Analysis
-
max time kernel
9s -
max time network
10s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 18:23
Behavioral task
behavioral1
Sample
TelegramRAT.exe
Resource
win7-20240903-en
Errors
General
-
Target
TelegramRAT.exe
-
Size
111KB
-
MD5
e3d580a17a351366392ec9e2af674524
-
SHA1
354e8f441c2fa510e1b3ecab222280649a7efb9a
-
SHA256
6e644b385d296b76bb3ba68ff006d6b86de763c8b5792e07053e20e3d8218d75
-
SHA512
a7e2726a2b28a39f6624f419ab9194b4c8e3d4c117e324c2719b3f944c5262cbc064df8989d34b984d8541767327d18381adf6678e4445dc8a49afe0a0824309
-
SSDEEP
1536:dn+bAQACiEXM91qQIwvL9x1Cc0Di4OybhDqI64QW6zCrAZuQPEDrL:sbaCHXELrJp6bxqH4QW6zCrAZuQwv
Malware Config
Signatures
-
Toxiceye family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation TelegramRAT.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation rat.exe -
Executes dropped EXE 1 IoCs
pid Process 3852 rat.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4052 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1656 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4596 schtasks.exe 2076 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3852 rat.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3852 rat.exe 3852 rat.exe 3852 rat.exe 3852 rat.exe 3852 rat.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3904 TelegramRAT.exe Token: SeDebugPrivilege 4052 tasklist.exe Token: SeDebugPrivilege 3852 rat.exe Token: SeDebugPrivilege 3852 rat.exe Token: SeShutdownPrivilege 3852 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3852 rat.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3904 wrote to memory of 4596 3904 TelegramRAT.exe 85 PID 3904 wrote to memory of 4596 3904 TelegramRAT.exe 85 PID 3904 wrote to memory of 452 3904 TelegramRAT.exe 87 PID 3904 wrote to memory of 452 3904 TelegramRAT.exe 87 PID 452 wrote to memory of 4052 452 cmd.exe 89 PID 452 wrote to memory of 4052 452 cmd.exe 89 PID 452 wrote to memory of 4188 452 cmd.exe 90 PID 452 wrote to memory of 4188 452 cmd.exe 90 PID 452 wrote to memory of 1656 452 cmd.exe 91 PID 452 wrote to memory of 1656 452 cmd.exe 91 PID 452 wrote to memory of 3852 452 cmd.exe 92 PID 452 wrote to memory of 3852 452 cmd.exe 92 PID 3852 wrote to memory of 2076 3852 rat.exe 94 PID 3852 wrote to memory of 2076 3852 rat.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4596
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp89D1.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp89D1.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 3904"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:4188
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:1656
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2076
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188B
MD53690b111131233827b110fe4820da68a
SHA1b40cc6e943a1a35e02ae5e3b948253b026a56c1d
SHA2568b1de0376a5a8b6477411cbe48ff38eceac3cfde49b61b2fd0d23c51fe874316
SHA51298c339745855fca6a71b602f40cce2a52851e848f55372815381948e03c7688c28cef8f177651c665f0e3acf30b438d134ec53eb12a1f63904aff6bf8a799cd2
-
Filesize
111KB
MD5e3d580a17a351366392ec9e2af674524
SHA1354e8f441c2fa510e1b3ecab222280649a7efb9a
SHA2566e644b385d296b76bb3ba68ff006d6b86de763c8b5792e07053e20e3d8218d75
SHA512a7e2726a2b28a39f6624f419ab9194b4c8e3d4c117e324c2719b3f944c5262cbc064df8989d34b984d8541767327d18381adf6678e4445dc8a49afe0a0824309