Analysis
-
max time kernel
7s -
max time network
11s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 13:46
Behavioral task
behavioral1
Sample
0C1CU_TelegramRAT.exe
Resource
win7-20240903-en
General
-
Target
0C1CU_TelegramRAT.exe
-
Size
119KB
-
MD5
57ec698eadd8a43268b10ee599c5e2b3
-
SHA1
6bcc4f0da802feb01914faf33eb2c32aafdbf707
-
SHA256
31312ebd622e3183979c4881b32bf5a9cb33c45b9216cac1dd33af4d12da77be
-
SHA512
b19a4a45003592c9b3b4fdc1ee65461f459f8e41c759571ae0b3925be716b353620a9f1e1fe59fc49901a28aead8d5ed56bac4d5ff1fa123b29046f3a44cd8a6
-
SSDEEP
3072:+nKxltkwILOo2qmm+G/bxqHhQWqzCrAZuu7Y:Zti2xe/bge
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7742822790:AAHkizf3bilCkIqp8NNVcbWObKSVKo8Xifo/sendMessage?chat_id=7053620590
Signatures
-
Toxiceye family
-
Deletes itself 1 IoCs
pid Process 2576 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2572 Tel.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2724 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2564 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2756 schtasks.exe 2620 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2572 Tel.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2572 Tel.exe 2572 Tel.exe 2572 Tel.exe 2572 Tel.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2648 0C1CU_TelegramRAT.exe Token: SeDebugPrivilege 2724 tasklist.exe Token: SeDebugPrivilege 2572 Tel.exe Token: SeDebugPrivilege 2572 Tel.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2572 Tel.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2756 2648 0C1CU_TelegramRAT.exe 32 PID 2648 wrote to memory of 2756 2648 0C1CU_TelegramRAT.exe 32 PID 2648 wrote to memory of 2756 2648 0C1CU_TelegramRAT.exe 32 PID 2648 wrote to memory of 2576 2648 0C1CU_TelegramRAT.exe 34 PID 2648 wrote to memory of 2576 2648 0C1CU_TelegramRAT.exe 34 PID 2648 wrote to memory of 2576 2648 0C1CU_TelegramRAT.exe 34 PID 2576 wrote to memory of 2724 2576 cmd.exe 36 PID 2576 wrote to memory of 2724 2576 cmd.exe 36 PID 2576 wrote to memory of 2724 2576 cmd.exe 36 PID 2576 wrote to memory of 2668 2576 cmd.exe 37 PID 2576 wrote to memory of 2668 2576 cmd.exe 37 PID 2576 wrote to memory of 2668 2576 cmd.exe 37 PID 2576 wrote to memory of 2564 2576 cmd.exe 38 PID 2576 wrote to memory of 2564 2576 cmd.exe 38 PID 2576 wrote to memory of 2564 2576 cmd.exe 38 PID 2576 wrote to memory of 2572 2576 cmd.exe 39 PID 2576 wrote to memory of 2572 2576 cmd.exe 39 PID 2576 wrote to memory of 2572 2576 cmd.exe 39 PID 2572 wrote to memory of 2620 2572 Tel.exe 41 PID 2572 wrote to memory of 2620 2572 Tel.exe 41 PID 2572 wrote to memory of 2620 2572 Tel.exe 41 PID 2572 wrote to memory of 1636 2572 Tel.exe 43 PID 2572 wrote to memory of 1636 2572 Tel.exe 43 PID 2572 wrote to memory of 1636 2572 Tel.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0C1CU_TelegramRAT.exe"C:\Users\Admin\AppData\Local\Temp\0C1CU_TelegramRAT.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Tel\Tel.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2756
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpF7D6.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpF7D6.tmp.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2648"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2668
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2564
-
-
C:\Users\Tel\Tel.exe"Tel.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Tel\Tel.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2620
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2572 -s 17044⤵PID:1636
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189B
MD584196c68b916290a782d3800b4f8e90f
SHA13b57d41438311bad4f0c1e5349f3d839978f088b
SHA2566a36047ae13ce88cf2454233d8fd3f15d846e38776b8d0e5ed6fb7cbb6a13ff3
SHA512302c705e8519a3835a28b341deb5d5d20931c431d5c67184b42153aa5313904cee1fd2dc007c93c1be2a0af371dacdd5e66884557ffcb9cd13f669bd3b076be7
-
Filesize
119KB
MD557ec698eadd8a43268b10ee599c5e2b3
SHA16bcc4f0da802feb01914faf33eb2c32aafdbf707
SHA25631312ebd622e3183979c4881b32bf5a9cb33c45b9216cac1dd33af4d12da77be
SHA512b19a4a45003592c9b3b4fdc1ee65461f459f8e41c759571ae0b3925be716b353620a9f1e1fe59fc49901a28aead8d5ed56bac4d5ff1fa123b29046f3a44cd8a6