Analysis

  • max time kernel
    102s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/04/2025, 20:50

General

  • Target

    TelegramRAT.exe

  • Size

    146KB

  • MD5

    406a5cb1b15ae669a9f28fdd7301e2f0

  • SHA1

    13f6bc53753e5be52e53ffc6686b5d2b930a46ac

  • SHA256

    f4897365644f81143f94707c6e0153e3026f83c40c5dd218cf89e110d7d5a724

  • SHA512

    f79272832508808cb145309c378883296058365064fb168fc8856d3634364019aa4790bdb93ed660a18f9dc83337b1f76873a4e5e2c196f3974e753c158fb665

  • SSDEEP

    3072:flp6GWVke8WEhv9cQfYEv1c+68cGPKS2ZbZLQAQWXPCrAZuQcEeZcA/1P:flppWV2Ysq+jcGySmbF7

Malware Config

Extracted

Family

toxiceye

C2

https://api.telegram.org/bot7582691185:AAFMBoknnYf6nr-rXlzotfzCNnqEPGSYrqc/sendMessage?chat_id=8029727797

Signatures

  • Contains code to disable Windows Defender 2 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • ToxicEye

    ToxicEye is a trojan written in C#.

  • Toxiceye family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe
    "C:\Users\Admin\AppData\Local\Temp\TelegramRAT.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5660
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "discord" /tr "C:\Users\virustotal\total.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:5968
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp7E67.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp7E67.tmp.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4700
      • C:\Windows\system32\tasklist.exe
        Tasklist /fi "PID eq 5660"
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:1072
      • C:\Windows\system32\find.exe
        find ":"
        3⤵
          PID:3332
        • C:\Windows\system32\timeout.exe
          Timeout /T 1 /Nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:5760
        • C:\Users\virustotal\total.exe
          "total.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3564
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "discord" /tr "C:\Users\virustotal\total.exe"
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:3880

    Network

    MITRE ATT&CK Enterprise v16

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp7E67.tmp.bat

      Filesize

      192B

      MD5

      c08327019042459c3f8bfa5b8fd5c61d

      SHA1

      4f7b563b420282bf59e9a893055f0e36a14c2df9

      SHA256

      acbf903aa9bfbd0948df1f5ec6f3a4155445e8b674378dd20b0b01c214ddce3e

      SHA512

      ef291603fc7374b5e370cee5b6bb7d168f844ac6e61ff94ae981962e0797c1c2fef886c1db6869d4f0cce4ad16106dd1497394d30eac2abada804740c4a3c12b

    • C:\Users\virustotal\total.exe

      Filesize

      146KB

      MD5

      406a5cb1b15ae669a9f28fdd7301e2f0

      SHA1

      13f6bc53753e5be52e53ffc6686b5d2b930a46ac

      SHA256

      f4897365644f81143f94707c6e0153e3026f83c40c5dd218cf89e110d7d5a724

      SHA512

      f79272832508808cb145309c378883296058365064fb168fc8856d3634364019aa4790bdb93ed660a18f9dc83337b1f76873a4e5e2c196f3974e753c158fb665

    • memory/5660-0-0x00007FFC17BE3000-0x00007FFC17BE5000-memory.dmp

      Filesize

      8KB

    • memory/5660-1-0x0000021497860000-0x000002149788A000-memory.dmp

      Filesize

      168KB

    • memory/5660-2-0x00007FFC17BE0000-0x00007FFC186A1000-memory.dmp

      Filesize

      10.8MB

    • memory/5660-6-0x00007FFC17BE0000-0x00007FFC186A1000-memory.dmp

      Filesize

      10.8MB