Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2024 22:16
Behavioral task
behavioral1
Sample
TelegramRAT.exe
Resource
win7-20240708-en
General
-
Target
TelegramRAT.exe
-
Size
111KB
-
MD5
3cdefec5518d17dd30d6ae5d2b10a7aa
-
SHA1
d930c4be3e11056a01d88fc204ede07292b70a38
-
SHA256
1ee0f288b931c649d0442590346cb778a3706d74322c24e1714cf124e9f23b68
-
SHA512
1f12b82dba779a72be66d513ce72518f79bc97282211685bc9b42f0f1a8c2dd756cb372c44c917b11afcc6a71d581a6747f3acd5d6b54743f6b7b689a8c32f69
-
SSDEEP
1536:y+bAQAsnqLoM91qQIwxHxZxdyyKDWfCbhDqI64QWEzCrAZuhN7Dg:VbKsnwo0RZxjQbxqH4QWEzCrAZuhZg
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7302074945:AAGKx5TnjPyRM_fqN4XQLd4uz-PUp4nl8w4/sendMessage?chat_id=6414125020
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
TelegramRAT.exerat.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation TelegramRAT.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation rat.exe -
Executes dropped EXE 1 IoCs
Processes:
rat.exepid Process 3352 rat.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 2948 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 4000 schtasks.exe 5064 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
rat.exepid Process 3352 rat.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rat.exepid Process 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
TelegramRAT.exetasklist.exerat.exedescription pid Process Token: SeDebugPrivilege 1740 TelegramRAT.exe Token: SeDebugPrivilege 5088 tasklist.exe Token: SeDebugPrivilege 3352 rat.exe Token: SeDebugPrivilege 3352 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rat.exepid Process 3352 rat.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
TelegramRAT.execmd.exerat.exedescription pid Process procid_target PID 1740 wrote to memory of 4000 1740 TelegramRAT.exe 89 PID 1740 wrote to memory of 4000 1740 TelegramRAT.exe 89 PID 1740 wrote to memory of 3220 1740 TelegramRAT.exe 91 PID 1740 wrote to memory of 3220 1740 TelegramRAT.exe 91 PID 3220 wrote to memory of 5088 3220 cmd.exe 94 PID 3220 wrote to memory of 5088 3220 cmd.exe 94 PID 3220 wrote to memory of 3960 3220 cmd.exe 95 PID 3220 wrote to memory of 3960 3220 cmd.exe 95 PID 3220 wrote to memory of 2948 3220 cmd.exe 96 PID 3220 wrote to memory of 2948 3220 cmd.exe 96 PID 3220 wrote to memory of 3352 3220 cmd.exe 99 PID 3220 wrote to memory of 3352 3220 cmd.exe 99 PID 3352 wrote to memory of 5064 3352 rat.exe 103 PID 3352 wrote to memory of 5064 3352 rat.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4000
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp665B.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp665B.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1740"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:3960
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2948
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:5064
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188B
MD5961f2d855bddbd7376c6b0d03c5416d2
SHA1bf1eafd836ec8d0e18d0d50eaeb91a5093f8d852
SHA256b3dbf5e2b951f3a5d2a4dca2a0495c9468b11263f95e4feb33140c5861e89e1a
SHA51243900b912993082d4414735162df246f0f7c70431fef6c244ac92ed11f3965afa21d440f217bfd81f563ee6f3a84e1d7a78f096f8a784c3a1115c4046aa379fc
-
Filesize
111KB
MD53cdefec5518d17dd30d6ae5d2b10a7aa
SHA1d930c4be3e11056a01d88fc204ede07292b70a38
SHA2561ee0f288b931c649d0442590346cb778a3706d74322c24e1714cf124e9f23b68
SHA5121f12b82dba779a72be66d513ce72518f79bc97282211685bc9b42f0f1a8c2dd756cb372c44c917b11afcc6a71d581a6747f3acd5d6b54743f6b7b689a8c32f69