Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 18:16
Behavioral task
behavioral1
Sample
TelegramRAT.exe
Resource
win7-20241010-en
General
-
Target
TelegramRAT.exe
-
Size
111KB
-
MD5
e3d580a17a351366392ec9e2af674524
-
SHA1
354e8f441c2fa510e1b3ecab222280649a7efb9a
-
SHA256
6e644b385d296b76bb3ba68ff006d6b86de763c8b5792e07053e20e3d8218d75
-
SHA512
a7e2726a2b28a39f6624f419ab9194b4c8e3d4c117e324c2719b3f944c5262cbc064df8989d34b984d8541767327d18381adf6678e4445dc8a49afe0a0824309
-
SSDEEP
1536:dn+bAQACiEXM91qQIwvL9x1Cc0Di4OybhDqI64QW6zCrAZuQPEDrL:sbaCHXELrJp6bxqH4QW6zCrAZuQwv
Malware Config
Signatures
-
Toxiceye family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation TelegramRAT.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation rat.exe -
Executes dropped EXE 1 IoCs
pid Process 3060 rat.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4392 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 536 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2468 schtasks.exe 5100 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3060 rat.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe 3060 rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4700 TelegramRAT.exe Token: SeDebugPrivilege 4392 tasklist.exe Token: SeDebugPrivilege 3060 rat.exe Token: SeDebugPrivilege 3060 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3060 rat.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4700 wrote to memory of 2468 4700 TelegramRAT.exe 85 PID 4700 wrote to memory of 2468 4700 TelegramRAT.exe 85 PID 4700 wrote to memory of 2056 4700 TelegramRAT.exe 87 PID 4700 wrote to memory of 2056 4700 TelegramRAT.exe 87 PID 2056 wrote to memory of 4392 2056 cmd.exe 89 PID 2056 wrote to memory of 4392 2056 cmd.exe 89 PID 2056 wrote to memory of 1604 2056 cmd.exe 90 PID 2056 wrote to memory of 1604 2056 cmd.exe 90 PID 2056 wrote to memory of 536 2056 cmd.exe 91 PID 2056 wrote to memory of 536 2056 cmd.exe 91 PID 2056 wrote to memory of 3060 2056 cmd.exe 92 PID 2056 wrote to memory of 3060 2056 cmd.exe 92 PID 3060 wrote to memory of 5100 3060 rat.exe 94 PID 3060 wrote to memory of 5100 3060 rat.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2468
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp93F3.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp93F3.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 4700"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:1604
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:536
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:5100
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188B
MD58126151e2cea2c2943ac42f4c4d642bf
SHA143f83424fa151a6cd035efa10acffe369468a381
SHA256d49d03edacd7683941adc472ccae454aed38877a20cf10090b1d0711293e422b
SHA51264a69c53fc6f0bf9393dd41451051457a4eb33ad4742313c1c6437600892ab2384d20708760ecabf36b7b2f94ee4b2a80cbecd9fb51b67e89066514501c0adaf
-
Filesize
111KB
MD5e3d580a17a351366392ec9e2af674524
SHA1354e8f441c2fa510e1b3ecab222280649a7efb9a
SHA2566e644b385d296b76bb3ba68ff006d6b86de763c8b5792e07053e20e3d8218d75
SHA512a7e2726a2b28a39f6624f419ab9194b4c8e3d4c117e324c2719b3f944c5262cbc064df8989d34b984d8541767327d18381adf6678e4445dc8a49afe0a0824309