Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
7s -
max time network
18s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2025, 13:40
Behavioral task
behavioral1
Sample
TelegramRAT.exe
Resource
win7-20240903-en
Errors
General
-
Target
TelegramRAT.exe
-
Size
119KB
-
MD5
6bb2ac8cb9f84678bdfba1a061d53421
-
SHA1
f5b8388a153d28b7d3434d16b07e557ca08e0132
-
SHA256
2a29eb506737661d820f87409e83732a8b4a4e66fae7af2cb9776f0c34428054
-
SHA512
2e18c23e4ba26fe318fb52187102863c5cc1e9f415a96578ea7ef68686f2061a78cd39488dbce5008c2d7e854baa8c46783388d81453b28bf65d580598e9a755
-
SSDEEP
3072:OOfRzlXCwwFwOwWAmm+G/bxqH8QWqzCrAZuuWN:Or1SWHe/bgR
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7742822790:AAHkizf3bilCkIqp8NNVcbWObKSVKo8Xifo/sendMessage?chat_id=7053620590
Signatures
-
Toxiceye family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation TelegramRAT.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation rat.exe -
Executes dropped EXE 1 IoCs
pid Process 4280 rat.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 676 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 680 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3180 schtasks.exe 4808 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4280 rat.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4280 rat.exe 4280 rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4600 TelegramRAT.exe Token: SeDebugPrivilege 676 tasklist.exe Token: SeDebugPrivilege 4280 rat.exe Token: SeDebugPrivilege 4280 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4280 rat.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4600 wrote to memory of 3180 4600 TelegramRAT.exe 84 PID 4600 wrote to memory of 3180 4600 TelegramRAT.exe 84 PID 4600 wrote to memory of 1812 4600 TelegramRAT.exe 86 PID 4600 wrote to memory of 1812 4600 TelegramRAT.exe 86 PID 1812 wrote to memory of 676 1812 cmd.exe 88 PID 1812 wrote to memory of 676 1812 cmd.exe 88 PID 1812 wrote to memory of 3820 1812 cmd.exe 89 PID 1812 wrote to memory of 3820 1812 cmd.exe 89 PID 1812 wrote to memory of 680 1812 cmd.exe 90 PID 1812 wrote to memory of 680 1812 cmd.exe 90 PID 1812 wrote to memory of 4280 1812 cmd.exe 91 PID 1812 wrote to memory of 4280 1812 cmd.exe 91 PID 4280 wrote to memory of 4808 4280 rat.exe 93 PID 4280 wrote to memory of 4808 4280 rat.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:3180
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp7C73.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp7C73.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 4600"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:3820
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:680
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:4808
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188B
MD53e41f1e24e023443ad017fba0400c1ab
SHA1b3be72ee89b1df708ffe40497ba03020f877ce01
SHA256867ba3ace5bd559bde6d5e3eeee52efed41d128d04c77a1cda5ada4aec27b309
SHA5122ab429e7ca9f4441ea574a6a43d8399a145354fd06f2f07258308ed31bb3a4c7584bb49350c174075c034d1bef7a70599d26c841739584f6b0b7203abf58faaf
-
Filesize
119KB
MD56bb2ac8cb9f84678bdfba1a061d53421
SHA1f5b8388a153d28b7d3434d16b07e557ca08e0132
SHA2562a29eb506737661d820f87409e83732a8b4a4e66fae7af2cb9776f0c34428054
SHA5122e18c23e4ba26fe318fb52187102863c5cc1e9f415a96578ea7ef68686f2061a78cd39488dbce5008c2d7e854baa8c46783388d81453b28bf65d580598e9a755