Analysis
-
max time kernel
596s -
max time network
601s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 06:27
Behavioral task
behavioral1
Sample
virus.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
virus.exe
Resource
win10v2004-20230220-en
General
-
Target
virus.exe
-
Size
315KB
-
MD5
0be23ddaec11bb1e64f2f54d4505cbcd
-
SHA1
24dce5a1b78c691f57d20de2afe00af2f88c1bb5
-
SHA256
58d89ecd353406c747242574858134b6e37f1d49ab65b4fc48a1e822293bb22e
-
SHA512
5252df7b7c170dcaff33f4e6dbdae1e3cc070f1b5cc1a628c49216d5fb2781fc5be78c4df78c19a47b81d06d78980f2ca0cca10a738994484ea4d0537fbeb879
-
SSDEEP
6144:elNBW0lmEWfK8OZn05Wm6wFBDpomqTVg+e67YCkxLr3DI3NoAcs:ent8OZQBDDpsyfFr3Io
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
client.execlient.exepid process 4992 client.exe 2128 client.exe -
Processes:
resource yara_rule behavioral2/memory/4936-133-0x0000000000950000-0x00000000009CE000-memory.dmp upx C:\ProgramData\Babylon RAT\client.exe upx C:\ProgramData\Babylon RAT\client.exe upx behavioral2/memory/4936-139-0x0000000000950000-0x00000000009CE000-memory.dmp upx behavioral2/memory/4992-140-0x00000000002C0000-0x000000000033E000-memory.dmp upx C:\ProgramData\Babylon RAT\client.exe upx behavioral2/memory/2128-142-0x00000000002C0000-0x000000000033E000-memory.dmp upx behavioral2/memory/4992-144-0x00000000002C0000-0x000000000033E000-memory.dmp upx behavioral2/memory/4992-157-0x00000000002C0000-0x000000000033E000-memory.dmp upx behavioral2/memory/4992-159-0x00000000002C0000-0x000000000033E000-memory.dmp upx behavioral2/memory/4992-161-0x00000000002C0000-0x000000000033E000-memory.dmp upx behavioral2/memory/4992-163-0x00000000002C0000-0x000000000033E000-memory.dmp upx behavioral2/memory/1372-173-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/1372-175-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/1372-176-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/1372-180-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/1372-183-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4992-186-0x00000000002C0000-0x000000000033E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
virus.execlient.execlient.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce virus.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Babylon RAT = "C:\\ProgramData\\Babylon RAT\\client.exe" virus.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce client.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Babylon RAT = "C:\\ProgramData\\Babylon RAT\\client.exe" client.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce client.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Babylon RAT = "C:\\ProgramData\\Babylon RAT\\client.exe" client.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
client.exedescription pid process target process PID 4992 set thread context of 1372 4992 client.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
svchost.exepid process 1372 svchost.exe 1372 svchost.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
virus.execlient.execlient.exedescription pid process Token: SeShutdownPrivilege 4936 virus.exe Token: SeDebugPrivilege 4936 virus.exe Token: SeTcbPrivilege 4936 virus.exe Token: SeShutdownPrivilege 4992 client.exe Token: SeDebugPrivilege 4992 client.exe Token: SeTcbPrivilege 4992 client.exe Token: SeShutdownPrivilege 2128 client.exe Token: SeDebugPrivilege 2128 client.exe Token: SeTcbPrivilege 2128 client.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
client.exepid process 4992 client.exe 4992 client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
virus.execlient.execlient.exedescription pid process target process PID 4936 wrote to memory of 4964 4936 virus.exe cmd.exe PID 4936 wrote to memory of 4964 4936 virus.exe cmd.exe PID 4936 wrote to memory of 4964 4936 virus.exe cmd.exe PID 4936 wrote to memory of 4992 4936 virus.exe client.exe PID 4936 wrote to memory of 4992 4936 virus.exe client.exe PID 4936 wrote to memory of 4992 4936 virus.exe client.exe PID 4992 wrote to memory of 2104 4992 client.exe cmd.exe PID 4992 wrote to memory of 2104 4992 client.exe cmd.exe PID 4992 wrote to memory of 2104 4992 client.exe cmd.exe PID 4992 wrote to memory of 2128 4992 client.exe client.exe PID 4992 wrote to memory of 2128 4992 client.exe client.exe PID 4992 wrote to memory of 2128 4992 client.exe client.exe PID 4992 wrote to memory of 2896 4992 client.exe cmd.exe PID 4992 wrote to memory of 2896 4992 client.exe cmd.exe PID 4992 wrote to memory of 2896 4992 client.exe cmd.exe PID 2128 wrote to memory of 3424 2128 client.exe cmd.exe PID 2128 wrote to memory of 3424 2128 client.exe cmd.exe PID 2128 wrote to memory of 3424 2128 client.exe cmd.exe PID 2128 wrote to memory of 216 2128 client.exe cmd.exe PID 2128 wrote to memory of 216 2128 client.exe cmd.exe PID 2128 wrote to memory of 216 2128 client.exe cmd.exe PID 4992 wrote to memory of 3656 4992 client.exe cmd.exe PID 4992 wrote to memory of 3656 4992 client.exe cmd.exe PID 4992 wrote to memory of 3656 4992 client.exe cmd.exe PID 2128 wrote to memory of 3132 2128 client.exe cmd.exe PID 2128 wrote to memory of 3132 2128 client.exe cmd.exe PID 2128 wrote to memory of 3132 2128 client.exe cmd.exe PID 4992 wrote to memory of 4160 4992 client.exe cmd.exe PID 4992 wrote to memory of 4160 4992 client.exe cmd.exe PID 4992 wrote to memory of 4160 4992 client.exe cmd.exe PID 2128 wrote to memory of 4568 2128 client.exe cmd.exe PID 2128 wrote to memory of 4568 2128 client.exe cmd.exe PID 2128 wrote to memory of 4568 2128 client.exe cmd.exe PID 4992 wrote to memory of 1672 4992 client.exe cmd.exe PID 4992 wrote to memory of 1672 4992 client.exe cmd.exe PID 4992 wrote to memory of 1672 4992 client.exe cmd.exe PID 4992 wrote to memory of 4268 4992 client.exe cmd.exe PID 4992 wrote to memory of 4268 4992 client.exe cmd.exe PID 4992 wrote to memory of 4268 4992 client.exe cmd.exe PID 2128 wrote to memory of 4776 2128 client.exe cmd.exe PID 2128 wrote to memory of 4776 2128 client.exe cmd.exe PID 2128 wrote to memory of 4776 2128 client.exe cmd.exe PID 2128 wrote to memory of 3488 2128 client.exe cmd.exe PID 2128 wrote to memory of 3488 2128 client.exe cmd.exe PID 2128 wrote to memory of 3488 2128 client.exe cmd.exe PID 4992 wrote to memory of 5052 4992 client.exe cmd.exe PID 4992 wrote to memory of 5052 4992 client.exe cmd.exe PID 4992 wrote to memory of 5052 4992 client.exe cmd.exe PID 2128 wrote to memory of 4848 2128 client.exe cmd.exe PID 2128 wrote to memory of 4848 2128 client.exe cmd.exe PID 2128 wrote to memory of 4848 2128 client.exe cmd.exe PID 4992 wrote to memory of 3496 4992 client.exe cmd.exe PID 4992 wrote to memory of 3496 4992 client.exe cmd.exe PID 4992 wrote to memory of 3496 4992 client.exe cmd.exe PID 2128 wrote to memory of 4320 2128 client.exe cmd.exe PID 2128 wrote to memory of 4320 2128 client.exe cmd.exe PID 2128 wrote to memory of 4320 2128 client.exe cmd.exe PID 4992 wrote to memory of 3744 4992 client.exe cmd.exe PID 4992 wrote to memory of 3744 4992 client.exe cmd.exe PID 4992 wrote to memory of 3744 4992 client.exe cmd.exe PID 2128 wrote to memory of 620 2128 client.exe cmd.exe PID 2128 wrote to memory of 620 2128 client.exe cmd.exe PID 2128 wrote to memory of 620 2128 client.exe cmd.exe PID 4992 wrote to memory of 2792 4992 client.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\virus.exe"C:\Users\Admin\AppData\Local\Temp\virus.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier2⤵
-
C:\ProgramData\Babylon RAT\client.exe"C:\ProgramData\Babylon RAT\client.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\ProgramData\Babylon RAT\client.exe"C:\ProgramData\Babylon RAT\client.exe" 49923⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier4⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
\??\c:\Windows\SysWOW64\svchost.exec:\Windows\System32\svchost.exe /sxml ӈБӳӊӅ3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
-
C:\Windows\SysWOW64\cmd.exeecho [zoneTransfer]ZoneID = 2 > "C:\ProgramData\Babylon RAT\client.exe":ZONE.identifier3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Babylon RAT\client.exeFilesize
315KB
MD50be23ddaec11bb1e64f2f54d4505cbcd
SHA124dce5a1b78c691f57d20de2afe00af2f88c1bb5
SHA25658d89ecd353406c747242574858134b6e37f1d49ab65b4fc48a1e822293bb22e
SHA5125252df7b7c170dcaff33f4e6dbdae1e3cc070f1b5cc1a628c49216d5fb2781fc5be78c4df78c19a47b81d06d78980f2ca0cca10a738994484ea4d0537fbeb879
-
C:\ProgramData\Babylon RAT\client.exeFilesize
315KB
MD50be23ddaec11bb1e64f2f54d4505cbcd
SHA124dce5a1b78c691f57d20de2afe00af2f88c1bb5
SHA25658d89ecd353406c747242574858134b6e37f1d49ab65b4fc48a1e822293bb22e
SHA5125252df7b7c170dcaff33f4e6dbdae1e3cc070f1b5cc1a628c49216d5fb2781fc5be78c4df78c19a47b81d06d78980f2ca0cca10a738994484ea4d0537fbeb879
-
C:\ProgramData\Babylon RAT\client.exeFilesize
315KB
MD50be23ddaec11bb1e64f2f54d4505cbcd
SHA124dce5a1b78c691f57d20de2afe00af2f88c1bb5
SHA25658d89ecd353406c747242574858134b6e37f1d49ab65b4fc48a1e822293bb22e
SHA5125252df7b7c170dcaff33f4e6dbdae1e3cc070f1b5cc1a628c49216d5fb2781fc5be78c4df78c19a47b81d06d78980f2ca0cca10a738994484ea4d0537fbeb879
-
C:\Users\Admin\AppData\Local\Temp\ӈБӳӊӅFilesize
2KB
MD5f40fb07f65b9d2f5ea1302bfef66b0e1
SHA19e57421423e521349ba5955c17c462ea1fc1cf14
SHA25651d781ce6bc68190b7ae3cfec3d95d6a02e2a08863a8978ba134239528e506f4
SHA512f549f83872df239c4215415ec6bcb0e159eb0a84eb5b1889780bfe12804075a445291d97c1e1405278af691a8b330ab31942d353b65e4cad85aef66c06c10426
-
C:\Users\Admin\AppData\Local\Temp\ӈБӳӊӅFilesize
2KB
MD5f40fb07f65b9d2f5ea1302bfef66b0e1
SHA19e57421423e521349ba5955c17c462ea1fc1cf14
SHA25651d781ce6bc68190b7ae3cfec3d95d6a02e2a08863a8978ba134239528e506f4
SHA512f549f83872df239c4215415ec6bcb0e159eb0a84eb5b1889780bfe12804075a445291d97c1e1405278af691a8b330ab31942d353b65e4cad85aef66c06c10426
-
memory/1372-173-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/1372-175-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/1372-183-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/1372-176-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/1372-180-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/2128-142-0x00000000002C0000-0x000000000033E000-memory.dmpFilesize
504KB
-
memory/4936-133-0x0000000000950000-0x00000000009CE000-memory.dmpFilesize
504KB
-
memory/4936-139-0x0000000000950000-0x00000000009CE000-memory.dmpFilesize
504KB
-
memory/4992-222-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-239-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-159-0x00000000002C0000-0x000000000033E000-memory.dmpFilesize
504KB
-
memory/4992-161-0x00000000002C0000-0x000000000033E000-memory.dmpFilesize
504KB
-
memory/4992-151-0x0000000074620000-0x0000000074659000-memory.dmpFilesize
228KB
-
memory/4992-148-0x0000000074620000-0x0000000074659000-memory.dmpFilesize
228KB
-
memory/4992-145-0x0000000074620000-0x0000000074659000-memory.dmpFilesize
228KB
-
memory/4992-144-0x00000000002C0000-0x000000000033E000-memory.dmpFilesize
504KB
-
memory/4992-143-0x0000000074620000-0x0000000074659000-memory.dmpFilesize
228KB
-
memory/4992-163-0x00000000002C0000-0x000000000033E000-memory.dmpFilesize
504KB
-
memory/4992-169-0x0000000074620000-0x0000000074659000-memory.dmpFilesize
228KB
-
memory/4992-186-0x00000000002C0000-0x000000000033E000-memory.dmpFilesize
504KB
-
memory/4992-190-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-193-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-196-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-199-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-201-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-204-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-207-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-210-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-213-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-216-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-219-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-140-0x00000000002C0000-0x000000000033E000-memory.dmpFilesize
504KB
-
memory/4992-225-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-227-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-230-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-233-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-236-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-157-0x00000000002C0000-0x000000000033E000-memory.dmpFilesize
504KB
-
memory/4992-242-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-245-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-247-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-250-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-253-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-256-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-259-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-262-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-265-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-268-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-271-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-273-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-276-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-279-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-282-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-285-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-288-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-291-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-294-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-296-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-302-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-305-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-308-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-309-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-312-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-315-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-318-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-320-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB
-
memory/4992-324-0x0000000074610000-0x0000000074649000-memory.dmpFilesize
228KB
-
memory/4992-326-0x0000000074640000-0x0000000074679000-memory.dmpFilesize
228KB