Analysis
-
max time kernel
13s -
max time network
10s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 13:01
Behavioral task
behavioral1
Sample
ChromeUpdate.exe
Resource
win7-20240903-en
General
-
Target
ChromeUpdate.exe
-
Size
119KB
-
MD5
a39f21db0576a82177ee4c806766d763
-
SHA1
ee4676f4dedd24003ce1bd972cbce95ef51fa07f
-
SHA256
825509eb0672d6114194c773b017d5d41d9e67be4fe41f753f9c6bb37b1c32db
-
SHA512
ea07e5d6f2b8ae0fbf8c1931d844bfbff920b3c9f83d10d38bd76828ed2d8a4b849251a87f5e2ad6bb1e9d9b1e5a75520baf2b70e063f44595e058c433be1133
-
SSDEEP
3072:IAWfRzlXCwwFwOwWAmm+G/bxqH8QWqzCrAZuuyn1:IAD1SWHe/bgRY
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7742822790:AAHkizf3bilCkIqp8NNVcbWObKSVKo8Xifo/sendMessage?chat_id=7053620590
Signatures
-
Toxiceye family
-
Deletes itself 1 IoCs
pid Process 2716 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2068 rat.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2580 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2652 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2828 schtasks.exe 2944 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2068 rat.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2068 rat.exe 2068 rat.exe 2068 rat.exe 2068 rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2280 ChromeUpdate.exe Token: SeDebugPrivilege 2580 tasklist.exe Token: SeDebugPrivilege 2068 rat.exe Token: SeDebugPrivilege 2068 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2068 rat.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2828 2280 ChromeUpdate.exe 33 PID 2280 wrote to memory of 2828 2280 ChromeUpdate.exe 33 PID 2280 wrote to memory of 2828 2280 ChromeUpdate.exe 33 PID 2280 wrote to memory of 2716 2280 ChromeUpdate.exe 35 PID 2280 wrote to memory of 2716 2280 ChromeUpdate.exe 35 PID 2280 wrote to memory of 2716 2280 ChromeUpdate.exe 35 PID 2716 wrote to memory of 2580 2716 cmd.exe 37 PID 2716 wrote to memory of 2580 2716 cmd.exe 37 PID 2716 wrote to memory of 2580 2716 cmd.exe 37 PID 2716 wrote to memory of 2588 2716 cmd.exe 38 PID 2716 wrote to memory of 2588 2716 cmd.exe 38 PID 2716 wrote to memory of 2588 2716 cmd.exe 38 PID 2716 wrote to memory of 2652 2716 cmd.exe 39 PID 2716 wrote to memory of 2652 2716 cmd.exe 39 PID 2716 wrote to memory of 2652 2716 cmd.exe 39 PID 2716 wrote to memory of 2068 2716 cmd.exe 40 PID 2716 wrote to memory of 2068 2716 cmd.exe 40 PID 2716 wrote to memory of 2068 2716 cmd.exe 40 PID 2068 wrote to memory of 2944 2068 rat.exe 42 PID 2068 wrote to memory of 2944 2068 rat.exe 42 PID 2068 wrote to memory of 2944 2068 rat.exe 42 PID 2068 wrote to memory of 1500 2068 rat.exe 44 PID 2068 wrote to memory of 1500 2068 rat.exe 44 PID 2068 wrote to memory of 1500 2068 rat.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ChromeUpdate.exe"C:\Users\Admin\AppData\Local\Temp\ChromeUpdate.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2828
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpF48C.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpF48C.tmp.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2280"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2588
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2652
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2944
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2068 -s 16884⤵PID:1500
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189B
MD5b3bec4f192e5ced7e12ef3169fcaf3e9
SHA1286735639326fcf7adf511d267fd2b058a687afc
SHA256a92ed8fb6de57080b09155c515935340bdfbc5c821425c9bf078b72291148d08
SHA512575899172677bd50b25030b7aaa59eb17397ab370397992492af7ae1a42438f70cd36729f08991ea3309a0a8b32ee163641943ba28a3ce2816994e6a1e2001c8
-
Filesize
119KB
MD5a39f21db0576a82177ee4c806766d763
SHA1ee4676f4dedd24003ce1bd972cbce95ef51fa07f
SHA256825509eb0672d6114194c773b017d5d41d9e67be4fe41f753f9c6bb37b1c32db
SHA512ea07e5d6f2b8ae0fbf8c1931d844bfbff920b3c9f83d10d38bd76828ed2d8a4b849251a87f5e2ad6bb1e9d9b1e5a75520baf2b70e063f44595e058c433be1133