Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
05/01/2025, 12:27
General
-
Target
TelegramRAT.exe
-
Size
119KB
-
MD5
47436ad8508cbdbede6535db163766bc
-
SHA1
c6c6f8eb7dac9f294da1547e30c320a7d316bf52
-
SHA256
43eca90ecc5958fd358a9240f31b1811ad2d01c6db10397cfd88e445ff8be5e0
-
SHA512
255a5618cf57a4930e08e02628bef7533289e2968fcf0d1db617447f7c04245978fc9d83c29247ffd9478a5428a3491a28458bcb2eb05efb0a4566ad43bf5a9c
-
SSDEEP
3072:gAWfRzlXCwwFwOwWAmm+G/bxqH8QW8zCrAZu/tM1:gAD1SWHe/bg/p
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7919388970:AAGC7fUBzVyMANzjN6bhRPjR0LNTw4C5Zlo/sendMessage?chat_id=8130842755
Extracted
gurcu
https://api.telegram.org/bot7919388970:AAGC7fUBzVyMANzjN6bhRPjR0LNTw4C5Zlo/sendMessage?chat_id=8130842755
https://api.telegram.org/bot7919388970:AAGC7fUBzVyMANzjN6bhRPjR0LNTw4C5Zlo/getUpdate
https://api.telegram.org/bot7919388970:AAGC7fUBzVyMANzjN6bhRPjR0LNTw4C5Zlo/getUpdates?offset=
https://api.telegram.org/bot7919388970:AAGC7fUBzVyMANzjN6bhRPjR0LNTw4C5Zlo/getUpdates?offset=1
https://api.telegram.org/bot7919388970:AAGC7fUBzVyMANzjN6bhRPjR0LNTw4C5Zlo/getUpdates?offset=2
https://api.telegram.org/bot7919388970:AAGC7fUBzVyMANzjN6bhRPjR0LNTw4C5Zlo/getUpdates?offset=99022218
https://api.telegram.org/bot7919388970:AAGC7fUBzVyMANzjN6bhRPjR0LNTw4C5Zlo/getUpdates?offset=99022219
https://api.telegram.org/bot7919388970:AAGC7fUBzVyMANzjN6bhRPjR0LNTw4C5Zlo/getUpdates?offset=99022220
https://api.telegram.org/bot7919388970:AAGC7fUBzVyMANzjN6bhRPjR0LNTw4C5Zlo/getUpdates?offset=99022221
https://api.telegram.org/bot7919388970:AAGC7fUBzVyMANzjN6bhRPjR0LNTw4C5Zlo/getUpdates?offset=99022222
https://api.telegram.org/bot7919388970:AAGC7fUBzVyMANzjN6bhRPjR0LNTw4C5Zlo/getUpdates?offset=99022223
Signatures
-
Gurcu family
-
Toxiceye family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-114766061-2901990051-2372745435-1000\Control Panel\International\Geo\Nation TelegramRAT.exe Key value queried \REGISTRY\USER\S-1-5-21-114766061-2901990051-2372745435-1000\Control Panel\International\Geo\Nation rat.exe -
Executes dropped EXE 1 IoCs
pid Process 1992 rat.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\taskschd.msc mmc.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3340 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4932 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3724 schtasks.exe 1196 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1992 rat.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 1992 rat.exe 1992 rat.exe 1992 rat.exe 752 taskmgr.exe 1992 rat.exe 752 taskmgr.exe 1992 rat.exe 752 taskmgr.exe 1992 rat.exe 1992 rat.exe 1992 rat.exe 1016 taskmgr.exe 1016 taskmgr.exe 1992 rat.exe 1992 rat.exe 1016 taskmgr.exe 1016 taskmgr.exe 1992 rat.exe 1016 taskmgr.exe 1992 rat.exe 1016 taskmgr.exe 1992 rat.exe 1992 rat.exe 1992 rat.exe 1992 rat.exe 1992 rat.exe 1992 rat.exe 1992 rat.exe 1992 rat.exe 1240 taskmgr.exe 1240 taskmgr.exe 1992 rat.exe 1992 rat.exe 1240 taskmgr.exe 1240 taskmgr.exe 1992 rat.exe 1240 taskmgr.exe 1240 taskmgr.exe 1992 rat.exe 1240 taskmgr.exe 1992 rat.exe 1240 taskmgr.exe 1992 rat.exe 1240 taskmgr.exe 1992 rat.exe 1240 taskmgr.exe 1992 rat.exe 1240 taskmgr.exe 1992 rat.exe 1240 taskmgr.exe 1992 rat.exe 1240 taskmgr.exe 1992 rat.exe 1240 taskmgr.exe 1992 rat.exe 1240 taskmgr.exe 1992 rat.exe 1240 taskmgr.exe 1992 rat.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1976 mmc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4916 TelegramRAT.exe Token: SeDebugPrivilege 3340 tasklist.exe Token: SeDebugPrivilege 752 taskmgr.exe Token: SeSystemProfilePrivilege 752 taskmgr.exe Token: SeCreateGlobalPrivilege 752 taskmgr.exe Token: SeDebugPrivilege 1992 rat.exe Token: SeDebugPrivilege 1992 rat.exe Token: 33 752 taskmgr.exe Token: SeIncBasePriorityPrivilege 752 taskmgr.exe Token: SeDebugPrivilege 1016 taskmgr.exe Token: SeSystemProfilePrivilege 1016 taskmgr.exe Token: SeCreateGlobalPrivilege 1016 taskmgr.exe Token: 33 1016 taskmgr.exe Token: SeIncBasePriorityPrivilege 1016 taskmgr.exe Token: SeDebugPrivilege 1240 taskmgr.exe Token: SeSystemProfilePrivilege 1240 taskmgr.exe Token: SeCreateGlobalPrivilege 1240 taskmgr.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 752 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe 1016 taskmgr.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1992 rat.exe 1976 mmc.exe 1976 mmc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4916 wrote to memory of 3724 4916 TelegramRAT.exe 86 PID 4916 wrote to memory of 3724 4916 TelegramRAT.exe 86 PID 4916 wrote to memory of 4100 4916 TelegramRAT.exe 88 PID 4916 wrote to memory of 4100 4916 TelegramRAT.exe 88 PID 4100 wrote to memory of 3340 4100 cmd.exe 90 PID 4100 wrote to memory of 3340 4100 cmd.exe 90 PID 4100 wrote to memory of 2752 4100 cmd.exe 91 PID 4100 wrote to memory of 2752 4100 cmd.exe 91 PID 4100 wrote to memory of 4932 4100 cmd.exe 92 PID 4100 wrote to memory of 4932 4100 cmd.exe 92 PID 4100 wrote to memory of 1992 4100 cmd.exe 97 PID 4100 wrote to memory of 1992 4100 cmd.exe 97 PID 1992 wrote to memory of 1196 1992 rat.exe 100 PID 1992 wrote to memory of 1196 1992 rat.exe 100 PID 1992 wrote to memory of 3216 1992 rat.exe 116 PID 1992 wrote to memory of 3216 1992 rat.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:3724
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp7530.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp7530.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 4916"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3340
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2752
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:4932
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:1196
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c <command>4⤵PID:3216
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:752
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1016
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {24AC8F2B-4D4A-4C17-9607-6A4B14068F97} -Embedding1⤵PID:656
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s1⤵
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
188B
MD5c9d5ded47f272ed3df68d06bfeee80d2
SHA15acc249da38cf4ade871eebdb92d8681f69a2851
SHA2564c75684cfc4fcb0cfe1621153196dabe8793cb5f014667ae98787282c7e19e22
SHA512eb1e9f6e4ff4643bc1c9c95fb63c5d5760606fd36ba117364ad60d8087cc7cbd3bab50f722dbd014a6000c0c11784af90ec0d1c04b587ba097144b84616a7095
-
Filesize
119KB
MD547436ad8508cbdbede6535db163766bc
SHA1c6c6f8eb7dac9f294da1547e30c320a7d316bf52
SHA25643eca90ecc5958fd358a9240f31b1811ad2d01c6db10397cfd88e445ff8be5e0
SHA512255a5618cf57a4930e08e02628bef7533289e2968fcf0d1db617447f7c04245978fc9d83c29247ffd9478a5428a3491a28458bcb2eb05efb0a4566ad43bf5a9c