Analysis
-
max time kernel
7s -
max time network
18s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 13:22
Behavioral task
behavioral1
Sample
ChromeUpdate.exe
Resource
win7-20241010-en
Errors
General
-
Target
ChromeUpdate.exe
-
Size
111KB
-
MD5
5dce69d8563e7d4a8f82e5be8b2f1a62
-
SHA1
1458edbb836f33749682b557ab8095afd3bcc0cf
-
SHA256
ad14b62650cdbe1118aa5a601682b4d8bea1a432db985fb3e96de1c9fc1e5e1c
-
SHA512
e3845e4ab3e0f6df8075850c0c8a4c97caaf71d1bdc969d82749f3a567818d854fb4bcce9f75693eb8cd8e0280334a7c2f0da81e6f5756ca8e1cff7e55ce474f
-
SSDEEP
1536:7+bQeCwEXM91qQIwiG39Wr1m8ndbhHqI6JQWqzCrAZuulvsp:Cb1ClXbG30ro8dbZqHJQWqzCrAZuu+p
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7742822790:AAHkizf3bilCkIqp8NNVcbWObKSVKo8Xifo/sendMessage?chat_id=7053620590
Signatures
-
Toxiceye family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation ChromeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Update.exe -
Executes dropped EXE 1 IoCs
pid Process 2796 Update.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3088 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1380 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4324 schtasks.exe 4496 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2796 Update.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2796 Update.exe 2796 Update.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3004 ChromeUpdate.exe Token: SeDebugPrivilege 3088 tasklist.exe Token: SeDebugPrivilege 2796 Update.exe Token: SeDebugPrivilege 2796 Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2796 Update.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3004 wrote to memory of 4496 3004 ChromeUpdate.exe 87 PID 3004 wrote to memory of 4496 3004 ChromeUpdate.exe 87 PID 3004 wrote to memory of 840 3004 ChromeUpdate.exe 89 PID 3004 wrote to memory of 840 3004 ChromeUpdate.exe 89 PID 840 wrote to memory of 3088 840 cmd.exe 91 PID 840 wrote to memory of 3088 840 cmd.exe 91 PID 840 wrote to memory of 1640 840 cmd.exe 92 PID 840 wrote to memory of 1640 840 cmd.exe 92 PID 840 wrote to memory of 1380 840 cmd.exe 93 PID 840 wrote to memory of 1380 840 cmd.exe 93 PID 840 wrote to memory of 2796 840 cmd.exe 94 PID 840 wrote to memory of 2796 840 cmd.exe 94 PID 2796 wrote to memory of 4324 2796 Update.exe 96 PID 2796 wrote to memory of 4324 2796 Update.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ChromeUpdate.exe"C:\Users\Admin\AppData\Local\Temp\ChromeUpdate.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Update\Update.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4496
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpB21A.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpB21A.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 3004"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3088
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:1640
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:1380
-
-
C:\Users\Update\Update.exe"Update.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Update\Update.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:4324
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190B
MD5cdd08e032d17ca7078df1bb0d568d4f8
SHA1eea526f8dfd80816781e3ca9c982798d8b9012f5
SHA25643349aa6e1acc66bcfc29925e61ca70c906d2357984018e2dec50cc09122e70f
SHA512298c670745c95de9d8c49d38e399111ef3ed90b830303cf4d8d5de0e0a9b1c0dd1eec5cbad3dd0a216e2b4f86bd113cf769ed148cd31f7a85116f73d6743b23e
-
Filesize
111KB
MD55dce69d8563e7d4a8f82e5be8b2f1a62
SHA11458edbb836f33749682b557ab8095afd3bcc0cf
SHA256ad14b62650cdbe1118aa5a601682b4d8bea1a432db985fb3e96de1c9fc1e5e1c
SHA512e3845e4ab3e0f6df8075850c0c8a4c97caaf71d1bdc969d82749f3a567818d854fb4bcce9f75693eb8cd8e0280334a7c2f0da81e6f5756ca8e1cff7e55ce474f