Analysis
-
max time kernel
13s -
max time network
9s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 10:46
Behavioral task
behavioral1
Sample
37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe
Resource
win7-20240903-en
General
-
Target
37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe
-
Size
111KB
-
MD5
98cd6339d0013464151fe4719924480e
-
SHA1
6193255218effdef76de60ad5d98d76cca5c400f
-
SHA256
37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0
-
SHA512
b06def8ffd3b2cac2c3beb3146f4306fbd9562a561cf62c26864db124a3a84499506b005344411597fe84b0291b7e2c0e1c45398cebd958d374e8fc45582b75d
-
SSDEEP
3072:1bs2teAmbPICnM4bxqHaQ50ICrAZ5Y4I:HteAmbPIV4bg9
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7911729112:AAEuTZHylBR8xvMwBBJkAhqei5-2oRO4_Xc/sendMessage?chat_id=5648840512
Signatures
-
Toxiceye family
-
Deletes itself 1 IoCs
pid Process 2892 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2168 meow.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2996 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2992 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2752 schtasks.exe 2676 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2168 meow.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2168 meow.exe 2168 meow.exe 2168 meow.exe 2168 meow.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2116 37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe Token: SeDebugPrivilege 2996 tasklist.exe Token: SeDebugPrivilege 2168 meow.exe Token: SeDebugPrivilege 2168 meow.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2168 meow.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2752 2116 37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe 32 PID 2116 wrote to memory of 2752 2116 37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe 32 PID 2116 wrote to memory of 2752 2116 37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe 32 PID 2116 wrote to memory of 2892 2116 37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe 34 PID 2116 wrote to memory of 2892 2116 37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe 34 PID 2116 wrote to memory of 2892 2116 37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe 34 PID 2892 wrote to memory of 2996 2892 cmd.exe 36 PID 2892 wrote to memory of 2996 2892 cmd.exe 36 PID 2892 wrote to memory of 2996 2892 cmd.exe 36 PID 2892 wrote to memory of 2612 2892 cmd.exe 37 PID 2892 wrote to memory of 2612 2892 cmd.exe 37 PID 2892 wrote to memory of 2612 2892 cmd.exe 37 PID 2892 wrote to memory of 2992 2892 cmd.exe 38 PID 2892 wrote to memory of 2992 2892 cmd.exe 38 PID 2892 wrote to memory of 2992 2892 cmd.exe 38 PID 2892 wrote to memory of 2168 2892 cmd.exe 39 PID 2892 wrote to memory of 2168 2892 cmd.exe 39 PID 2892 wrote to memory of 2168 2892 cmd.exe 39 PID 2168 wrote to memory of 2676 2168 meow.exe 41 PID 2168 wrote to memory of 2676 2168 meow.exe 41 PID 2168 wrote to memory of 2676 2168 meow.exe 41 PID 2168 wrote to memory of 1908 2168 meow.exe 43 PID 2168 wrote to memory of 1908 2168 meow.exe 43 PID 2168 wrote to memory of 1908 2168 meow.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe"C:\Users\Admin\AppData\Local\Temp\37b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Audio background" /tr "C:\Users\MicrosoftCorp\meow.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2752
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp8C29.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp8C29.tmp.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2116"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2612
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2992
-
-
C:\Users\MicrosoftCorp\meow.exe"meow.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Audio background" /tr "C:\Users\MicrosoftCorp\meow.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2676
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2168 -s 17124⤵PID:1908
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247B
MD5f8c17b800e6830e40197626f221e2d24
SHA19ce8144fedf408c404d7bae64f31c71a261f1ee8
SHA256e7a51f9331b6cdf2cc6088710fa41f429f8685973912b1923a247425dcc3d845
SHA512346b45a6ce9ebbebbe4da79cd6ecf982800f3db857396c60403bb2f414f989e33af6793476910629301b18e2e1d9eb8229e16c7351d61cb8580be9669dc35dd2
-
Filesize
111KB
MD598cd6339d0013464151fe4719924480e
SHA16193255218effdef76de60ad5d98d76cca5c400f
SHA25637b140b412b4b35dd1569ec67fb624be586bc4ed0b18999584ce91dd0872e4c0
SHA512b06def8ffd3b2cac2c3beb3146f4306fbd9562a561cf62c26864db124a3a84499506b005344411597fe84b0291b7e2c0e1c45398cebd958d374e8fc45582b75d