Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
6s -
max time network
7s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
05/01/2025, 13:15
Errors
General
-
Target
Chrome Update.exe
-
Size
111KB
-
MD5
5dce69d8563e7d4a8f82e5be8b2f1a62
-
SHA1
1458edbb836f33749682b557ab8095afd3bcc0cf
-
SHA256
ad14b62650cdbe1118aa5a601682b4d8bea1a432db985fb3e96de1c9fc1e5e1c
-
SHA512
e3845e4ab3e0f6df8075850c0c8a4c97caaf71d1bdc969d82749f3a567818d854fb4bcce9f75693eb8cd8e0280334a7c2f0da81e6f5756ca8e1cff7e55ce474f
-
SSDEEP
1536:7+bQeCwEXM91qQIwiG39Wr1m8ndbhHqI6JQWqzCrAZuulvsp:Cb1ClXbG30ro8dbZqHJQWqzCrAZuu+p
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7742822790:AAHkizf3bilCkIqp8NNVcbWObKSVKo8Xifo/sendMessage?chat_id=7053620590
Signatures
-
Toxiceye family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3829776853-2076861744-2973657197-1000\Control Panel\International\Geo\Nation Update.exe Key value queried \REGISTRY\USER\S-1-5-21-3829776853-2076861744-2973657197-1000\Control Panel\International\Geo\Nation Chrome Update.exe -
Executes dropped EXE 1 IoCs
pid Process 3204 Update.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1572 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4352 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1772 schtasks.exe 4640 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3204 Update.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3204 Update.exe 3204 Update.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3276 Chrome Update.exe Token: SeDebugPrivilege 1572 tasklist.exe Token: SeDebugPrivilege 3204 Update.exe Token: SeDebugPrivilege 3204 Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3204 Update.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3276 wrote to memory of 1772 3276 Chrome Update.exe 87 PID 3276 wrote to memory of 1772 3276 Chrome Update.exe 87 PID 3276 wrote to memory of 2080 3276 Chrome Update.exe 89 PID 3276 wrote to memory of 2080 3276 Chrome Update.exe 89 PID 2080 wrote to memory of 1572 2080 cmd.exe 91 PID 2080 wrote to memory of 1572 2080 cmd.exe 91 PID 2080 wrote to memory of 3596 2080 cmd.exe 92 PID 2080 wrote to memory of 3596 2080 cmd.exe 92 PID 2080 wrote to memory of 4352 2080 cmd.exe 93 PID 2080 wrote to memory of 4352 2080 cmd.exe 93 PID 2080 wrote to memory of 3204 2080 cmd.exe 94 PID 2080 wrote to memory of 3204 2080 cmd.exe 94 PID 3204 wrote to memory of 4640 3204 Update.exe 96 PID 3204 wrote to memory of 4640 3204 Update.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Chrome Update.exe"C:\Users\Admin\AppData\Local\Temp\Chrome Update.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Update\Update.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1772
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp6D31.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp6D31.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 3276"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:3596
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:4352
-
-
C:\Users\Update\Update.exe"Update.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Update\Update.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:4640
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
191B
MD5e2bb35f5e0708373d4c75e0ea7d99caa
SHA1955d720d40f86e7518acb3c23051d6da68ef7b10
SHA25669857dd7a4813d158fb2b34891468a928168b3b885b40725218720b994dc3333
SHA512761b0c2251d98acf6d05ac8672c04bebc84ad3a60f434eaa756d8888b4824070814cc1e2851d368965ba21ae63dca06eac11dd53665a611e94f198e3ec77b91e
-
Filesize
111KB
MD55dce69d8563e7d4a8f82e5be8b2f1a62
SHA11458edbb836f33749682b557ab8095afd3bcc0cf
SHA256ad14b62650cdbe1118aa5a601682b4d8bea1a432db985fb3e96de1c9fc1e5e1c
SHA512e3845e4ab3e0f6df8075850c0c8a4c97caaf71d1bdc969d82749f3a567818d854fb4bcce9f75693eb8cd8e0280334a7c2f0da81e6f5756ca8e1cff7e55ce474f