Analysis
-
max time kernel
132s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
Telegram/Telegram.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Telegram/Telegram.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Telegram/modules/x64/d3d/d3dcompiler_47.dll
Resource
win10v2004-20240508-en
General
-
Target
Telegram/Telegram.exe
-
Size
149.4MB
-
MD5
40889af6437bb9ea7ceca2a61a7d3c31
-
SHA1
e7dc3b4983cc2a52da58de103027961492bc6ecf
-
SHA256
bae14c635b6142009654570c001db2cf27bbf641fb294611a0c4ae490290ab53
-
SHA512
d0f2f9f54a8cae72bc3fc802e785959b49c7f957a5f11f172a445c7189e44f783970ffb4748b86a0b71c750bb2bd0965230361d57a62e0786f3989da3727ee27
-
SSDEEP
786432:3xmWnhoXQ5Y91k9uH171xqMBLvbMDNj1o1fDtH73FC7KKE9AMqzNw:3nnhog+91k9wljBLQJJo1fDtjFUycNw
Malware Config
Signatures
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Telegram.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Telegram.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Telegram.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct Telegram.exe -
Modifies registry class 16 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\tdesktop.tg\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Telegram\\Telegram.exe\" -- \"%1\"" Telegram.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\tg\shell\open Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\tg\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Telegram\\Telegram.exe,1\"" Telegram.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\tg\shell Telegram.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\tg\shell\open\command Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\tg\URL Protocol Telegram.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\tg\DefaultIcon Telegram.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\tg Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\tg\ = "URL:Telegram Link" Telegram.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\tdesktop.tg\shell Telegram.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\tdesktop.tg\shell\open Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\tdesktop.tg\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Telegram\\Telegram.exe,1\"" Telegram.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\tdesktop.tg\shell\open\command Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\tg\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Telegram\\Telegram.exe\" -- \"%1\"" Telegram.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\tdesktop.tg Telegram.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\tdesktop.tg\DefaultIcon Telegram.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2444 Telegram.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe 2444 Telegram.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Telegram\Telegram.exe"C:\Users\Admin\AppData\Local\Temp\Telegram\Telegram.exe"1⤵
- Drops desktop.ini file(s)
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa