Analysis
-
max time kernel
5s -
max time network
6s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 02:07
Behavioral task
behavioral1
Sample
0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc.exe
Resource
win7-20240903-en
Errors
General
-
Target
0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc.exe
-
Size
111KB
-
MD5
d0a8826179377706d50d8511b5270202
-
SHA1
a164924fdcaaa9a1c58e8ae4365f06b4da3e6ce3
-
SHA256
0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc
-
SHA512
2a0dae6e457e19bec6e9e554f33294417d73f98d35643a04160f1b02f14be45b9004082e7dc076ed9af7b1690ef91cf5bcbb92a8a8a9446d4e690f119192b767
-
SSDEEP
3072:Bb4MOYUuQaS+T8sv8X31OjqOjNhOYpbxqH8QWnzCrAZuGYW:sYUuQaS+T8sv8X31OXNtbg2
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot1422952298:AAEUK5QmhKaWUtETf1GIcyg7deR8JXsbh2c/sendMessage?chat_id=1189853645
Signatures
-
Toxiceye family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation 0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation rat.exe -
Executes dropped EXE 1 IoCs
pid Process 5064 rat.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1136 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4992 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2896 schtasks.exe 3748 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5064 rat.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 5064 rat.exe 5064 rat.exe 5064 rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4032 0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc.exe Token: SeDebugPrivilege 1136 tasklist.exe Token: SeDebugPrivilege 5064 rat.exe Token: SeDebugPrivilege 5064 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5064 rat.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4032 wrote to memory of 2896 4032 0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc.exe 93 PID 4032 wrote to memory of 2896 4032 0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc.exe 93 PID 4032 wrote to memory of 4532 4032 0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc.exe 95 PID 4032 wrote to memory of 4532 4032 0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc.exe 95 PID 4532 wrote to memory of 1136 4532 cmd.exe 97 PID 4532 wrote to memory of 1136 4532 cmd.exe 97 PID 4532 wrote to memory of 640 4532 cmd.exe 98 PID 4532 wrote to memory of 640 4532 cmd.exe 98 PID 4532 wrote to memory of 4992 4532 cmd.exe 99 PID 4532 wrote to memory of 4992 4532 cmd.exe 99 PID 4532 wrote to memory of 5064 4532 cmd.exe 101 PID 4532 wrote to memory of 5064 4532 cmd.exe 101 PID 5064 wrote to memory of 3748 5064 rat.exe 105 PID 5064 wrote to memory of 3748 5064 rat.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc.exe"C:\Users\Admin\AppData\Local\Temp\0fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2896
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpB6FC.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpB6FC.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 4032"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:640
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:4992
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:3748
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
241B
MD599d1a0e9a356fe801633e60cd53e3fcb
SHA1401e9ad76141b2b69c6e50cc51b7b342062b35fb
SHA256fc2bc9e1f368daa63832cb702d5c14629e91fa3da7aba22437dc9a62b4184c4e
SHA512d49a5c3d0f64c84cebfee82ca9b45d3396803fed1744dfcbdde4edaa7273cf304576f56d1abe9c5f4f0a0c1c145a010f37c4cf8ef7b3bb87f371d1c049b43c35
-
Filesize
111KB
MD5d0a8826179377706d50d8511b5270202
SHA1a164924fdcaaa9a1c58e8ae4365f06b4da3e6ce3
SHA2560fd3be20b5b0e61fc687de84a79cce38a0c80eebfdf42ae963eedbd63ac6eacc
SHA5122a0dae6e457e19bec6e9e554f33294417d73f98d35643a04160f1b02f14be45b9004082e7dc076ed9af7b1690ef91cf5bcbb92a8a8a9446d4e690f119192b767