Analysis

  • max time kernel
    11s
  • max time network
    13s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25/02/2025, 20:23

Errors

Reason
Machine shutdown

General

  • Target

    TelegramRAT.exe

  • Size

    111KB

  • MD5

    fba83f24aac967fffc57baf01c095893

  • SHA1

    8cdab10a3facee2d4f758911c3f2e00bb91281b3

  • SHA256

    5d8daed4827846f5c371eb9d958d4b478fa357a495a1cb68df9eecbf40142281

  • SHA512

    22ea406650183dfdd3f27ae9f1461550c3c9de2e62507f0c1af5b783e776df40ed2e59f7d7f009dc8f23b4b1705d7f909c2681501785ef0ec14ba2aa60ca51dc

  • SSDEEP

    1536:I+bUlO0pkM91qQIw8yr9xZxdyyKDWfybhDqI6bQWCzCrAZuqUqDQ:fbWOYkDyrrZxjQbxqHbQWCzCrAZuqBQ

Malware Config

Extracted

Family

toxiceye

C2

https://api.telegram.org/bot7709903928:AAH-JjBArW0_8_MX2hpJCxd-s2x1v94lP2Y/sendMessage?chat_id=5101964078

Signatures

  • ToxicEye

    ToxicEye is a trojan written in C#.

  • Toxiceye family
  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe
    "C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3584
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Windows Audio 3D" /tr "C:\Program Files\HD Realtek Audio 3d\Drivers.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2036
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp9F2E.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp9F2E.tmp.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:240
      • C:\Windows\system32\tasklist.exe
        Tasklist /fi "PID eq 3584"
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:5032
      • C:\Windows\system32\find.exe
        find ":"
        3⤵
          PID:352
        • C:\Windows\system32\timeout.exe
          Timeout /T 1 /Nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:2796
        • C:\Windows\system32\tasklist.exe
          Tasklist /fi "PID eq 3584"
          3⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:2720
        • C:\Windows\system32\find.exe
          find ":"
          3⤵
            PID:4224
          • C:\Windows\system32\timeout.exe
            Timeout /T 1 /Nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:3276
          • C:\Program Files\HD Realtek Audio 3d\Drivers.exe
            "Drivers.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3580
            • C:\Windows\System32\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Windows Audio 3D" /tr "C:\Program Files\HD Realtek Audio 3d\Drivers.exe"
              4⤵
              • Scheduled Task/Job: Scheduled Task
              PID:3560
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:4724

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\HD Realtek Audio 3d\Drivers.exe

          Filesize

          111KB

          MD5

          fba83f24aac967fffc57baf01c095893

          SHA1

          8cdab10a3facee2d4f758911c3f2e00bb91281b3

          SHA256

          5d8daed4827846f5c371eb9d958d4b478fa357a495a1cb68df9eecbf40142281

          SHA512

          22ea406650183dfdd3f27ae9f1461550c3c9de2e62507f0c1af5b783e776df40ed2e59f7d7f009dc8f23b4b1705d7f909c2681501785ef0ec14ba2aa60ca51dc

        • C:\Users\Admin\AppData\Local\Temp\tmp9F2E.tmp.bat

          Filesize

          211B

          MD5

          4db2b1ca02b63ef01290175cc44a7809

          SHA1

          cf406c1559608d865b15aeee297369268a6f7983

          SHA256

          551e9784ea4a6c37623146219f546f38d283c2c01c94615b0ab0b0f0334bcccc

          SHA512

          f5d4efb69792f2e366fbc9c2af2a5847c41990b88dad826d1ceb4a90625303c0202fe1f0eccfb2804fe0ff9baa1982c50a35722be41d53398b66f78bce83ce37

        • memory/3584-0-0x00007FFB82E33000-0x00007FFB82E35000-memory.dmp

          Filesize

          8KB

        • memory/3584-1-0x000001676ED40000-0x000001676ED62000-memory.dmp

          Filesize

          136KB

        • memory/3584-2-0x00007FFB82E30000-0x00007FFB838F2000-memory.dmp

          Filesize

          10.8MB

        • memory/3584-7-0x00007FFB82E30000-0x00007FFB838F2000-memory.dmp

          Filesize

          10.8MB