Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2025, 12:23
Behavioral task
behavioral1
Sample
TelegramRAT.exe
Resource
win7-20240903-en
General
-
Target
TelegramRAT.exe
-
Size
119KB
-
MD5
47436ad8508cbdbede6535db163766bc
-
SHA1
c6c6f8eb7dac9f294da1547e30c320a7d316bf52
-
SHA256
43eca90ecc5958fd358a9240f31b1811ad2d01c6db10397cfd88e445ff8be5e0
-
SHA512
255a5618cf57a4930e08e02628bef7533289e2968fcf0d1db617447f7c04245978fc9d83c29247ffd9478a5428a3491a28458bcb2eb05efb0a4566ad43bf5a9c
-
SSDEEP
3072:gAWfRzlXCwwFwOwWAmm+G/bxqH8QW8zCrAZu/tM1:gAD1SWHe/bg/p
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7919388970:AAGC7fUBzVyMANzjN6bhRPjR0LNTw4C5Zlo/sendMessage?chat_id=8130842755
Signatures
-
Toxiceye family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation TelegramRAT.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation rat.exe -
Executes dropped EXE 1 IoCs
pid Process 4168 rat.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4456 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1156 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4584 schtasks.exe 5000 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4168 rat.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe 4168 rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2588 TelegramRAT.exe Token: SeDebugPrivilege 4456 tasklist.exe Token: SeDebugPrivilege 4168 rat.exe Token: SeDebugPrivilege 4168 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4168 rat.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2588 wrote to memory of 4584 2588 TelegramRAT.exe 85 PID 2588 wrote to memory of 4584 2588 TelegramRAT.exe 85 PID 2588 wrote to memory of 4984 2588 TelegramRAT.exe 87 PID 2588 wrote to memory of 4984 2588 TelegramRAT.exe 87 PID 4984 wrote to memory of 4456 4984 cmd.exe 89 PID 4984 wrote to memory of 4456 4984 cmd.exe 89 PID 4984 wrote to memory of 3476 4984 cmd.exe 90 PID 4984 wrote to memory of 3476 4984 cmd.exe 90 PID 4984 wrote to memory of 1156 4984 cmd.exe 91 PID 4984 wrote to memory of 1156 4984 cmd.exe 91 PID 4984 wrote to memory of 4168 4984 cmd.exe 93 PID 4984 wrote to memory of 4168 4984 cmd.exe 93 PID 4168 wrote to memory of 5000 4168 rat.exe 95 PID 4168 wrote to memory of 5000 4168 rat.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4584
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp7C06.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp7C06.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2588"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:3476
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:1156
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:5000
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188B
MD5874d1dda2fe07502c68e09a14c03baea
SHA18e18adcc07bbade0a711e2b9fcf9c31ca3527e18
SHA2565dc88f20b7eb2eee37c3e7bbe2a18124d6abfb260fac49c6bf1cbf9c39b7aecb
SHA51292ea39433a4ed8296ea0d5d502cc097b1914c338516860200bc02a09d77ad2e95e2cbc335c8539b114107d214c05da995e5597fc813bc4c694e81df51aa24d92
-
Filesize
119KB
MD547436ad8508cbdbede6535db163766bc
SHA1c6c6f8eb7dac9f294da1547e30c320a7d316bf52
SHA25643eca90ecc5958fd358a9240f31b1811ad2d01c6db10397cfd88e445ff8be5e0
SHA512255a5618cf57a4930e08e02628bef7533289e2968fcf0d1db617447f7c04245978fc9d83c29247ffd9478a5428a3491a28458bcb2eb05efb0a4566ad43bf5a9c