Analysis

  • max time kernel
    15s
  • max time network
    16s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-01-2025 13:41

Errors

Reason
Machine shutdown

General

  • Target

    250105-qykc6awjax_pw_infected.zip

  • Size

    51KB

  • MD5

    822b85e7f8c5092b6b2ce1291e8437e9

  • SHA1

    1fc87f5ff11583cd632d6f6e7a4008a3c8146881

  • SHA256

    c96283c6ac2a01c42c804a1bbc821b72a9ed505fc1943b3b1b00382aadfc2699

  • SHA512

    0f3fa4bb4cd5ca65396f5fa570831a70053ee59274880be7daa3730210cfe89d13188860c905f987ccb5e045778d10e01f2e5cd4469a40e6c54953ccb0e939b5

  • SSDEEP

    1536:CEoIN63tb/X5Ol8hiMGpunl+MTRHxa9keD4mhGo:TfN63FVbG8nlzTROLhf

Malware Config

Extracted

Family

toxiceye

C2

https://api.telegram.org/bot7742822790:AAHkizf3bilCkIqp8NNVcbWObKSVKo8Xifo/sendMessage?chat_id=7053620590

Signatures

  • ToxicEye

    ToxicEye is a trojan written in C#.

  • Toxiceye family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\250105-qykc6awjax_pw_infected.zip"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:5048
    • C:\Users\Admin\AppData\Local\Temp\7zO8B3849B7\TelegramRAT.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO8B3849B7\TelegramRAT.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:624
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1196
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpC3EC.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpC3EC.tmp.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3080
        • C:\Windows\system32\tasklist.exe
          Tasklist /fi "PID eq 624"
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:2724
        • C:\Windows\system32\find.exe
          find ":"
          4⤵
            PID:2720
          • C:\Windows\system32\timeout.exe
            Timeout /T 1 /Nobreak
            4⤵
            • Delays execution with timeout.exe
            PID:4844
          • C:\Users\ToxicEye\rat.exe
            "rat.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4056
            • C:\Windows\System32\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"
              5⤵
              • Scheduled Task/Job: Scheduled Task
              PID:4884

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7zO8B3849B7\TelegramRAT.exe

      Filesize

      119KB

      MD5

      6bb2ac8cb9f84678bdfba1a061d53421

      SHA1

      f5b8388a153d28b7d3434d16b07e557ca08e0132

      SHA256

      2a29eb506737661d820f87409e83732a8b4a4e66fae7af2cb9776f0c34428054

      SHA512

      2e18c23e4ba26fe318fb52187102863c5cc1e9f415a96578ea7ef68686f2061a78cd39488dbce5008c2d7e854baa8c46783388d81453b28bf65d580598e9a755

    • C:\Users\Admin\AppData\Local\Temp\tmpC3EC.tmp.bat

      Filesize

      187B

      MD5

      4350d0cfa0f8e0b1d950156996f5b65b

      SHA1

      f575223b37424b05a087c3f0babc3dc2c63eab9f

      SHA256

      df1aacd720278e83278388f729d5c61f23b6a20679add929ea23b8bcefd79e9a

      SHA512

      0a279b80c4f1c99ee1391a752af1e137b35a4032b134505e264b9e21320840c9d94ce071e3d6be1251452dd944c65b731b1e661303c8c73e0b8b48945c92a465

    • memory/624-12-0x00007FF9977C3000-0x00007FF9977C5000-memory.dmp

      Filesize

      8KB

    • memory/624-13-0x000002B478A40000-0x000002B478A64000-memory.dmp

      Filesize

      144KB

    • memory/624-14-0x00007FF9977C0000-0x00007FF998281000-memory.dmp

      Filesize

      10.8MB

    • memory/624-18-0x00007FF9977C0000-0x00007FF998281000-memory.dmp

      Filesize

      10.8MB