Overview
overview
10Static
static
10Data/Modul...io.dll
windows7-x64
1Data/Modul...io.dll
windows10-2004-x64
1Data/Modul...pi.dll
windows7-x64
1Data/Modul...pi.dll
windows10-2004-x64
1Data/Modules/Jint.dll
windows7-x64
1Data/Modules/Jint.dll
windows10-2004-x64
1Data/Modul...et.dll
windows7-x64
1Data/Modul...et.dll
windows10-2004-x64
1Data/Modul...on.dll
windows7-x64
1Data/Modul...on.dll
windows10-2004-x64
1Data/Modul...um.dll
windows7-x64
1Data/Modul...um.dll
windows10-2004-x64
1Data/Modul...he.exe
windows7-x64
1Data/Modul...he.exe
windows10-2004-x64
1Data/Modul...e1.exe
windows7-x64
10Data/Modul...e1.exe
windows10-2004-x64
10Jint.dll
windows7-x64
1Jint.dll
windows10-2004-x64
1Start Checker.bat
windows7-x64
10Start Checker.bat
windows10-2004-x64
10Analysis
-
max time kernel
20s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 16:47
Behavioral task
behavioral1
Sample
Data/Modules/AudioSwitcher.AudioApi.CoreAudio.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Data/Modules/AudioSwitcher.AudioApi.CoreAudio.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Data/Modules/AudioSwitcher.AudioApi.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Data/Modules/AudioSwitcher.AudioApi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Data/Modules/Jint.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Data/Modules/Jint.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Data/Modules/Leaf.xNet.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Data/Modules/Leaf.xNet.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Data/Modules/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Data/Modules/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Data/Modules/Sodium.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Data/Modules/Sodium.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Data/Modules/porsche.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Data/Modules/porsche.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Data/Modules/porsche1.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Data/Modules/porsche1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Jint.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
Jint.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Start Checker.bat
Resource
win7-20241010-en
General
-
Target
Start Checker.bat
-
Size
63B
-
MD5
7cd830db1b8da52c0062cc6f260a9685
-
SHA1
ed401d18b0095fc94e4809b7d1ff433dd05697f4
-
SHA256
d3347618ea5777b3d58e2005afbebe1e9d484405919333f41bc0ddb189261758
-
SHA512
c735b66dc15a37221b65e9350115db78ee55cb3ef11f401bc9f744be2b1283a16937d62ca8344c071febd6ddd4ccf924b001bbb79a5d03519bf49328264ae097
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot8144564059:AAGZGbvRRUEPFcw0XVG2BW_EHAzXGMZHSwk/sendMessage?chat_id=5059028006
Signatures
-
Contains code to disable Windows Defender 3 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral19/memory/2984-1-0x0000000001220000-0x0000000001248000-memory.dmp disable_win_def behavioral19/files/0x0031000000018bbf-12.dat disable_win_def behavioral19/memory/2068-14-0x00000000012C0000-0x00000000012E8000-memory.dmp disable_win_def -
Toxiceye family
-
Executes dropped EXE 1 IoCs
pid Process 2068 rat.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2824 tasklist.exe 2172 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 2 IoCs
pid Process 2404 timeout.exe 1692 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2672 schtasks.exe 316 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2068 rat.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2068 rat.exe 2068 rat.exe 2068 rat.exe 2068 rat.exe 2068 rat.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2984 porsche1.exe Token: SeDebugPrivilege 2824 tasklist.exe Token: SeDebugPrivilege 2172 tasklist.exe Token: SeDebugPrivilege 2068 rat.exe Token: SeDebugPrivilege 2068 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2068 rat.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2876 2448 cmd.exe 31 PID 2448 wrote to memory of 2876 2448 cmd.exe 31 PID 2448 wrote to memory of 2876 2448 cmd.exe 31 PID 2448 wrote to memory of 2984 2448 cmd.exe 33 PID 2448 wrote to memory of 2984 2448 cmd.exe 33 PID 2448 wrote to memory of 2984 2448 cmd.exe 33 PID 2984 wrote to memory of 2672 2984 porsche1.exe 36 PID 2984 wrote to memory of 2672 2984 porsche1.exe 36 PID 2984 wrote to memory of 2672 2984 porsche1.exe 36 PID 2984 wrote to memory of 2752 2984 porsche1.exe 38 PID 2984 wrote to memory of 2752 2984 porsche1.exe 38 PID 2984 wrote to memory of 2752 2984 porsche1.exe 38 PID 2752 wrote to memory of 2824 2752 cmd.exe 40 PID 2752 wrote to memory of 2824 2752 cmd.exe 40 PID 2752 wrote to memory of 2824 2752 cmd.exe 40 PID 2752 wrote to memory of 2620 2752 cmd.exe 41 PID 2752 wrote to memory of 2620 2752 cmd.exe 41 PID 2752 wrote to memory of 2620 2752 cmd.exe 41 PID 2752 wrote to memory of 2404 2752 cmd.exe 42 PID 2752 wrote to memory of 2404 2752 cmd.exe 42 PID 2752 wrote to memory of 2404 2752 cmd.exe 42 PID 2752 wrote to memory of 2172 2752 cmd.exe 43 PID 2752 wrote to memory of 2172 2752 cmd.exe 43 PID 2752 wrote to memory of 2172 2752 cmd.exe 43 PID 2752 wrote to memory of 868 2752 cmd.exe 44 PID 2752 wrote to memory of 868 2752 cmd.exe 44 PID 2752 wrote to memory of 868 2752 cmd.exe 44 PID 2752 wrote to memory of 1692 2752 cmd.exe 45 PID 2752 wrote to memory of 1692 2752 cmd.exe 45 PID 2752 wrote to memory of 1692 2752 cmd.exe 45 PID 2752 wrote to memory of 2068 2752 cmd.exe 46 PID 2752 wrote to memory of 2068 2752 cmd.exe 46 PID 2752 wrote to memory of 2068 2752 cmd.exe 46 PID 2068 wrote to memory of 316 2068 rat.exe 48 PID 2068 wrote to memory of 316 2068 rat.exe 48 PID 2068 wrote to memory of 316 2068 rat.exe 48 PID 2068 wrote to memory of 1980 2068 rat.exe 50 PID 2068 wrote to memory of 1980 2068 rat.exe 50 PID 2068 wrote to memory of 1980 2068 rat.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Start Checker.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\Data\Modules\porsche.exeData\Modules\porsche.exe2⤵PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\Data\Modules\porsche1.exeData\Modules\porsche1.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\CyberEye\rat.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2672
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpFC3A.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpFC3A.tmp.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2984"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\system32\find.exefind ":"4⤵PID:2620
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak4⤵
- Delays execution with timeout.exe
PID:2404
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2984"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
C:\Windows\system32\find.exefind ":"4⤵PID:868
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak4⤵
- Delays execution with timeout.exe
PID:1692
-
-
C:\Users\CyberEye\rat.exe"rat.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\CyberEye\rat.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:316
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2068 -s 17405⤵PID:1980
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185B
MD523510fcae885fefc7c048c1458d43464
SHA1cd807cc3ffb625d6a68053a91bf9e0fd6b8dd189
SHA256ce80977177f52420b14d8fbb36b76079f88ed8aa17fa4e6b7557890de1b556b5
SHA5126368c4abd7e7b65a120a1e301de8076ddd99fafd3336e08b661687f15b442dbe86a918a315a268c6e7519c498a0240ed92384aeb868aa8325f3d2f1de667af7b
-
Filesize
137KB
MD5a5c1ee36b5adf088e4938ff2c350291f
SHA1da217a5def61fc33710ee60659f59937cbcc1fb4
SHA2569b4cf6cdae00466be75f8da110fd512f58e54dc2b939fb92c44eb2cbdb82b639
SHA5122e7d647dd29db3ec126ef18e1e24e87e7482264376722754676af2d0c53e2a7bd1bc7d8b6c62526882b6ac0c0f498e247fa2de7d594c922e745966d5b6c2878e