2864 rat.exe Token: SeDebugPrivilege 2864 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rat.exepid process 2864 rat.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
TelegramRAT.execmd.exerat.exedescription pid process target process PID 1528 wrote to memory of 2616 1528 TelegramRAT.exe schtasks.exe PID 1528 wrote to memory of 2616 1528 TelegramRAT.exe schtasks.exe PID 1528 wrote to memory of 4832 1528 TelegramRAT.exe cmd.exe PID 1528 wrote to memory of 4832 1528 TelegramRAT.exe cmd.exe PID 4832 wrote to memory of 2328 4832 cmd.exe tasklist.exe PID 4832 wrote to memory of 2328 4832 cmd.exe tasklist.exe PID 4832 wrote to memory of 4840 4832 cmd.exe find.exe PID 4832 wrote to memory of 4840 4832 cmd.exe find.exe PID 4832 wrote to memory of 4616 4832 cmd.exe timeout.exe PID 4832 wrote to memory of 4616 4832 cmd.exe timeout.exe PID 4832 wrote to memory of 2864 4832 cmd.exe rat.exe PID 4832 wrote to memory of 2864 4832 cmd.exe rat.exe PID 2864 wrote to memory of 3616 2864 rat.exe schtasks.exe PID 2864 wrote to memory of 3616 2864 rat.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Creates scheduled task(s)
PID:2616
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp72AF.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp72AF.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1528"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:4840
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:4616
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Creates scheduled task(s)
PID:3616
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188B
MD53dd7484cc88d11cec6d76681b8521d63
SHA17c264542f355f1ac15a1bc8e0038548f1a19aa6a
SHA2562b59a1fe0eb32362ea016bf0eabae6fadd6bef64013cf9c006754c2da74c12b0
SHA5124836dde44ef38a062e2ec167c83a051ec07c9df498e1f2b0c24ab70667cac6efc84fe745e834b3b2438247e3f8355707c00e1aa7336bbcb0c7edbc3b55fd10a1
-
Filesize
119KB
MD541bd68b9e01c2019478cb811b44cffb0
SHA16fa177eb529a76f734361fc321854a4b0d938fad
SHA256c83adba97cd5425d70aa5f5cc452554573e61312c835e18d9d050edf84924fc5
SHA512e4134d34f2fe34f6cd630547abe82f868646d6ee72a173c90280847eaa6caad6297f94e0f285de340a90a1717e0f40bb7d2297a53c8b2395e8a74628b72f9812