Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 01:56
Behavioral task
behavioral1
Sample
41bd68b9e01c2019478cb811b44cffb0.exe
Resource
win7-20240220-en
General
-
Target
41bd68b9e01c2019478cb811b44cffb0.exe
-
Size
119KB
-
MD5
41bd68b9e01c2019478cb811b44cffb0
-
SHA1
6fa177eb529a76f734361fc321854a4b0d938fad
-
SHA256
c83adba97cd5425d70aa5f5cc452554573e61312c835e18d9d050edf84924fc5
-
SHA512
e4134d34f2fe34f6cd630547abe82f868646d6ee72a173c90280847eaa6caad6297f94e0f285de340a90a1717e0f40bb7d2297a53c8b2395e8a74628b72f9812
-
SSDEEP
3072:ZaztXZwwoPpqDecIIbxqH4QWVzCrAZuD4x:U1nDeBIbUk
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7005624592:AAFT1GroRFjOnavaa8nJipFR-iCuYT3f2xQ/sendMessage?chat_id=6235796510
Signatures
-
Deletes itself 1 IoCs
pid Process 2660 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2432 rat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2580 schtasks.exe 2960 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2556 timeout.exe 2684 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2084 tasklist.exe 2988 tasklist.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2432 rat.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2432 rat.exe 2432 rat.exe 2432 rat.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2172 41bd68b9e01c2019478cb811b44cffb0.exe Token: SeDebugPrivilege 2084 tasklist.exe Token: SeDebugPrivilege 2988 tasklist.exe Token: SeDebugPrivilege 2432 rat.exe Token: SeDebugPrivilege 2432 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2432 rat.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2580 2172 41bd68b9e01c2019478cb811b44cffb0.exe 30 PID 2172 wrote to memory of 2580 2172 41bd68b9e01c2019478cb811b44cffb0.exe 30 PID 2172 wrote to memory of 2580 2172 41bd68b9e01c2019478cb811b44cffb0.exe 30 PID 2172 wrote to memory of 2660 2172 41bd68b9e01c2019478cb811b44cffb0.exe 32 PID 2172 wrote to memory of 2660 2172 41bd68b9e01c2019478cb811b44cffb0.exe 32 PID 2172 wrote to memory of 2660 2172 41bd68b9e01c2019478cb811b44cffb0.exe 32 PID 2660 wrote to memory of 2084 2660 cmd.exe 34 PID 2660 wrote to memory of 2084 2660 cmd.exe 34 PID 2660 wrote to memory of 2084 2660 cmd.exe 34 PID 2660 wrote to memory of 2860 2660 cmd.exe 35 PID 2660 wrote to memory of 2860 2660 cmd.exe 35 PID 2660 wrote to memory of 2860 2660 cmd.exe 35 PID 2660 wrote to memory of 2556 2660 cmd.exe 36 PID 2660 wrote to memory of 2556 2660 cmd.exe 36 PID 2660 wrote to memory of 2556 2660 cmd.exe 36 PID 2660 wrote to memory of 2988 2660 cmd.exe 37 PID 2660 wrote to memory of 2988 2660 cmd.exe 37 PID 2660 wrote to memory of 2988 2660 cmd.exe 37 PID 2660 wrote to memory of 2568 2660 cmd.exe 38 PID 2660 wrote to memory of 2568 2660 cmd.exe 38 PID 2660 wrote to memory of 2568 2660 cmd.exe 38 PID 2660 wrote to memory of 2684 2660 cmd.exe 39 PID 2660 wrote to memory of 2684 2660 cmd.exe 39 PID 2660 wrote to memory of 2684 2660 cmd.exe 39 PID 2660 wrote to memory of 2432 2660 cmd.exe 40 PID 2660 wrote to memory of 2432 2660 cmd.exe 40 PID 2660 wrote to memory of 2432 2660 cmd.exe 40 PID 2432 wrote to memory of 2960 2432 rat.exe 42 PID 2432 wrote to memory of 2960 2432 rat.exe 42 PID 2432 wrote to memory of 2960 2432 rat.exe 42 PID 2432 wrote to memory of 2940 2432 rat.exe 44 PID 2432 wrote to memory of 2940 2432 rat.exe 44 PID 2432 wrote to memory of 2940 2432 rat.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\41bd68b9e01c2019478cb811b44cffb0.exe"C:\Users\Admin\AppData\Local\Temp\41bd68b9e01c2019478cb811b44cffb0.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Creates scheduled task(s)
PID:2580
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp18DE.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp18DE.tmp.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2172"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2860
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2556
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2172"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2568
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2684
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Creates scheduled task(s)
PID:2960
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2432 -s 17084⤵PID:2940
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209B
MD54fc888d1b8573baa770e2672afba4c26
SHA1fb1062622bda1b59b8cbaa978b7d322ba8dd326e
SHA25618a61b285d06d58af30349b557b23f3e20a9508fefefc75a093e7da76110ce3e
SHA5129f27bb4d8a35827d19e1cb54b7ca348a49ff7b5bc468c2f0055902d2415c4dbe3fcb83c5e5522c8d5c917d116957beca4ab051fe7cfa63d4a2dcdbdb23dc3aeb
-
Filesize
119KB
MD541bd68b9e01c2019478cb811b44cffb0
SHA16fa177eb529a76f734361fc321854a4b0d938fad
SHA256c83adba97cd5425d70aa5f5cc452554573e61312c835e18d9d050edf84924fc5
SHA512e4134d34f2fe34f6cd630547abe82f868646d6ee72a173c90280847eaa6caad6297f94e0f285de340a90a1717e0f40bb7d2297a53c8b2395e8a74628b72f9812