Analysis
-
max time kernel
85s -
max time network
87s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 18:08
Errors
General
-
Target
TelegramRAT.exe
-
Size
111KB
-
MD5
e3d580a17a351366392ec9e2af674524
-
SHA1
354e8f441c2fa510e1b3ecab222280649a7efb9a
-
SHA256
6e644b385d296b76bb3ba68ff006d6b86de763c8b5792e07053e20e3d8218d75
-
SHA512
a7e2726a2b28a39f6624f419ab9194b4c8e3d4c117e324c2719b3f944c5262cbc064df8989d34b984d8541767327d18381adf6678e4445dc8a49afe0a0824309
-
SSDEEP
1536:dn+bAQACiEXM91qQIwvL9x1Cc0Di4OybhDqI64QW6zCrAZuQPEDrL:sbaCHXELrJp6bxqH4QW6zCrAZuQwv
Malware Config
Signatures
-
Toxiceye family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation TelegramRAT.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation rat.exe -
Executes dropped EXE 1 IoCs
pid Process 3352 rat.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1192 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3076 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4284 schtasks.exe 3068 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3352 rat.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe 3352 rat.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2832 TelegramRAT.exe Token: SeDebugPrivilege 1192 tasklist.exe Token: SeDebugPrivilege 3352 rat.exe Token: SeDebugPrivilege 3352 rat.exe Token: SeShutdownPrivilege 3352 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3352 rat.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2832 wrote to memory of 4284 2832 TelegramRAT.exe 84 PID 2832 wrote to memory of 4284 2832 TelegramRAT.exe 84 PID 2832 wrote to memory of 1136 2832 TelegramRAT.exe 86 PID 2832 wrote to memory of 1136 2832 TelegramRAT.exe 86 PID 1136 wrote to memory of 1192 1136 cmd.exe 88 PID 1136 wrote to memory of 1192 1136 cmd.exe 88 PID 1136 wrote to memory of 1464 1136 cmd.exe 89 PID 1136 wrote to memory of 1464 1136 cmd.exe 89 PID 1136 wrote to memory of 3076 1136 cmd.exe 90 PID 1136 wrote to memory of 3076 1136 cmd.exe 90 PID 1136 wrote to memory of 3352 1136 cmd.exe 91 PID 1136 wrote to memory of 3352 1136 cmd.exe 91 PID 3352 wrote to memory of 3068 3352 rat.exe 93 PID 3352 wrote to memory of 3068 3352 rat.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4284
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp8CA0.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp8CA0.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2832"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:1464
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:3076
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:3068
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188B
MD5ce2e6f551787fb3b00f6233b5c62ce1e
SHA1a95b65f424fa70148d8adff3a915c8fd7b2abbfc
SHA256894501a589ac1d95cf7580243d7e6757014be22a63001d4f9250182508b94343
SHA512a0dcf29480aa26fbb08ccf931dc5fc467d108f5d309329b0c5f613bc2d3de596bd6ee4860c70ff9909a508164af5540fa4eaa907589234ba9c168ba93ab4a855
-
Filesize
111KB
MD5e3d580a17a351366392ec9e2af674524
SHA1354e8f441c2fa510e1b3ecab222280649a7efb9a
SHA2566e644b385d296b76bb3ba68ff006d6b86de763c8b5792e07053e20e3d8218d75
SHA512a7e2726a2b28a39f6624f419ab9194b4c8e3d4c117e324c2719b3f944c5262cbc064df8989d34b984d8541767327d18381adf6678e4445dc8a49afe0a0824309