Analysis
-
max time kernel
11s -
max time network
9s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05/01/2025, 13:29
Behavioral task
behavioral1
Sample
TelegramRAT.exe
Resource
win7-20241010-en
General
-
Target
TelegramRAT.exe
-
Size
119KB
-
MD5
39961917429b1031a294302cc7a40b0e
-
SHA1
529b27132bbc146fbdcb1d1c8ad9207b5cd1c2d2
-
SHA256
aa85fb55d123c655e9e54517a21660085cc6518626d1a2e484f67d28c3f828a1
-
SHA512
754d6a5fd1382b34891fbd0bcc5e2108023eb52cad9996cc8a332f4fb6251a3ba508767b074de0481b0b9a2ac68fe0605d98934dbfd7eaba5cbbc5a940550a46
-
SSDEEP
3072:CIfRzlXCwwFwOwWAmm+m/bxqH8QWqzCrAZuudL:CN1SWH+/bgR
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7742822790:AAHkizf3bilCkIqp8NNVcbWObKSVKo8Xifo/sendMessage?chat_id=7053620590
Signatures
-
Toxiceye family
-
Deletes itself 1 IoCs
pid Process 1704 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 540 rat.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1012 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1728 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 936 schtasks.exe 380 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 540 rat.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 540 rat.exe 540 rat.exe 540 rat.exe 540 rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2192 TelegramRAT.exe Token: SeDebugPrivilege 1012 tasklist.exe Token: SeDebugPrivilege 540 rat.exe Token: SeDebugPrivilege 540 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 540 rat.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2192 wrote to memory of 936 2192 TelegramRAT.exe 32 PID 2192 wrote to memory of 936 2192 TelegramRAT.exe 32 PID 2192 wrote to memory of 936 2192 TelegramRAT.exe 32 PID 2192 wrote to memory of 1704 2192 TelegramRAT.exe 34 PID 2192 wrote to memory of 1704 2192 TelegramRAT.exe 34 PID 2192 wrote to memory of 1704 2192 TelegramRAT.exe 34 PID 1704 wrote to memory of 1012 1704 cmd.exe 36 PID 1704 wrote to memory of 1012 1704 cmd.exe 36 PID 1704 wrote to memory of 1012 1704 cmd.exe 36 PID 1704 wrote to memory of 2768 1704 cmd.exe 37 PID 1704 wrote to memory of 2768 1704 cmd.exe 37 PID 1704 wrote to memory of 2768 1704 cmd.exe 37 PID 1704 wrote to memory of 1728 1704 cmd.exe 38 PID 1704 wrote to memory of 1728 1704 cmd.exe 38 PID 1704 wrote to memory of 1728 1704 cmd.exe 38 PID 1704 wrote to memory of 540 1704 cmd.exe 39 PID 1704 wrote to memory of 540 1704 cmd.exe 39 PID 1704 wrote to memory of 540 1704 cmd.exe 39 PID 540 wrote to memory of 380 540 rat.exe 41 PID 540 wrote to memory of 380 540 rat.exe 41 PID 540 wrote to memory of 380 540 rat.exe 41 PID 540 wrote to memory of 2604 540 rat.exe 43 PID 540 wrote to memory of 2604 540 rat.exe 43 PID 540 wrote to memory of 2604 540 rat.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:936
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpD115.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpD115.tmp.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2192"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2768
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:1728
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:380
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 540 -s 16764⤵PID:2604
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188B
MD5ca216cf5e94234348b933e5c0d138808
SHA18a69ac87ddc069556239e283c39ae1200fd47aec
SHA256277fc74ea637dadaace29cd299420226635b35c7438141eeb9975db942552019
SHA5121ad6aa4c159bd1d8c16937018f3ee0e9a188e8e7b60dd2b1582cf0e8cfc19fb59936dc058f191251c542fc86625c5c73c6923d5047328a834bdef647e46aae31
-
Filesize
119KB
MD539961917429b1031a294302cc7a40b0e
SHA1529b27132bbc146fbdcb1d1c8ad9207b5cd1c2d2
SHA256aa85fb55d123c655e9e54517a21660085cc6518626d1a2e484f67d28c3f828a1
SHA512754d6a5fd1382b34891fbd0bcc5e2108023eb52cad9996cc8a332f4fb6251a3ba508767b074de0481b0b9a2ac68fe0605d98934dbfd7eaba5cbbc5a940550a46