Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 01:56
Behavioral task
behavioral1
Sample
41bd68b9e01c2019478cb811b44cffb0.exe
Resource
win7-20240220-en
General
-
Target
41bd68b9e01c2019478cb811b44cffb0.exe
-
Size
119KB
-
MD5
41bd68b9e01c2019478cb811b44cffb0
-
SHA1
6fa177eb529a76f734361fc321854a4b0d938fad
-
SHA256
c83adba97cd5425d70aa5f5cc452554573e61312c835e18d9d050edf84924fc5
-
SHA512
e4134d34f2fe34f6cd630547abe82f868646d6ee72a173c90280847eaa6caad6297f94e0f285de340a90a1717e0f40bb7d2297a53c8b2395e8a74628b72f9812
-
SSDEEP
3072:ZaztXZwwoPpqDecIIbxqH4QWVzCrAZuD4x:U1nDeBIbUk
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7005624592:AAFT1GroRFjOnavaa8nJipFR-iCuYT3f2xQ/sendMessage?chat_id=6235796510
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 41bd68b9e01c2019478cb811b44cffb0.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation rat.exe -
Executes dropped EXE 1 IoCs
pid Process 544 rat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2960 schtasks.exe 1724 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1748 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1728 tasklist.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 544 rat.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe 544 rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3080 41bd68b9e01c2019478cb811b44cffb0.exe Token: SeDebugPrivilege 1728 tasklist.exe Token: SeDebugPrivilege 544 rat.exe Token: SeDebugPrivilege 544 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 544 rat.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3080 wrote to memory of 2960 3080 41bd68b9e01c2019478cb811b44cffb0.exe 92 PID 3080 wrote to memory of 2960 3080 41bd68b9e01c2019478cb811b44cffb0.exe 92 PID 3080 wrote to memory of 1012 3080 41bd68b9e01c2019478cb811b44cffb0.exe 94 PID 3080 wrote to memory of 1012 3080 41bd68b9e01c2019478cb811b44cffb0.exe 94 PID 1012 wrote to memory of 1728 1012 cmd.exe 96 PID 1012 wrote to memory of 1728 1012 cmd.exe 96 PID 1012 wrote to memory of 1720 1012 cmd.exe 97 PID 1012 wrote to memory of 1720 1012 cmd.exe 97 PID 1012 wrote to memory of 1748 1012 cmd.exe 98 PID 1012 wrote to memory of 1748 1012 cmd.exe 98 PID 1012 wrote to memory of 544 1012 cmd.exe 99 PID 1012 wrote to memory of 544 1012 cmd.exe 99 PID 544 wrote to memory of 1724 544 rat.exe 101 PID 544 wrote to memory of 1724 544 rat.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\41bd68b9e01c2019478cb811b44cffb0.exe"C:\Users\Admin\AppData\Local\Temp\41bd68b9e01c2019478cb811b44cffb0.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Creates scheduled task(s)
PID:2960
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpFFFB.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpFFFB.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 3080"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:1720
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:1748
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Creates scheduled task(s)
PID:1724
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3612 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:81⤵PID:3812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209B
MD54b455f701fb5635e4bfe1edd123bb35c
SHA145b0620bf9d7f750d19f98a31d8efeddac35238c
SHA256985789da0ca9dac2d4c7f0df342ab45fe0f0a4eb8d7abebf683e4cb8f2ce5cdd
SHA512ea79e883c09cf68886d2af970b8608c74bad9609380d319f34efc7f57c8d3a7da7b818c8bb1d5041b76b5ab202876d851756f9482d0a8780c979d416e06d32bb
-
Filesize
119KB
MD541bd68b9e01c2019478cb811b44cffb0
SHA16fa177eb529a76f734361fc321854a4b0d938fad
SHA256c83adba97cd5425d70aa5f5cc452554573e61312c835e18d9d050edf84924fc5
SHA512e4134d34f2fe34f6cd630547abe82f868646d6ee72a173c90280847eaa6caad6297f94e0f285de340a90a1717e0f40bb7d2297a53c8b2395e8a74628b72f9812