Analysis
-
max time kernel
15s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 14:39
Behavioral task
behavioral1
Sample
7lk7vT1.exe
Resource
win7-20240508-en
General
-
Target
7lk7vT1.exe
-
Size
119KB
-
MD5
f548ca220d471a524cb1c7d8ff613721
-
SHA1
3040c8945b16a58f44dd4f1ae5a7b0faf61b405e
-
SHA256
5d0be378578617a2264e822d1b4424d71e8fa3e8dad60b30af614b173682880b
-
SHA512
b1ea254c1ab6c3983cdb906f39403da5b342fed1836b14b4654a0e25dcae274edc517e30ec66fefbeb6f511b89e869a4d785098896bf55eac36108c79494c158
-
SSDEEP
3072:BKUpvwYGqOcW7gabRq15QWXzCrAZu8Gq:MIWMabAL
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot6444357834:AAGtL3te5_xl4dvacn8BJElHrky5SlLcE_4/sendMessage?chat_id=5974265372
Signatures
-
Deletes itself 1 IoCs
pid Process 2904 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2548 RTGManager.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1256 schtasks.exe 2124 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2696 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2788 tasklist.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2548 RTGManager.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2548 RTGManager.exe 2548 RTGManager.exe 2548 RTGManager.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2164 7lk7vT1.exe Token: SeDebugPrivilege 2788 tasklist.exe Token: SeDebugPrivilege 2548 RTGManager.exe Token: SeDebugPrivilege 2548 RTGManager.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2548 RTGManager.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2164 wrote to memory of 1256 2164 7lk7vT1.exe 30 PID 2164 wrote to memory of 1256 2164 7lk7vT1.exe 30 PID 2164 wrote to memory of 1256 2164 7lk7vT1.exe 30 PID 2164 wrote to memory of 2904 2164 7lk7vT1.exe 32 PID 2164 wrote to memory of 2904 2164 7lk7vT1.exe 32 PID 2164 wrote to memory of 2904 2164 7lk7vT1.exe 32 PID 2904 wrote to memory of 2788 2904 cmd.exe 34 PID 2904 wrote to memory of 2788 2904 cmd.exe 34 PID 2904 wrote to memory of 2788 2904 cmd.exe 34 PID 2904 wrote to memory of 2796 2904 cmd.exe 35 PID 2904 wrote to memory of 2796 2904 cmd.exe 35 PID 2904 wrote to memory of 2796 2904 cmd.exe 35 PID 2904 wrote to memory of 2696 2904 cmd.exe 36 PID 2904 wrote to memory of 2696 2904 cmd.exe 36 PID 2904 wrote to memory of 2696 2904 cmd.exe 36 PID 2904 wrote to memory of 2548 2904 cmd.exe 37 PID 2904 wrote to memory of 2548 2904 cmd.exe 37 PID 2904 wrote to memory of 2548 2904 cmd.exe 37 PID 2548 wrote to memory of 2124 2548 RTGManager.exe 39 PID 2548 wrote to memory of 2124 2548 RTGManager.exe 39 PID 2548 wrote to memory of 2124 2548 RTGManager.exe 39 PID 2548 wrote to memory of 2876 2548 RTGManager.exe 41 PID 2548 wrote to memory of 2876 2548 RTGManager.exe 41 PID 2548 wrote to memory of 2876 2548 RTGManager.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7lk7vT1.exe"C:\Users\Admin\AppData\Local\Temp\7lk7vT1.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Sh1zo\RTGManager.exe"2⤵
- Creates scheduled task(s)
PID:1256
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp2B83.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp2B83.tmp.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2164"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2796
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2696
-
-
C:\Users\Sh1zo\RTGManager.exe"RTGManager.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Sh1zo\RTGManager.exe"4⤵
- Creates scheduled task(s)
PID:2124
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2548 -s 15804⤵PID:2876
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188B
MD5971d86f38c50bd022c85920271373246
SHA19537c1ce0f6298faee1f0dc98a736f29b0022d3b
SHA2562b492384012f250070b21cfe48089618002100c3745b535cc26fefb36d1fdee2
SHA5129ef5b3f9fe7fb09634b918ff47a6b106e7cf02b3625eac7bef6a8c37185ad6f6c542c9a132bca7bcc26defe87467f518507658b71017ae06a55b53de8e769e3a
-
Filesize
119KB
MD5f548ca220d471a524cb1c7d8ff613721
SHA13040c8945b16a58f44dd4f1ae5a7b0faf61b405e
SHA2565d0be378578617a2264e822d1b4424d71e8fa3e8dad60b30af614b173682880b
SHA512b1ea254c1ab6c3983cdb906f39403da5b342fed1836b14b4654a0e25dcae274edc517e30ec66fefbeb6f511b89e869a4d785098896bf55eac36108c79494c158