Analysis
-
max time kernel
13s -
max time network
9s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/01/2025, 10:44
Behavioral task
behavioral1
Sample
37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe
Resource
win7-20240903-en
General
-
Target
37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe
-
Size
111KB
-
MD5
98cd6339d0013464151fe4719924480e
-
SHA1
6193255218effdef76de60ad5d98d76cca5c400f
-
SHA256
37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0
-
SHA512
b06def8ffd3b2cac2c3beb3146f4306fbd9562a561cf62c26864db124a3a84499506b005344411597fe84b0291b7e2c0e1c45398cebd958d374e8fc45582b75d
-
SSDEEP
3072:1bs2teAmbPICnM4bxqHaQ50ICrAZ5Y4I:HteAmbPIV4bg9
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7911729112:AAEuTZHylBR8xvMwBBJkAhqei5-2oRO4_Xc/sendMessage?chat_id=5648840512
Signatures
-
Toxiceye family
-
Deletes itself 1 IoCs
pid Process 2324 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1836 meow.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2784 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2736 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2440 schtasks.exe 2080 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1836 meow.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1836 meow.exe 1836 meow.exe 1836 meow.exe 1836 meow.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2380 37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe Token: SeDebugPrivilege 2784 tasklist.exe Token: SeDebugPrivilege 1836 meow.exe Token: SeDebugPrivilege 1836 meow.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1836 meow.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2440 2380 37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe 32 PID 2380 wrote to memory of 2440 2380 37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe 32 PID 2380 wrote to memory of 2440 2380 37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe 32 PID 2380 wrote to memory of 2324 2380 37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe 34 PID 2380 wrote to memory of 2324 2380 37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe 34 PID 2380 wrote to memory of 2324 2380 37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe 34 PID 2324 wrote to memory of 2784 2324 cmd.exe 36 PID 2324 wrote to memory of 2784 2324 cmd.exe 36 PID 2324 wrote to memory of 2784 2324 cmd.exe 36 PID 2324 wrote to memory of 2796 2324 cmd.exe 37 PID 2324 wrote to memory of 2796 2324 cmd.exe 37 PID 2324 wrote to memory of 2796 2324 cmd.exe 37 PID 2324 wrote to memory of 2736 2324 cmd.exe 38 PID 2324 wrote to memory of 2736 2324 cmd.exe 38 PID 2324 wrote to memory of 2736 2324 cmd.exe 38 PID 2324 wrote to memory of 1836 2324 cmd.exe 39 PID 2324 wrote to memory of 1836 2324 cmd.exe 39 PID 2324 wrote to memory of 1836 2324 cmd.exe 39 PID 1836 wrote to memory of 2080 1836 meow.exe 41 PID 1836 wrote to memory of 2080 1836 meow.exe 41 PID 1836 wrote to memory of 2080 1836 meow.exe 41 PID 1836 wrote to memory of 2996 1836 meow.exe 43 PID 1836 wrote to memory of 2996 1836 meow.exe 43 PID 1836 wrote to memory of 2996 1836 meow.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe"C:\Users\Admin\AppData\Local\Temp\37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Audio background" /tr "C:\Users\MicrosoftCorp\meow.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2440
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp9DA6.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp9DA6.tmp.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2380"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2796
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2736
-
-
C:\Users\MicrosoftCorp\meow.exe"meow.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Audio background" /tr "C:\Users\MicrosoftCorp\meow.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2080
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1836 -s 16964⤵PID:2996
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247B
MD576d8d9b859c18b41aa3d3bb17bbf822e
SHA1e551f9d359b9297dad7610f3fc0b668dacfaff75
SHA256ea0f3dbdcf9cac700b13e70d72e48155fafebc8638f4432a50f8787f2dc04614
SHA5126ef47488a0bd77fa7698e54afcfdcb014e4cd90a8589e8bb98536fbdaf6d2da8d1151fb00493c6119393ebcf232a21cb48238a926fd14ac6c679ec813829926b
-
Filesize
111KB
MD598cd6339d0013464151fe4719924480e
SHA16193255218effdef76de60ad5d98d76cca5c400f
SHA25637b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0
SHA512b06def8ffd3b2cac2c3beb3146f4306fbd9562a561cf62c26864db124a3a84499506b005344411597fe84b0291b7e2c0e1c45398cebd958d374e8fc45582b75d