Analysis
-
max time kernel
7s -
max time network
12s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 02:07
Behavioral task
behavioral1
Sample
0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc.exe
Resource
win7-20240903-en
General
-
Target
0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc.exe
-
Size
111KB
-
MD5
d0a8826179377706d50d8511b5270202
-
SHA1
a164924fdcaaa9a1c58e8ae4365f06b4da3e6ce3
-
SHA256
0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc
-
SHA512
2a0dae6e457e19bec6e9e554f33294417d73f98d35643a04160f1b02f14be45b9004082e7dc076ed9af7b1690ef91cf5bcbb92a8a8a9446d4e690f119192b767
-
SSDEEP
3072:Bb4MOYUuQaS+T8sv8X31OjqOjNhOYpbxqH8QWnzCrAZuGYW:sYUuQaS+T8sv8X31OXNtbg2
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot1422952298:AAEUK5QmhKaWUtETf1GIcyg7deR8JXsbh2c/sendMessage?chat_id=1189853645
Signatures
-
Toxiceye family
-
Deletes itself 1 IoCs
pid Process 2580 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 580 rat.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2388 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1588 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1680 schtasks.exe 3020 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 580 rat.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 580 rat.exe 580 rat.exe 580 rat.exe 580 rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2768 0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc.exe Token: SeDebugPrivilege 2388 tasklist.exe Token: SeDebugPrivilege 580 rat.exe Token: SeDebugPrivilege 580 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 580 rat.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2768 wrote to memory of 1680 2768 0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc.exe 32 PID 2768 wrote to memory of 1680 2768 0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc.exe 32 PID 2768 wrote to memory of 1680 2768 0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc.exe 32 PID 2768 wrote to memory of 2580 2768 0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc.exe 34 PID 2768 wrote to memory of 2580 2768 0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc.exe 34 PID 2768 wrote to memory of 2580 2768 0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc.exe 34 PID 2580 wrote to memory of 2388 2580 cmd.exe 36 PID 2580 wrote to memory of 2388 2580 cmd.exe 36 PID 2580 wrote to memory of 2388 2580 cmd.exe 36 PID 2580 wrote to memory of 1952 2580 cmd.exe 37 PID 2580 wrote to memory of 1952 2580 cmd.exe 37 PID 2580 wrote to memory of 1952 2580 cmd.exe 37 PID 2580 wrote to memory of 1588 2580 cmd.exe 38 PID 2580 wrote to memory of 1588 2580 cmd.exe 38 PID 2580 wrote to memory of 1588 2580 cmd.exe 38 PID 2580 wrote to memory of 580 2580 cmd.exe 39 PID 2580 wrote to memory of 580 2580 cmd.exe 39 PID 2580 wrote to memory of 580 2580 cmd.exe 39 PID 580 wrote to memory of 3020 580 rat.exe 41 PID 580 wrote to memory of 3020 580 rat.exe 41 PID 580 wrote to memory of 3020 580 rat.exe 41 PID 580 wrote to memory of 1600 580 rat.exe 43 PID 580 wrote to memory of 1600 580 rat.exe 43 PID 580 wrote to memory of 1600 580 rat.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc.exe"C:\Users\Admin\AppData\Local\Temp\0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1680
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp6316.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp6316.tmp.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2768"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:1952
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:1588
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:3020
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 580 -s 17084⤵PID:1600
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
241B
MD53134270da3a9a9d08425e0a61214d07c
SHA174eacbb9c33505243b8b5affa2fbad121ad78bdb
SHA256376c79386e31af449882f01af36e673f366e0955713e12c687047820b7543f4e
SHA512700023f13e7a873a14f9ab4115e9d149afb1ac50e873897ae3535f3d06cafc6fd148177b7e453df36f3c82f0727d3095d65402e4c173d9db64903d40f30138e8
-
Filesize
111KB
MD5d0a8826179377706d50d8511b5270202
SHA1a164924fdcaaa9a1c58e8ae4365f06b4da3e6ce3
SHA2560fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc
SHA5122a0dae6e457e19bec6e9e554f33294417d73f98d35643a04160f1b02f14be45b9004082e7dc076ed9af7b1690ef91cf5bcbb92a8a8a9446d4e690f119192b767