Analysis

  • max time kernel
    21s
  • max time network
    45s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-04-2024 09:18

General

  • Target

    TelegramRAT.exe

  • Size

    111KB

  • MD5

    e2953259b8c1b5d0323ef57f90ce1f88

  • SHA1

    aff7f7352c411ddc0bb4fccd9370e50fdc83a110

  • SHA256

    651456d2e2a980c763156f177dd9eb5aa6cf3cd4d554164332536184ed980a60

  • SHA512

    46bb038d7585f3a804ec6e90b8fc4556ee1bfbf6c9200b91c7aeb57cc9ba524240aaf5b968b31d1cab008378e933860b09a765b69b7194efaf09b9bf6c653375

  • SSDEEP

    3072:vbvqJe4MUPxxjQbxqHBQWVzCrAZuDF8u:eJe4MQUbU7Y

Score
10/10

Malware Config

Extracted

Family

toxiceye

C2

https://api.telegram.org/bot7005624592:AAFT1GroRFjOnavaa8nJipFR-iCuYT3f2xQ/sendMessage?chat_id=6235796510

Signatures

  • ToxicEye

    ToxicEye is a trojan written in C#.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe
    "C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3176
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Admin\rat.exe"
      2⤵
      • Creates scheduled task(s)
      PID:2068
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp213F.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp213F.tmp.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4940
      • C:\Windows\system32\tasklist.exe
        Tasklist /fi "PID eq 3176"
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:3680
      • C:\Windows\system32\find.exe
        find ":"
        3⤵
          PID:4084
        • C:\Windows\system32\timeout.exe
          Timeout /T 1 /Nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:4872
        • C:\Users\Admin\rat.exe
          "rat.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks processor information in registry
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2236
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Admin\rat.exe"
            4⤵
            • Creates scheduled task(s)
            PID:2124

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp213F.tmp.bat

      Filesize

      185B

      MD5

      773d4115cb81006fd241e53af74c3ef6

      SHA1

      02002d9e458511b99bc2e005f92120063be6a4d6

      SHA256

      a4f396ec519d6d912df2d91e7b05ecaa76ca10a85330da98ed1ea754114a42b2

      SHA512

      7a66e4045cc78011d2a5b199136fbfd3adb830f82a840b1adb1a0de05ae3560769b3168d6b9e7043d5ee6a99d95c1de51569f895936b0b27545170fd2a350224

    • C:\Users\Admin\rat.exe

      Filesize

      111KB

      MD5

      e2953259b8c1b5d0323ef57f90ce1f88

      SHA1

      aff7f7352c411ddc0bb4fccd9370e50fdc83a110

      SHA256

      651456d2e2a980c763156f177dd9eb5aa6cf3cd4d554164332536184ed980a60

      SHA512

      46bb038d7585f3a804ec6e90b8fc4556ee1bfbf6c9200b91c7aeb57cc9ba524240aaf5b968b31d1cab008378e933860b09a765b69b7194efaf09b9bf6c653375

    • memory/2236-11-0x000002A5B8160000-0x000002A5B820A000-memory.dmp

      Filesize

      680KB

    • memory/2236-12-0x000002A5B8290000-0x000002A5B8306000-memory.dmp

      Filesize

      472KB

    • memory/3176-0-0x00000160D62C0000-0x00000160D62E2000-memory.dmp

      Filesize

      136KB

    • memory/3176-1-0x00007FFED7BA0000-0x00007FFED8661000-memory.dmp

      Filesize

      10.8MB

    • memory/3176-2-0x00000160F07D0000-0x00000160F07E0000-memory.dmp

      Filesize

      64KB

    • memory/3176-7-0x00007FFED7BA0000-0x00007FFED8661000-memory.dmp

      Filesize

      10.8MB