Analysis
-
max time kernel
5s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 16:11
Behavioral task
behavioral1
Sample
.exe
Resource
win7-20240903-en
Errors
General
-
Target
.exe
-
Size
111KB
-
MD5
f190eabe265f87543a479e6ae30a75e3
-
SHA1
540a3361515ef8a07f0448d71ef1f5a9987bf8f0
-
SHA256
d00c33e6af3acfbc5653dadda59411bb4bf95a9f7a0fd1305e7cae270250dcb6
-
SHA512
792ea11c4ccdbaba481ad2102d7b95e3da730bba155d10fa20ece922df023d12a94cf65598b2866d85126df6dc8177520488e9c4c685fed14d23b66d3d7af95e
-
SSDEEP
3072:MbF/tHT+X4rWXFiWkkkQDDKbuq0tQW5zCrAZuu1B:s/tHT+X4UdkkkQDDKbLg
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7584205709:AAHSbORjgixKBL3e_gW4a2nQGHA1HBwJVqY/sendMessage?chat_id=5569740835
Signatures
-
Toxiceye family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation .exe -
Executes dropped EXE 1 IoCs
pid Process 1672 yanak.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2384 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3628 timeout.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1672 yanak.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1672 yanak.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3644 .exe Token: SeDebugPrivilege 2384 tasklist.exe Token: SeDebugPrivilege 1672 yanak.exe Token: SeDebugPrivilege 1672 yanak.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1672 yanak.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3644 wrote to memory of 3428 3644 .exe 83 PID 3644 wrote to memory of 3428 3644 .exe 83 PID 3428 wrote to memory of 2384 3428 cmd.exe 85 PID 3428 wrote to memory of 2384 3428 cmd.exe 85 PID 3428 wrote to memory of 3612 3428 cmd.exe 86 PID 3428 wrote to memory of 3612 3428 cmd.exe 86 PID 3428 wrote to memory of 3628 3428 cmd.exe 88 PID 3428 wrote to memory of 3628 3428 cmd.exe 88 PID 3428 wrote to memory of 1672 3428 cmd.exe 89 PID 3428 wrote to memory of 1672 3428 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\.exe"C:\Users\Admin\AppData\Local\Temp\.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp8220.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp8220.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 3644"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:3612
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:3628
-
-
C:\Users\yanak\yanak.exe"yanak.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1672
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176B
MD56ddf1db23fbba195517f30ff63159420
SHA1dcebd63d602bf0e26901d093b3b2a53a45804407
SHA256172a3ad7699f60f4f338e9d604e3e5faef15229500ea08ec45d2db6b008e07e7
SHA512c72eca656ffe397f9f9f8d0328393593f4ffae8d22c2ee08fc5d83e1505b1abac2319fa4ca91304657dbed57acb69adc97650de5cf1491040a65e3dab167aace
-
Filesize
111KB
MD5f190eabe265f87543a479e6ae30a75e3
SHA1540a3361515ef8a07f0448d71ef1f5a9987bf8f0
SHA256d00c33e6af3acfbc5653dadda59411bb4bf95a9f7a0fd1305e7cae270250dcb6
SHA512792ea11c4ccdbaba481ad2102d7b95e3da730bba155d10fa20ece922df023d12a94cf65598b2866d85126df6dc8177520488e9c4c685fed14d23b66d3d7af95e