Analysis

  • max time kernel
    149s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-01-2025 13:05

General

  • Target

    Chrome Update.exe

  • Size

    111KB

  • MD5

    05112dda1331e95ffb3f49199f30e3c4

  • SHA1

    5719297583edf0d07cadf0f6e27a6476bde5249b

  • SHA256

    16424b4f2ad3135749aca508caa528264bd42a7fcdcfe44dc538198dd29aa75e

  • SHA512

    a39241b8c2c4176f550d0151c403f8b350eba31078bc697af015dd93a9cc94b12dcbbde74e357a8936bc93fea59a020c18081bfaef3419acbb3ef380c9b64ef0

  • SSDEEP

    3072:bbKsnwo0g30ro8NbZqH4QWqzCrAZuuBUp:ysnwo4rvbM1

Malware Config

Extracted

Family

toxiceye

C2

https://api.telegram.org/bot7742822790:AAHkizf3bilCkIqp8NNVcbWObKSVKo8Xifo/sendMessage?chat_id=7053620590

Signatures

  • ToxicEye

    ToxicEye is a trojan written in C#.

  • Toxiceye family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Chrome Update.exe
    "C:\Users\Admin\AppData\Local\Temp\Chrome Update.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:656
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2120
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpAA0B.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpAA0B.tmp.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:460
      • C:\Windows\system32\tasklist.exe
        Tasklist /fi "PID eq 656"
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:1644
      • C:\Windows\system32\find.exe
        find ":"
        3⤵
          PID:3696
        • C:\Windows\system32\timeout.exe
          Timeout /T 1 /Nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:3868
        • C:\Users\ToxicEye\rat.exe
          "rat.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:364
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2628
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4876
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2816

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmpAA0B.tmp.bat

        Filesize

        189B

        MD5

        56950fc9156134c32ccbd591daf0475a

        SHA1

        acf964ecba1f26438cfcb4444984bc3b210f89f1

        SHA256

        30c10a898c6ab12e7c0957caea8fafb37ab3e55e5c0a741f5416f6c8eb1ab8bb

        SHA512

        ae38ac73e25566807d946eba770b1bfe93957f46ba9b0bb64e3f48b46220946290e4675f83d6a877e98cd352e18584bdc0c556c23e78fd949b1d747ebb344d9e

      • C:\Users\ToxicEye\rat.exe

        Filesize

        111KB

        MD5

        05112dda1331e95ffb3f49199f30e3c4

        SHA1

        5719297583edf0d07cadf0f6e27a6476bde5249b

        SHA256

        16424b4f2ad3135749aca508caa528264bd42a7fcdcfe44dc538198dd29aa75e

        SHA512

        a39241b8c2c4176f550d0151c403f8b350eba31078bc697af015dd93a9cc94b12dcbbde74e357a8936bc93fea59a020c18081bfaef3419acbb3ef380c9b64ef0

      • memory/656-0-0x00007FFA484F3000-0x00007FFA484F5000-memory.dmp

        Filesize

        8KB

      • memory/656-1-0x0000012B4DEE0000-0x0000012B4DF02000-memory.dmp

        Filesize

        136KB

      • memory/656-2-0x00007FFA484F0000-0x00007FFA48FB1000-memory.dmp

        Filesize

        10.8MB

      • memory/656-19-0x00007FFA484F0000-0x00007FFA48FB1000-memory.dmp

        Filesize

        10.8MB

      • memory/4876-14-0x000001FB251C0000-0x000001FB251C1000-memory.dmp

        Filesize

        4KB

      • memory/4876-16-0x000001FB251C0000-0x000001FB251C1000-memory.dmp

        Filesize

        4KB

      • memory/4876-15-0x000001FB251C0000-0x000001FB251C1000-memory.dmp

        Filesize

        4KB

      • memory/4876-13-0x000001FB251C0000-0x000001FB251C1000-memory.dmp

        Filesize

        4KB

      • memory/4876-12-0x000001FB251C0000-0x000001FB251C1000-memory.dmp

        Filesize

        4KB

      • memory/4876-11-0x000001FB251C0000-0x000001FB251C1000-memory.dmp

        Filesize

        4KB

      • memory/4876-10-0x000001FB251C0000-0x000001FB251C1000-memory.dmp

        Filesize

        4KB

      • memory/4876-3-0x000001FB251C0000-0x000001FB251C1000-memory.dmp

        Filesize

        4KB

      • memory/4876-4-0x000001FB251C0000-0x000001FB251C1000-memory.dmp

        Filesize

        4KB

      • memory/4876-5-0x000001FB251C0000-0x000001FB251C1000-memory.dmp

        Filesize

        4KB