Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
13s -
max time network
9s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/01/2025, 12:23
Behavioral task
behavioral1
Sample
TelegramRAT.exe
Resource
win7-20240903-en
General
-
Target
TelegramRAT.exe
-
Size
119KB
-
MD5
47436ad8508cbdbede6535db163766bc
-
SHA1
c6c6f8eb7dac9f294da1547e30c320a7d316bf52
-
SHA256
43eca90ecc5958fd358a9240f31b1811ad2d01c6db10397cfd88e445ff8be5e0
-
SHA512
255a5618cf57a4930e08e02628bef7533289e2968fcf0d1db617447f7c04245978fc9d83c29247ffd9478a5428a3491a28458bcb2eb05efb0a4566ad43bf5a9c
-
SSDEEP
3072:gAWfRzlXCwwFwOwWAmm+G/bxqH8QW8zCrAZu/tM1:gAD1SWHe/bg/p
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7919388970:AAGC7fUBzVyMANzjN6bhRPjR0LNTw4C5Zlo/sendMessage?chat_id=8130842755
Signatures
-
Toxiceye family
-
Deletes itself 1 IoCs
pid Process 2732 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1800 rat.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2680 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2540 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2672 schtasks.exe 2584 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1800 rat.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1800 rat.exe 1800 rat.exe 1800 rat.exe 1800 rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1840 TelegramRAT.exe Token: SeDebugPrivilege 2680 tasklist.exe Token: SeDebugPrivilege 1800 rat.exe Token: SeDebugPrivilege 1800 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1800 rat.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1840 wrote to memory of 2672 1840 TelegramRAT.exe 33 PID 1840 wrote to memory of 2672 1840 TelegramRAT.exe 33 PID 1840 wrote to memory of 2672 1840 TelegramRAT.exe 33 PID 1840 wrote to memory of 2732 1840 TelegramRAT.exe 35 PID 1840 wrote to memory of 2732 1840 TelegramRAT.exe 35 PID 1840 wrote to memory of 2732 1840 TelegramRAT.exe 35 PID 2732 wrote to memory of 2680 2732 cmd.exe 37 PID 2732 wrote to memory of 2680 2732 cmd.exe 37 PID 2732 wrote to memory of 2680 2732 cmd.exe 37 PID 2732 wrote to memory of 2640 2732 cmd.exe 38 PID 2732 wrote to memory of 2640 2732 cmd.exe 38 PID 2732 wrote to memory of 2640 2732 cmd.exe 38 PID 2732 wrote to memory of 2540 2732 cmd.exe 39 PID 2732 wrote to memory of 2540 2732 cmd.exe 39 PID 2732 wrote to memory of 2540 2732 cmd.exe 39 PID 2732 wrote to memory of 1800 2732 cmd.exe 40 PID 2732 wrote to memory of 1800 2732 cmd.exe 40 PID 2732 wrote to memory of 1800 2732 cmd.exe 40 PID 1800 wrote to memory of 2584 1800 rat.exe 42 PID 1800 wrote to memory of 2584 1800 rat.exe 42 PID 1800 wrote to memory of 2584 1800 rat.exe 42 PID 1800 wrote to memory of 1356 1800 rat.exe 44 PID 1800 wrote to memory of 1356 1800 rat.exe 44 PID 1800 wrote to memory of 1356 1800 rat.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2672
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpE936.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpE936.tmp.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1840"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2640
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2540
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2584
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1800 -s 16764⤵PID:1356
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188B
MD539a1f427f7b359e5d0c2e344317e8095
SHA1a33dbc30103184e1815eb6dd1261284ed7d15e78
SHA256783c5eabc28bf1509f6f313f7ead83f7a025e224117bd69142d097690bf223b1
SHA5124d5235b349504e26621fa129d88be902694dcc5e02823cfc21d06c901e70dfd01ce440b2c5ea26379da62e75e7729e57a67a7bcb2af75680048837d1f8b808d1
-
Filesize
119KB
MD547436ad8508cbdbede6535db163766bc
SHA1c6c6f8eb7dac9f294da1547e30c320a7d316bf52
SHA25643eca90ecc5958fd358a9240f31b1811ad2d01c6db10397cfd88e445ff8be5e0
SHA512255a5618cf57a4930e08e02628bef7533289e2968fcf0d1db617447f7c04245978fc9d83c29247ffd9478a5428a3491a28458bcb2eb05efb0a4566ad43bf5a9c