Resubmissions

18-05-2024 01:48

240518-b8ehbsee95 10

18-05-2024 01:47

240518-b7snkaee49 10

18-05-2024 01:40

240518-b3mlraec26 10

Analysis

  • max time kernel
    260s
  • max time network
    262s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18-05-2024 01:48

Errors

Reason
Machine shutdown

General

  • Target

    XcHvYYrNa.exe

  • Size

    111KB

  • MD5

    98e558eaea97f0b282b42fa6d49070b6

  • SHA1

    2e48bb1b50177fe17392ac9407ba9f7e45685a3a

  • SHA256

    d50d11636b59a11c81577342de7c72f694c99540311c2c3ffa53126e8cc394f1

  • SHA512

    01dcd7a191ef331fe7626f760064e4368cd06c7a30374b74074d6dddf35683b443fb8c0677d1a7bfa88eac81f482dadf6788f343d9958fc9818be749ac7e9882

  • SSDEEP

    1536:v+bDH/4gqLM91qQIwBI5xxxxdyyKDWfebhDqI68QWfzCrAZuYPwDr:Wb7/4jLSIFxxj8bxqH8QWfzCrAZuYUr

Score
10/10

Malware Config

Extracted

Family

toxiceye

C2

https://api.telegram.org/bot6444357834:AAGtL3te5_xl4dvacn8BJElHrky5SlLcE_4/sendMessage?chat_id=5563559839

Signatures

  • ToxicEye

    ToxicEye is a trojan written in C#.

  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 16 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\XcHvYYrNa.exe
    "C:\Users\Admin\AppData\Local\Temp\XcHvYYrNa.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4024
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\NVIDIA\IShadowRTX.exe"
      2⤵
      • Creates scheduled task(s)
      PID:644
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp6254.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp6254.tmp.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Windows\system32\tasklist.exe
        Tasklist /fi "PID eq 4024"
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:2212
      • C:\Windows\system32\find.exe
        find ":"
        3⤵
          PID:2364
        • C:\Windows\system32\timeout.exe
          Timeout /T 1 /Nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:1820
        • C:\Users\NVIDIA\IShadowRTX.exe
          "IShadowRTX.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3928
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\NVIDIA\IShadowRTX.exe"
            4⤵
            • Creates scheduled task(s)
            PID:2292
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4496
      • C:\Windows\system32\dashost.exe
        dashost.exe {e175af6c-4c69-40b6-b0eeeece545f5e99}
        2⤵
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        PID:3076
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:784
    • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
      "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4236
      • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
        "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3852
        • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
          "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Relaunch /Play C:\Users\Admin\Desktop\ResizeUnpublish.mp2
          3⤵
          • Drops desktop.ini file(s)
          • Enumerates connected drives
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:2608
      • C:\Windows\SysWOW64\unregmp2.exe
        "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4260
        • C:\Windows\System32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
          3⤵
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          PID:2860
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s upnphost
      1⤵
      • Drops file in Windows directory
      PID:3160
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Checks processor information in registry
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1452
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0 /state0:0xa3aab055 /state1:0x41c64e6d
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:4092

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

      Filesize

      256KB

      MD5

      b6ca6fbfb6f977eacea2a7b19bd07cbe

      SHA1

      64673eaf103718702738abdcb1256abcaecbfc6e

      SHA256

      4879234fb1158667581c6b2784a400de88806fe2a1f881b4f281fd3cfa812082

      SHA512

      313599084e49c86eee634ad6426750778535a6f16666563d7ad3380564b4dbd36e987358870e98e8c07a12bcef887f8b060a89ff68a007534aefe52c7cd77eff

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

      Filesize

      1024KB

      MD5

      8f5281b9a3eb67be34214c763db5af9c

      SHA1

      21db98143396259fca0eab4185e124599f5754bc

      SHA256

      fe214dc76b79583957e1ee6507599f9728dfeca420414f99f770553ac1cd5d30

      SHA512

      37b8422f7cf1f1008a13483eb1912ec8a2e7d13991ee7754b28d46b8f04e484f17144629feb749fb7a464d4ca7b386efb9f58933045f51722a023ff3889c88df

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

      Filesize

      68KB

      MD5

      abeb547860d971f926b8dffc8c15023f

      SHA1

      3ff3b775e26eae6cedf81283319788ed1f9df09c

      SHA256

      fab4826462e573f671e39210de722e8b888660071b671793a95b86995e9cbc25

      SHA512

      be53396f488647f8ce51a540ab249eb03fafa419b60fc288a5d45775e81cdd5863480b2641e82bf7eed4359234e67e6bddec0dca3b08096ebdfdf42e84896675

    • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

      Filesize

      9KB

      MD5

      7050d5ae8acfbe560fa11073fef8185d

      SHA1

      5bc38e77ff06785fe0aec5a345c4ccd15752560e

      SHA256

      cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

      SHA512

      a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

    • C:\Users\Admin\AppData\Local\Temp\tmp21968.WMC\allservices.xml

      Filesize

      546B

      MD5

      df03e65b8e082f24dab09c57bc9c6241

      SHA1

      6b0dacbf38744c9a381830e6a5dc4c71bd7cedbf

      SHA256

      155b9c588061c71832af329fafa5678835d9153b8fbb7592195ae953d0c455ba

      SHA512

      ef1cc8d27fbc5da5daab854c933d3914b84ee539d4d2f0126dc1a04a830c5599e39a923c80257653638b1b99b0073a7174cc164be5887181730883c752ba2f99

    • C:\Users\Admin\AppData\Local\Temp\tmp23234.WMC\serviceinfo.xml

      Filesize

      523B

      MD5

      d58da90d6dc51f97cb84dfbffe2b2300

      SHA1

      5f86b06b992a3146cb698a99932ead57a5ec4666

      SHA256

      93acdb79543d9248ca3fca661f3ac287e6004e4b3dafd79d4c4070794ffbf2ad

      SHA512

      7f1e95e5aa4c8a0e4c967135c78f22f4505f2a48bbc619924d0096bf4a94d469389b9e8488c12edacfba819517b8376546687d1145660ad1f49d8c20a744e636

    • C:\Users\Admin\AppData\Local\Temp\tmp6254.tmp.bat

      Filesize

      191B

      MD5

      e03b161ba5ff7673948b54c053ac4078

      SHA1

      8d5cbedaba6df49140b387fc620eb2ee735fc301

      SHA256

      eeb1d72eb594e860530bf29ee78358c4b1e02f697f8d019d089a34590a16e5e4

      SHA512

      ce76c74c3fd6a167288d3d3ca45ec5b4d1ee8294adf3a54a791c2a7f223302653183b52bdf0820bee9e680ddfbe73ec6db954daff172138325fd78112321635b

    • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

      Filesize

      1KB

      MD5

      75d133872031097bbe7fc711672f722b

      SHA1

      6013eec818a6f41547ecbfbeabdc3ae4afeffce0

      SHA256

      8a32a4ad7effd7ef27ec8b68c6b03a1a3e7689ca032f7d72dffe27f6b725aa6c

      SHA512

      ab427f2070ab6304d323cd62c48d18e650fd840cd15312be5f8d95ee63e589414d951c0748db8e0dbd4b934aa046a1fca25e76514cf98aee7e4d3d22b00e6972

    • C:\Users\NVIDIA\IShadowRTX.exe

      Filesize

      111KB

      MD5

      98e558eaea97f0b282b42fa6d49070b6

      SHA1

      2e48bb1b50177fe17392ac9407ba9f7e45685a3a

      SHA256

      d50d11636b59a11c81577342de7c72f694c99540311c2c3ffa53126e8cc394f1

      SHA512

      01dcd7a191ef331fe7626f760064e4368cd06c7a30374b74074d6dddf35683b443fb8c0677d1a7bfa88eac81f482dadf6788f343d9958fc9818be749ac7e9882

    • memory/2608-75-0x000000000A7D0000-0x000000000A7E0000-memory.dmp

      Filesize

      64KB

    • memory/2608-84-0x000000000A7D0000-0x000000000A7E0000-memory.dmp

      Filesize

      64KB

    • memory/2608-66-0x0000000007B70000-0x0000000007B80000-memory.dmp

      Filesize

      64KB

    • memory/2608-71-0x000000000A7D0000-0x000000000A7E0000-memory.dmp

      Filesize

      64KB

    • memory/2608-76-0x000000000A7D0000-0x000000000A7E0000-memory.dmp

      Filesize

      64KB

    • memory/2608-88-0x000000000A7D0000-0x000000000A7E0000-memory.dmp

      Filesize

      64KB

    • memory/2608-74-0x000000000A7D0000-0x000000000A7E0000-memory.dmp

      Filesize

      64KB

    • memory/2608-72-0x000000000A7D0000-0x000000000A7E0000-memory.dmp

      Filesize

      64KB

    • memory/2608-73-0x000000000A7D0000-0x000000000A7E0000-memory.dmp

      Filesize

      64KB

    • memory/2608-77-0x000000000A7D0000-0x000000000A7E0000-memory.dmp

      Filesize

      64KB

    • memory/2608-78-0x000000000A7D0000-0x000000000A7E0000-memory.dmp

      Filesize

      64KB

    • memory/2608-87-0x000000000A7D0000-0x000000000A7E0000-memory.dmp

      Filesize

      64KB

    • memory/2608-80-0x0000000007B70000-0x0000000007B80000-memory.dmp

      Filesize

      64KB

    • memory/2608-81-0x000000000A7D0000-0x000000000A7E0000-memory.dmp

      Filesize

      64KB

    • memory/2608-86-0x000000000A7D0000-0x000000000A7E0000-memory.dmp

      Filesize

      64KB

    • memory/2608-85-0x000000000A7D0000-0x000000000A7E0000-memory.dmp

      Filesize

      64KB

    • memory/2608-82-0x000000000A7D0000-0x000000000A7E0000-memory.dmp

      Filesize

      64KB

    • memory/2608-83-0x000000000A7D0000-0x000000000A7E0000-memory.dmp

      Filesize

      64KB

    • memory/4024-6-0x00007FFF34730000-0x00007FFF3511C000-memory.dmp

      Filesize

      9.9MB

    • memory/4024-2-0x00007FFF34730000-0x00007FFF3511C000-memory.dmp

      Filesize

      9.9MB

    • memory/4024-0-0x00007FFF34733000-0x00007FFF34734000-memory.dmp

      Filesize

      4KB

    • memory/4024-1-0x00000275AA150000-0x00000275AA172000-memory.dmp

      Filesize

      136KB