Analysis
-
max time kernel
38s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2025, 10:44
Behavioral task
behavioral1
Sample
37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe
Resource
win7-20240903-en
General
-
Target
37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe
-
Size
111KB
-
MD5
98cd6339d0013464151fe4719924480e
-
SHA1
6193255218effdef76de60ad5d98d76cca5c400f
-
SHA256
37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0
-
SHA512
b06def8ffd3b2cac2c3beb3146f4306fbd9562a561cf62c26864db124a3a84499506b005344411597fe84b0291b7e2c0e1c45398cebd958d374e8fc45582b75d
-
SSDEEP
3072:1bs2teAmbPICnM4bxqHaQ50ICrAZ5Y4I:HteAmbPIV4bg9
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7911729112:AAEuTZHylBR8xvMwBBJkAhqei5-2oRO4_Xc/sendMessage?chat_id=5648840512
Signatures
-
Toxiceye family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation meow.exe -
Executes dropped EXE 1 IoCs
pid Process 1600 meow.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4744 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1420 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1152 schtasks.exe 544 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1600 meow.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1600 meow.exe 1600 meow.exe 1600 meow.exe 1600 meow.exe 1600 meow.exe 1600 meow.exe 1600 meow.exe 1600 meow.exe 1600 meow.exe 1600 meow.exe 1600 meow.exe 1600 meow.exe 1600 meow.exe 1600 meow.exe 1600 meow.exe 1600 meow.exe 1600 meow.exe 1600 meow.exe 1600 meow.exe 1600 meow.exe 1600 meow.exe 1600 meow.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2476 37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe Token: SeDebugPrivilege 4744 tasklist.exe Token: SeDebugPrivilege 1600 meow.exe Token: SeDebugPrivilege 1600 meow.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1600 meow.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2476 wrote to memory of 1152 2476 37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe 85 PID 2476 wrote to memory of 1152 2476 37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe 85 PID 2476 wrote to memory of 3916 2476 37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe 87 PID 2476 wrote to memory of 3916 2476 37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe 87 PID 3916 wrote to memory of 4744 3916 cmd.exe 89 PID 3916 wrote to memory of 4744 3916 cmd.exe 89 PID 3916 wrote to memory of 1636 3916 cmd.exe 90 PID 3916 wrote to memory of 1636 3916 cmd.exe 90 PID 3916 wrote to memory of 1420 3916 cmd.exe 91 PID 3916 wrote to memory of 1420 3916 cmd.exe 91 PID 3916 wrote to memory of 1600 3916 cmd.exe 93 PID 3916 wrote to memory of 1600 3916 cmd.exe 93 PID 1600 wrote to memory of 544 1600 meow.exe 95 PID 1600 wrote to memory of 544 1600 meow.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe"C:\Users\Admin\AppData\Local\Temp\37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Audio background" /tr "C:\Users\MicrosoftCorp\meow.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1152
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpF647.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpF647.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2476"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:1636
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:1420
-
-
C:\Users\MicrosoftCorp\meow.exe"meow.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Audio background" /tr "C:\Users\MicrosoftCorp\meow.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:544
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247B
MD502de200d2eacd2503b538f0ee2105f0b
SHA110544de91259a0a1033a429d9fa17876e82ec468
SHA25652c6b70f2a6eb5434e3e70a4c2117353d9fe93ea71f573bf086696c76dd0b405
SHA512197bc01bc5262260eb3d57892ce8eb26573b106ce224012dbca7ed30fdad4b854559a02af2c08185fe4c6da3478d09994bc31da35bcd55b48ceb00ca43001e44
-
Filesize
111KB
MD598cd6339d0013464151fe4719924480e
SHA16193255218effdef76de60ad5d98d76cca5c400f
SHA25637b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0
SHA512b06def8ffd3b2cac2c3beb3146f4306fbd9562a561cf62c26864db124a3a84499506b005344411597fe84b0291b7e2c0e1c45398cebd958d374e8fc45582b75d