Overview
overview
10Static
static
1DriverDiag...ol.exe
windows7-x64
10DriverDiag...ol.exe
windows10-2004-x64
10KENAPA_UMN...AN.lnk
windows7-x64
10KENAPA_UMN...AN.lnk
windows10-2004-x64
10KENAPA_UMN...AN.pdf
windows7-x64
1KENAPA_UMN...AN.pdf
windows10-2004-x64
1KENAPA_UMN...AN.ps1
windows7-x64
10KENAPA_UMN...AN.ps1
windows10-2004-x64
10Analysis
-
max time kernel
139s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2023 09:33
Static task
static1
Behavioral task
behavioral1
Sample
DriverDiagnoseTool.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
DriverDiagnoseTool.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
KENAPA_UMNO_BERSAMA_KERAJAAN_PERPADUAN.lnk
Resource
win7-20230703-en
Behavioral task
behavioral4
Sample
KENAPA_UMNO_BERSAMA_KERAJAAN_PERPADUAN.lnk
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
KENAPA_UMNO_BERSAMA_KERAJAAN_PERPADUAN.pdf
Resource
win7-20230703-en
Behavioral task
behavioral6
Sample
KENAPA_UMNO_BERSAMA_KERAJAAN_PERPADUAN.pdf
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
KENAPA_UMNO_BERSAMA_KERAJAAN_PERPADUAN.ps1
Resource
win7-20230703-en
Behavioral task
behavioral8
Sample
KENAPA_UMNO_BERSAMA_KERAJAAN_PERPADUAN.ps1
Resource
win10v2004-20230703-en
General
-
Target
DriverDiagnoseTool.exe
-
Size
300.9MB
-
MD5
d70de5a533c758bcba7ff16d204cdbe6
-
SHA1
38d9f39f8c3699c04c4e4ba3e33afbed745e3e8f
-
SHA256
40d348783300d039d969f27a22433a8cba8d31c28e2e8d542c10a5792d34c1d3
-
SHA512
a9355532ad9310a61f1b07926a64d48669ebf3e15e45c18a28a7b16c3e94d66037752d45b36e26c2dbb247b2d9fdcedc18f00fb4229daece372f44af418c07f1
-
SSDEEP
6291456:vz2C0PyE4M6Q1nYOCNxklwFy3kMj/2Lk6T8yV3hVJC45EHbzwIgjx:KC0PyE4M6Q1bMxTFy3r7d6T8y72HZk
Malware Config
Extracted
babylonrat
149.28.19.207
Signatures
-
Babylon RAT
Babylon RAT is remote access trojan written in C++.
-
resource yara_rule behavioral2/memory/1316-133-0x0000000001500000-0x00000000015CA000-memory.dmp upx behavioral2/memory/1316-134-0x0000000001500000-0x00000000015CA000-memory.dmp upx behavioral2/memory/1316-135-0x0000000001500000-0x00000000015CA000-memory.dmp upx behavioral2/memory/1316-136-0x0000000001500000-0x00000000015CA000-memory.dmp upx behavioral2/memory/1316-137-0x0000000001500000-0x00000000015CA000-memory.dmp upx behavioral2/memory/1316-139-0x0000000001500000-0x00000000015CA000-memory.dmp upx behavioral2/memory/1316-140-0x0000000001500000-0x00000000015CA000-memory.dmp upx behavioral2/memory/1316-141-0x0000000001500000-0x00000000015CA000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1316 DriverDiagnoseTool.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 1316 DriverDiagnoseTool.exe Token: SeDebugPrivilege 1316 DriverDiagnoseTool.exe Token: SeTcbPrivilege 1316 DriverDiagnoseTool.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1316 DriverDiagnoseTool.exe