Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
7s -
max time network
7s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/01/2025, 13:40
Behavioral task
behavioral1
Sample
TelegramRAT.exe
Resource
win7-20240903-en
General
-
Target
TelegramRAT.exe
-
Size
119KB
-
MD5
6bb2ac8cb9f84678bdfba1a061d53421
-
SHA1
f5b8388a153d28b7d3434d16b07e557ca08e0132
-
SHA256
2a29eb506737661d820f87409e83732a8b4a4e66fae7af2cb9776f0c34428054
-
SHA512
2e18c23e4ba26fe318fb52187102863c5cc1e9f415a96578ea7ef68686f2061a78cd39488dbce5008c2d7e854baa8c46783388d81453b28bf65d580598e9a755
-
SSDEEP
3072:OOfRzlXCwwFwOwWAmm+G/bxqH8QWqzCrAZuuWN:Or1SWHe/bgR
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7742822790:AAHkizf3bilCkIqp8NNVcbWObKSVKo8Xifo/sendMessage?chat_id=7053620590
Signatures
-
Toxiceye family
-
Deletes itself 1 IoCs
pid Process 1936 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2776 rat.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2832 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1924 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2280 schtasks.exe 2840 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2776 rat.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2776 rat.exe 2776 rat.exe 2776 rat.exe 2776 rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2344 TelegramRAT.exe Token: SeDebugPrivilege 2832 tasklist.exe Token: SeDebugPrivilege 2776 rat.exe Token: SeDebugPrivilege 2776 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2776 rat.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2280 2344 TelegramRAT.exe 33 PID 2344 wrote to memory of 2280 2344 TelegramRAT.exe 33 PID 2344 wrote to memory of 2280 2344 TelegramRAT.exe 33 PID 2344 wrote to memory of 1936 2344 TelegramRAT.exe 35 PID 2344 wrote to memory of 1936 2344 TelegramRAT.exe 35 PID 2344 wrote to memory of 1936 2344 TelegramRAT.exe 35 PID 1936 wrote to memory of 2832 1936 cmd.exe 37 PID 1936 wrote to memory of 2832 1936 cmd.exe 37 PID 1936 wrote to memory of 2832 1936 cmd.exe 37 PID 1936 wrote to memory of 2844 1936 cmd.exe 38 PID 1936 wrote to memory of 2844 1936 cmd.exe 38 PID 1936 wrote to memory of 2844 1936 cmd.exe 38 PID 1936 wrote to memory of 1924 1936 cmd.exe 39 PID 1936 wrote to memory of 1924 1936 cmd.exe 39 PID 1936 wrote to memory of 1924 1936 cmd.exe 39 PID 1936 wrote to memory of 2776 1936 cmd.exe 40 PID 1936 wrote to memory of 2776 1936 cmd.exe 40 PID 1936 wrote to memory of 2776 1936 cmd.exe 40 PID 2776 wrote to memory of 2840 2776 rat.exe 42 PID 2776 wrote to memory of 2840 2776 rat.exe 42 PID 2776 wrote to memory of 2840 2776 rat.exe 42 PID 2776 wrote to memory of 2000 2776 rat.exe 44 PID 2776 wrote to memory of 2000 2776 rat.exe 44 PID 2776 wrote to memory of 2000 2776 rat.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2280
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpDFA5.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpDFA5.tmp.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2344"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2844
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:1924
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2840
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2776 -s 16804⤵PID:2000
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188B
MD5ea2306e4bafe08d2bf3d3ba36ed3c4bf
SHA141205e2b5ea2c68b45c7c0508fd5dcc358e5a97a
SHA256ba403d0f213f29e2f40af06eabc4aba8c2437eecbc13e935e148e47fd90a84c0
SHA51296a3675be93e48aa13a71f66bd11f606b064ad3107ca539773e02012fe2364c5337933b432db7fcf848b706892861b02f14f1058f7adfecd6b5c0c7cfc2fe883
-
Filesize
119KB
MD56bb2ac8cb9f84678bdfba1a061d53421
SHA1f5b8388a153d28b7d3434d16b07e557ca08e0132
SHA2562a29eb506737661d820f87409e83732a8b4a4e66fae7af2cb9776f0c34428054
SHA5122e18c23e4ba26fe318fb52187102863c5cc1e9f415a96578ea7ef68686f2061a78cd39488dbce5008c2d7e854baa8c46783388d81453b28bf65d580598e9a755