Analysis
-
max time kernel
263s -
max time network
275s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 18:28
Behavioral task
behavioral1
Sample
TelegramRAT.exe
Resource
win7-20240903-en
Errors
General
-
Target
TelegramRAT.exe
-
Size
111KB
-
MD5
e3d580a17a351366392ec9e2af674524
-
SHA1
354e8f441c2fa510e1b3ecab222280649a7efb9a
-
SHA256
6e644b385d296b76bb3ba68ff006d6b86de763c8b5792e07053e20e3d8218d75
-
SHA512
a7e2726a2b28a39f6624f419ab9194b4c8e3d4c117e324c2719b3f944c5262cbc064df8989d34b984d8541767327d18381adf6678e4445dc8a49afe0a0824309
-
SSDEEP
1536:dn+bAQACiEXM91qQIwvL9x1Cc0Di4OybhDqI64QW6zCrAZuQPEDrL:sbaCHXELrJp6bxqH4QW6zCrAZuQwv
Malware Config
Signatures
-
Toxiceye family
-
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation TelegramRAT.exe -
Executes dropped EXE 1 IoCs
pid Process 2448 rat.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2608 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4232 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4704 schtasks.exe 4812 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2448 rat.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe 2448 rat.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2880 TelegramRAT.exe Token: SeDebugPrivilege 2608 tasklist.exe Token: SeDebugPrivilege 2448 rat.exe Token: SeDebugPrivilege 2448 rat.exe Token: 33 2036 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2036 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2448 rat.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2880 wrote to memory of 4704 2880 TelegramRAT.exe 86 PID 2880 wrote to memory of 4704 2880 TelegramRAT.exe 86 PID 2880 wrote to memory of 2184 2880 TelegramRAT.exe 89 PID 2880 wrote to memory of 2184 2880 TelegramRAT.exe 89 PID 2184 wrote to memory of 2608 2184 cmd.exe 91 PID 2184 wrote to memory of 2608 2184 cmd.exe 91 PID 2184 wrote to memory of 3268 2184 cmd.exe 92 PID 2184 wrote to memory of 3268 2184 cmd.exe 92 PID 2184 wrote to memory of 4232 2184 cmd.exe 93 PID 2184 wrote to memory of 4232 2184 cmd.exe 93 PID 2184 wrote to memory of 2448 2184 cmd.exe 94 PID 2184 wrote to memory of 2448 2184 cmd.exe 94 PID 2448 wrote to memory of 4812 2448 rat.exe 101 PID 2448 wrote to memory of 4812 2448 rat.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4704
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp1A1B.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp1A1B.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2880"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:3268
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:4232
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:4812
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4c0 0x4701⤵
- Suspicious use of AdjustPrivilegeToken
PID:2036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188B
MD59e32556e88cb66b27b85cded7fd362cc
SHA181385ddb920d74bac37d5f3793376dae9002d827
SHA256ad998b9091b4a4cad15693887c7b9d108f546a1a6b91d6d613d8e6dadd439f86
SHA512b2a36dece5a0b4bc990fef6056c4bdf979abfb93f2c572fc86e69f74c22f8865851017417dc24b6071e26ced6662f48dd38850013ba8034ede106f8e9dca4574
-
Filesize
111KB
MD5e3d580a17a351366392ec9e2af674524
SHA1354e8f441c2fa510e1b3ecab222280649a7efb9a
SHA2566e644b385d296b76bb3ba68ff006d6b86de763c8b5792e07053e20e3d8218d75
SHA512a7e2726a2b28a39f6624f419ab9194b4c8e3d4c117e324c2719b3f944c5262cbc064df8989d34b984d8541767327d18381adf6678e4445dc8a49afe0a0824309