Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 06:24
Behavioral task
behavioral1
Sample
virus.exe
Resource
win10v2004-20230220-en
General
-
Target
virus.exe
-
Size
315KB
-
MD5
0be23ddaec11bb1e64f2f54d4505cbcd
-
SHA1
24dce5a1b78c691f57d20de2afe00af2f88c1bb5
-
SHA256
58d89ecd353406c747242574858134b6e37f1d49ab65b4fc48a1e822293bb22e
-
SHA512
5252df7b7c170dcaff33f4e6dbdae1e3cc070f1b5cc1a628c49216d5fb2781fc5be78c4df78c19a47b81d06d78980f2ca0cca10a738994484ea4d0537fbeb879
-
SSDEEP
6144:elNBW0lmEWfK8OZn05Wm6wFBDpomqTVg+e67YCkxLr3DI3NoAcs:ent8OZQBDDpsyfFr3Io
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
client.execlient.exepid process 3924 client.exe 380 client.exe -
Processes:
resource yara_rule C:\ProgramData\Babylon RAT\client.exe upx behavioral1/memory/2264-138-0x0000000000E60000-0x0000000000EDE000-memory.dmp upx C:\ProgramData\Babylon RAT\client.exe upx behavioral1/memory/3924-139-0x0000000000BE0000-0x0000000000C5E000-memory.dmp upx C:\ProgramData\Babylon RAT\client.exe upx behavioral1/memory/380-141-0x0000000000BE0000-0x0000000000C5E000-memory.dmp upx behavioral1/memory/3924-143-0x0000000000BE0000-0x0000000000C5E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
virus.execlient.execlient.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Babylon RAT = "C:\\ProgramData\\Babylon RAT\\client.exe" virus.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce client.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Babylon RAT = "C:\\ProgramData\\Babylon RAT\\client.exe" client.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce client.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Babylon RAT = "C:\\ProgramData\\Babylon RAT\\client.exe" client.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce virus.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
virus.execlient.execlient.exedescription pid process Token: SeShutdownPrivilege 2264 virus.exe Token: SeDebugPrivilege 2264 virus.exe Token: SeTcbPrivilege 2264 virus.exe Token: SeShutdownPrivilege 3924 client.exe Token: SeDebugPrivilege 3924 client.exe Token: SeTcbPrivilege 3924 client.exe Token: SeShutdownPrivilege 380 client.exe Token: SeDebugPrivilege 380 client.exe Token: SeTcbPrivilege 380 client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
virus.execlient.execlient.exedescription pid process target process PID 2264 wrote to memory of 3584 2264 virus.exe cmd.exe PID 2264 wrote to memory of 3584 2264 virus.exe cmd.exe PID 2264 wrote to memory of 3584 2264 virus.exe cmd.exe PID 2264 wrote to memory of 3924 2264 virus.exe client.exe PID 2264 wrote to memory of 3924 2264 virus.exe client.exe PID 2264 wrote to memory of 3924 2264 virus.exe client.exe PID 3924 wrote to memory of 4152 3924 client.exe cmd.exe PID 3924 wrote to memory of 4152 3924 client.exe cmd.exe PID 3924 wrote to memory of 4152 3924 client.exe cmd.exe PID 3924 wrote to memory of 380 3924 client.exe client.exe PID 3924 wrote to memory of 380 3924 client.exe client.exe PID 3924 wrote to memory of 380 3924 client.exe client.exe PID 3924 wrote to memory of 4740 3924 client.exe cmd.exe PID 3924 wrote to memory of 4740 3924 client.exe cmd.exe PID 3924 wrote to memory of 4740 3924 client.exe cmd.exe PID 380 wrote to memory of 3504 380 client.exe cmd.exe PID 380 wrote to memory of 3504 380 client.exe cmd.exe PID 380 wrote to memory of 3504 380 client.exe cmd.exe PID 380 wrote to memory of 4048 380 client.exe cmd.exe PID 380 wrote to memory of 4048 380 client.exe cmd.exe PID 380 wrote to memory of 4048 380 client.exe cmd.exe PID 3924 wrote to memory of 4284 3924 client.exe cmd.exe PID 3924 wrote to memory of 4284 3924 client.exe cmd.exe PID 3924 wrote to memory of 4284 3924 client.exe cmd.exe PID 380 wrote to memory of 4200 380 client.exe cmd.exe PID 380 wrote to memory of 4200 380 client.exe cmd.exe PID 380 wrote to memory of 4200 380 client.exe cmd.exe PID 3924 wrote to memory of 4524 3924 client.exe cmd.exe PID 3924 wrote to memory of 4524 3924 client.exe cmd.exe PID 3924 wrote to memory of 4524 3924 client.exe cmd.exe PID 380 wrote to memory of 4724 380 client.exe cmd.exe PID 380 wrote to memory of 4724 380 client.exe cmd.exe PID 380 wrote to memory of 4724 380 client.exe cmd.exe PID 3924 wrote to memory of 4640 3924 client.exe cmd.exe PID 3924 wrote to memory of 4640 3924 client.exe cmd.exe PID 3924 wrote to memory of 4640 3924 client.exe cmd.exe PID 3924 wrote to memory of 2720 3924 client.exe cmd.exe PID 3924 wrote to memory of 2720 3924 client.exe cmd.exe PID 3924 wrote to memory of 2720 3924 client.exe cmd.exe PID 380 wrote to memory of 2032 380 client.exe cmd.exe PID 380 wrote to memory of 2032 380 client.exe cmd.exe PID 380 wrote to memory of 2032 380 client.exe cmd.exe PID 380 wrote to memory of 4460 380 client.exe cmd.exe PID 380 wrote to memory of 4460 380 client.exe cmd.exe PID 380 wrote to memory of 4460 380 client.exe cmd.exe PID 3924 wrote to memory of 472 3924 client.exe cmd.exe PID 3924 wrote to memory of 472 3924 client.exe cmd.exe PID 3924 wrote to memory of 472 3924 client.exe cmd.exe PID 380 wrote to memory of 3628 380 client.exe cmd.exe PID 380 wrote to memory of 3628 380 client.exe cmd.exe PID 380 wrote to memory of 3628 380 client.exe cmd.exe PID 3924 wrote to memory of 1920 3924 client.exe cmd.exe PID 3924 wrote to memory of 1920 3924 client.exe cmd.exe PID 3924 wrote to memory of 1920 3924 client.exe cmd.exe PID 380 wrote to memory of 4956 380 client.exe cmd.exe PID 380 wrote to memory of 4956 380 client.exe cmd.exe PID 380 wrote to memory of 4956 380 client.exe cmd.exe PID 3924 wrote to memory of 5008 3924 client.exe cmd.exe PID 3924 wrote to memory of 5008 3924 client.exe cmd.exe PID 3924 wrote to memory of 5008 3924 client.exe cmd.exe PID 380 wrote to memory of 3180 380 client.exe cmd.exe PID 380 wrote to memory of 3180 380 client.exe cmd.exe PID 380 wrote to memory of 3180 380 client.exe cmd.exe PID 3924 wrote to memory of 896 3924 client.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\virus.exe"C:\Users\Admin\AppData\Local\Temp\virus.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier2⤵
-
C:\ProgramData\Babylon RAT\client.exe"C:\ProgramData\Babylon RAT\client.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\ProgramData\Babylon RAT\client.exe"C:\ProgramData\Babylon RAT\client.exe" 39243⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Babylon RAT\client.exeFilesize
315KB
MD50be23ddaec11bb1e64f2f54d4505cbcd
SHA124dce5a1b78c691f57d20de2afe00af2f88c1bb5
SHA25658d89ecd353406c747242574858134b6e37f1d49ab65b4fc48a1e822293bb22e
SHA5125252df7b7c170dcaff33f4e6dbdae1e3cc070f1b5cc1a628c49216d5fb2781fc5be78c4df78c19a47b81d06d78980f2ca0cca10a738994484ea4d0537fbeb879
-
C:\ProgramData\Babylon RAT\client.exeFilesize
315KB
MD50be23ddaec11bb1e64f2f54d4505cbcd
SHA124dce5a1b78c691f57d20de2afe00af2f88c1bb5
SHA25658d89ecd353406c747242574858134b6e37f1d49ab65b4fc48a1e822293bb22e
SHA5125252df7b7c170dcaff33f4e6dbdae1e3cc070f1b5cc1a628c49216d5fb2781fc5be78c4df78c19a47b81d06d78980f2ca0cca10a738994484ea4d0537fbeb879
-
C:\ProgramData\Babylon RAT\client.exeFilesize
315KB
MD50be23ddaec11bb1e64f2f54d4505cbcd
SHA124dce5a1b78c691f57d20de2afe00af2f88c1bb5
SHA25658d89ecd353406c747242574858134b6e37f1d49ab65b4fc48a1e822293bb22e
SHA5125252df7b7c170dcaff33f4e6dbdae1e3cc070f1b5cc1a628c49216d5fb2781fc5be78c4df78c19a47b81d06d78980f2ca0cca10a738994484ea4d0537fbeb879
-
memory/380-141-0x0000000000BE0000-0x0000000000C5E000-memory.dmpFilesize
504KB
-
memory/2264-138-0x0000000000E60000-0x0000000000EDE000-memory.dmpFilesize
504KB
-
memory/3924-150-0x00000000740F0000-0x0000000074129000-memory.dmpFilesize
228KB
-
memory/3924-156-0x00000000740F0000-0x0000000074129000-memory.dmpFilesize
228KB
-
memory/3924-143-0x0000000000BE0000-0x0000000000C5E000-memory.dmpFilesize
504KB
-
memory/3924-145-0x00000000740F0000-0x0000000074129000-memory.dmpFilesize
228KB
-
memory/3924-147-0x00000000740F0000-0x0000000074129000-memory.dmpFilesize
228KB
-
memory/3924-139-0x0000000000BE0000-0x0000000000C5E000-memory.dmpFilesize
504KB
-
memory/3924-153-0x00000000740F0000-0x0000000074129000-memory.dmpFilesize
228KB
-
memory/3924-142-0x0000000074120000-0x0000000074159000-memory.dmpFilesize
228KB
-
memory/3924-159-0x00000000740F0000-0x0000000074129000-memory.dmpFilesize
228KB
-
memory/3924-162-0x00000000740F0000-0x0000000074129000-memory.dmpFilesize
228KB
-
memory/3924-165-0x00000000740F0000-0x0000000074129000-memory.dmpFilesize
228KB
-
memory/3924-167-0x0000000074120000-0x0000000074159000-memory.dmpFilesize
228KB
-
memory/3924-169-0x00000000740F0000-0x0000000074129000-memory.dmpFilesize
228KB
-
memory/3924-171-0x00000000740F0000-0x0000000074129000-memory.dmpFilesize
228KB
-
memory/3924-174-0x00000000740F0000-0x0000000074129000-memory.dmpFilesize
228KB
-
memory/3924-177-0x00000000740F0000-0x0000000074129000-memory.dmpFilesize
228KB