Overview
overview
10Static
static
10Data/Modul...io.dll
windows7-x64
1Data/Modul...io.dll
windows10-2004-x64
1Data/Modul...pi.dll
windows7-x64
1Data/Modul...pi.dll
windows10-2004-x64
1Data/Modules/Jint.dll
windows7-x64
1Data/Modules/Jint.dll
windows10-2004-x64
1Data/Modul...et.dll
windows7-x64
1Data/Modul...et.dll
windows10-2004-x64
1Data/Modul...on.dll
windows7-x64
1Data/Modul...on.dll
windows10-2004-x64
1Data/Modul...um.dll
windows7-x64
1Data/Modul...um.dll
windows10-2004-x64
1Data/Modul...he.exe
windows7-x64
1Data/Modul...he.exe
windows10-2004-x64
1Data/Modul...e1.exe
windows7-x64
10Data/Modul...e1.exe
windows10-2004-x64
10Jint.dll
windows7-x64
1Jint.dll
windows10-2004-x64
1Start Checker.bat
windows7-x64
10Start Checker.bat
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 16:47
Behavioral task
behavioral1
Sample
Data/Modules/AudioSwitcher.AudioApi.CoreAudio.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Data/Modules/AudioSwitcher.AudioApi.CoreAudio.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Data/Modules/AudioSwitcher.AudioApi.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Data/Modules/AudioSwitcher.AudioApi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Data/Modules/Jint.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Data/Modules/Jint.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Data/Modules/Leaf.xNet.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Data/Modules/Leaf.xNet.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Data/Modules/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Data/Modules/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Data/Modules/Sodium.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Data/Modules/Sodium.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Data/Modules/porsche.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Data/Modules/porsche.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Data/Modules/porsche1.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Data/Modules/porsche1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Jint.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
Jint.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Start Checker.bat
Resource
win7-20241010-en
General
-
Target
Data/Modules/porsche1.exe
-
Size
137KB
-
MD5
a5c1ee36b5adf088e4938ff2c350291f
-
SHA1
da217a5def61fc33710ee60659f59937cbcc1fb4
-
SHA256
9b4cf6cdae00466be75f8da110fd512f58e54dc2b939fb92c44eb2cbdb82b639
-
SHA512
2e7d647dd29db3ec126ef18e1e24e87e7482264376722754676af2d0c53e2a7bd1bc7d8b6c62526882b6ac0c0f498e247fa2de7d594c922e745966d5b6c2878e
-
SSDEEP
3072:u3rx7Fa9S+ZUY0QABxTF27jskr+1vTmENGMbZLQ/QWoPCrAZuiG:um9S+ZtABxTgwRGMbFF
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot8144564059:AAGZGbvRRUEPFcw0XVG2BW_EHAzXGMZHSwk/sendMessage?chat_id=5059028006
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral16/memory/4296-1-0x0000020C8C250000-0x0000020C8C278000-memory.dmp disable_win_def behavioral16/files/0x000a000000023b91-9.dat disable_win_def -
Toxiceye family
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation porsche1.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation rat.exe -
Executes dropped EXE 1 IoCs
pid Process 1124 rat.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 49 raw.githubusercontent.com 50 raw.githubusercontent.com -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2820 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2532 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4836 schtasks.exe 1188 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1124 rat.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe 1124 rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4296 porsche1.exe Token: SeDebugPrivilege 2820 tasklist.exe Token: SeDebugPrivilege 1124 rat.exe Token: SeDebugPrivilege 1124 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1124 rat.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4296 wrote to memory of 4836 4296 porsche1.exe 87 PID 4296 wrote to memory of 4836 4296 porsche1.exe 87 PID 4296 wrote to memory of 5072 4296 porsche1.exe 89 PID 4296 wrote to memory of 5072 4296 porsche1.exe 89 PID 5072 wrote to memory of 2820 5072 cmd.exe 91 PID 5072 wrote to memory of 2820 5072 cmd.exe 91 PID 5072 wrote to memory of 3856 5072 cmd.exe 92 PID 5072 wrote to memory of 3856 5072 cmd.exe 92 PID 5072 wrote to memory of 2532 5072 cmd.exe 93 PID 5072 wrote to memory of 2532 5072 cmd.exe 93 PID 5072 wrote to memory of 1124 5072 cmd.exe 97 PID 5072 wrote to memory of 1124 5072 cmd.exe 97 PID 1124 wrote to memory of 1188 1124 rat.exe 99 PID 1124 wrote to memory of 1188 1124 rat.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Data\Modules\porsche1.exe"C:\Users\Admin\AppData\Local\Temp\Data\Modules\porsche1.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\CyberEye\rat.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4836
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp802C.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp802C.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 4296"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:3856
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2532
-
-
C:\Users\CyberEye\rat.exe"rat.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\CyberEye\rat.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:1188
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185B
MD54adbf8cc1755e008456d0903c2aa99c3
SHA1b225f5c48dab7f48c9de7690bca3d6f61b40de94
SHA256f6b7a454c4d1f87a3014b799f41b44eea5b00a8e30c421ed59bfc4228e8eedd7
SHA5123278fdc2f26f407c5cd27ecd955b055c8040711bcb4b6a86eba7296a9fa5bd1c00c9598e9dd5d82d7479f440ceaf5448eba078118cc275f61b2e74fdb685f2a1
-
Filesize
137KB
MD5a5c1ee36b5adf088e4938ff2c350291f
SHA1da217a5def61fc33710ee60659f59937cbcc1fb4
SHA2569b4cf6cdae00466be75f8da110fd512f58e54dc2b939fb92c44eb2cbdb82b639
SHA5122e7d647dd29db3ec126ef18e1e24e87e7482264376722754676af2d0c53e2a7bd1bc7d8b6c62526882b6ac0c0f498e247fa2de7d594c922e745966d5b6c2878e