Analysis
-
max time kernel
7s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 21:53
Static task
static1
Behavioral task
behavioral1
Sample
Release.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
Release.exe
-
Size
597KB
-
MD5
606053f855e7969e596bfce116360cd4
-
SHA1
78c4bf47fa78eca3a89d1061d21275836902d5c6
-
SHA256
2d7d41e9ed34a165cd45ef6e9700c5d70d43cd3e9a2686389cd667bd5d2a30ef
-
SHA512
85e40a1b11db1ef340e5c794315046e8db047963228f1780bc47356a8ff52e4c1beb72acbdd83709aca898ef7194f224d1b13e6bcca4efb28ec61d1df1d057f5
-
SSDEEP
12288:yyveQB/fTHIGaPkKEYzURNAwbAgOT+t1R2RxoC/aHK09Tp:yuDXTIGaPhEYzUzA0bsWjT
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7370990677:AAFRG5SGghnaK_mDZqGyrOAkScygRIFkkzQ/sendMessage?chat_id=7315171848
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/files/0x00090000000234aa-14.dat disable_win_def behavioral1/memory/3084-24-0x0000015B085B0000-0x0000015B085D8000-memory.dmp disable_win_def -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Release.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation TelegramRAT.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation rat.exe -
Executes dropped EXE 2 IoCs
pid Process 3084 TelegramRAT.exe 4920 rat.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2160 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1216 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3228 schtasks.exe 4556 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4920 rat.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4920 rat.exe 4920 rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3084 TelegramRAT.exe Token: SeDebugPrivilege 2160 tasklist.exe Token: SeDebugPrivilege 4920 rat.exe Token: SeDebugPrivilege 4920 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4920 rat.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1852 wrote to memory of 3084 1852 Release.exe 82 PID 1852 wrote to memory of 3084 1852 Release.exe 82 PID 3084 wrote to memory of 3228 3084 TelegramRAT.exe 86 PID 3084 wrote to memory of 3228 3084 TelegramRAT.exe 86 PID 3084 wrote to memory of 772 3084 TelegramRAT.exe 88 PID 3084 wrote to memory of 772 3084 TelegramRAT.exe 88 PID 772 wrote to memory of 2160 772 cmd.exe 90 PID 772 wrote to memory of 2160 772 cmd.exe 90 PID 772 wrote to memory of 3280 772 cmd.exe 91 PID 772 wrote to memory of 3280 772 cmd.exe 91 PID 772 wrote to memory of 1216 772 cmd.exe 92 PID 772 wrote to memory of 1216 772 cmd.exe 92 PID 772 wrote to memory of 4920 772 cmd.exe 93 PID 772 wrote to memory of 4920 772 cmd.exe 93 PID 4920 wrote to memory of 4556 4920 rat.exe 95 PID 4920 wrote to memory of 4556 4920 rat.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Release.exe"C:\Users\Admin\AppData\Local\Temp\Release.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\CyberEye\rat.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3228
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpBD26.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpBD26.tmp.bat3⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 3084"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
-
C:\Windows\system32\find.exefind ":"4⤵PID:3280
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak4⤵
- Delays execution with timeout.exe
PID:1216
-
-
C:\Users\CyberEye\rat.exe"rat.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\CyberEye\rat.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:4556
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58aadaaa1bd0395908abe7632ae27b08c
SHA171b37ca8b03ec620647141ec91f2f1eb4042450f
SHA2568d11819be351083a53b4e50a722c4bb81e19ac0a4ac69409102d50e79094d336
SHA512170acad3a55677ead5e7e471c1b648d26925d77457e1e821879c8ab7efb9a8773b50192099e0993c6174f4b044421865021f3ce98386f13c23732373a38f55ef
-
Filesize
161B
MD5c16b0746faa39818049fe38709a82c62
SHA13fa322fe6ed724b1bc4fd52795428a36b7b8c131
SHA256d61bde901e7189cc97d45a1d4c4aa39d4c4de2b68419773ec774338506d659ad
SHA512cbcba899a067f8dc32cfcbd1779a6982d25955de91e1e02cee8eaf684a01b0dee3642c2a954903720ff6086de5a082147209868c03665c89f814c6219be2df7c
-
Filesize
188B
MD5b1cc876889564b4d90b83663bc2350b7
SHA1a7032b1aea52e1c67d56f5450dbd91a2ef744a49
SHA25667540d57d6b943c4f152036ca8aff68616a079aa49f63272d48e35eab6e0e0ee
SHA51205b3982fcfc60f816502cebe02f15034d5ffc12278b46f6ccbdca95418663d00e0338240b65b3da252c2813e561af80af44640d1c5575b50384567992331ef1b