Analysis
-
max time kernel
240s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 20:35
Errors
General
-
Target
TelegramRAT.exe
-
Size
111KB
-
MD5
e3d580a17a351366392ec9e2af674524
-
SHA1
354e8f441c2fa510e1b3ecab222280649a7efb9a
-
SHA256
6e644b385d296b76bb3ba68ff006d6b86de763c8b5792e07053e20e3d8218d75
-
SHA512
a7e2726a2b28a39f6624f419ab9194b4c8e3d4c117e324c2719b3f944c5262cbc064df8989d34b984d8541767327d18381adf6678e4445dc8a49afe0a0824309
-
SSDEEP
1536:dn+bAQACiEXM91qQIwvL9x1Cc0Di4OybhDqI64QW6zCrAZuQPEDrL:sbaCHXELrJp6bxqH4QW6zCrAZuQwv
Malware Config
Extracted
gurcu
https://api.telegram.org/bot8014667160:AAFqSbz3GwG_v0L0NNlpN0dSG5-tCdm4TtY/sendMessage?chat_id=-4791200354
https://api.telegram.org/bot8014667160:AAFqSbz3GwG_v0L0NNlpN0dSG5-tCdm4TtY/getUpdate
https://api.telegram.org/bot8014667160:AAFqSbz3GwG_v0L0NNlpN0dSG5-tCdm4TtY/getUpdates?offset=97250663
https://api.telegram.org/bot8014667160:AAFqSbz3GwG_v0L0NNlpN0dSG5-tCdm4TtY/getUpdates?offset=97250664
https://api.telegram.org/bot8014667160:AAFqSbz3GwG_v0L0NNlpN0dSG5-tCdm4TtY/getUpdates?offset=97250665
https://api.telegram.org/bot8014667160:AAFqSbz3GwG_v0L0NNlpN0dSG5-tCdm4TtY/getUpdates?offset=97250666
https://api.telegram.org/bot8014667160:AAFqSbz3GwG_v0L0NNlpN0dSG5-tCdm4TtY/sendPhoto?chat_id=-479120035
Signatures
-
Gurcu family
-
Toxiceye family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation TelegramRAT.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation rat.exe -
Executes dropped EXE 1 IoCs
pid Process 3172 rat.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2540 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4976 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1436 schtasks.exe 2492 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3172 rat.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 244 taskmgr.exe 244 taskmgr.exe 3172 rat.exe 244 taskmgr.exe 3172 rat.exe 244 taskmgr.exe 3172 rat.exe 244 taskmgr.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 3172 rat.exe 768 taskmgr.exe 768 taskmgr.exe 3172 rat.exe 3172 rat.exe 768 taskmgr.exe 768 taskmgr.exe 3172 rat.exe 768 taskmgr.exe 3172 rat.exe 768 taskmgr.exe 3172 rat.exe 768 taskmgr.exe 3172 rat.exe 768 taskmgr.exe 3172 rat.exe 768 taskmgr.exe 3172 rat.exe 768 taskmgr.exe 3172 rat.exe 768 taskmgr.exe 3172 rat.exe 768 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 768 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 3096 TelegramRAT.exe Token: SeDebugPrivilege 2540 tasklist.exe Token: SeDebugPrivilege 244 taskmgr.exe Token: SeSystemProfilePrivilege 244 taskmgr.exe Token: SeCreateGlobalPrivilege 244 taskmgr.exe Token: SeDebugPrivilege 3172 rat.exe Token: SeDebugPrivilege 3172 rat.exe Token: 33 244 taskmgr.exe Token: SeIncBasePriorityPrivilege 244 taskmgr.exe Token: SeDebugPrivilege 768 taskmgr.exe Token: SeSystemProfilePrivilege 768 taskmgr.exe Token: SeCreateGlobalPrivilege 768 taskmgr.exe Token: 33 768 taskmgr.exe Token: SeIncBasePriorityPrivilege 768 taskmgr.exe Token: SeShutdownPrivilege 3172 rat.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 244 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe 768 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3172 rat.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3096 wrote to memory of 2492 3096 TelegramRAT.exe 85 PID 3096 wrote to memory of 2492 3096 TelegramRAT.exe 85 PID 3096 wrote to memory of 2396 3096 TelegramRAT.exe 87 PID 3096 wrote to memory of 2396 3096 TelegramRAT.exe 87 PID 2396 wrote to memory of 2540 2396 cmd.exe 89 PID 2396 wrote to memory of 2540 2396 cmd.exe 89 PID 2396 wrote to memory of 4604 2396 cmd.exe 90 PID 2396 wrote to memory of 4604 2396 cmd.exe 90 PID 2396 wrote to memory of 4976 2396 cmd.exe 91 PID 2396 wrote to memory of 4976 2396 cmd.exe 91 PID 2396 wrote to memory of 3172 2396 cmd.exe 93 PID 2396 wrote to memory of 3172 2396 cmd.exe 93 PID 3172 wrote to memory of 1436 3172 rat.exe 97 PID 3172 wrote to memory of 1436 3172 rat.exe 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2492
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp87FC.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp87FC.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 3096"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:4604
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:4976
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:1436
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:244
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
188B
MD510fd09ddb4b0b8ac3ead8c1a78948e6c
SHA188bee343c139df86ee8165ee177a2883316fc103
SHA25689cfac18a0ebb2a1902a7266f07dbd3f5efad58accbaae95bccbc9540fa925f7
SHA512af927e47817f9ec4716cea85ab723aa547ea5a5de59d3d67cb514f0dbf8de0f6b3051dad6ef05ea91f410c0ffd51ad0ee24af02af8eebec94439c7c382f00986
-
Filesize
111KB
MD5e3d580a17a351366392ec9e2af674524
SHA1354e8f441c2fa510e1b3ecab222280649a7efb9a
SHA2566e644b385d296b76bb3ba68ff006d6b86de763c8b5792e07053e20e3d8218d75
SHA512a7e2726a2b28a39f6624f419ab9194b4c8e3d4c117e324c2719b3f944c5262cbc064df8989d34b984d8541767327d18381adf6678e4445dc8a49afe0a0824309