Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 23:39

General

  • Target

    1a3d5d5741d2246c11e4408bd44b0c88.exe

  • Size

    2.4MB

  • MD5

    1a3d5d5741d2246c11e4408bd44b0c88

  • SHA1

    6b5b2972f29370aa6f04514f38759c847df7b721

  • SHA256

    56b5f06c9a2b7af8d7bcfea532fae079ba998b8a6438773e6992651d92bf23e2

  • SHA512

    481f9ef8f91a758e5f7a72fca404cabe8ae20795dc8d5c6f82dfccf071658fa964e513ac3b46392eba2db4ea96ec06dddf4ed77c5d45fd20e17b4630be6b56af

  • SSDEEP

    49152:p6KbRx0jGIxqd0qW9BT2H6zslW559lR1pr/PLrBqx/LUz3z:p6d7v0W5lR1x3v0/Iz3

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a3d5d5741d2246c11e4408bd44b0c88.exe
    "C:\Users\Admin\AppData\Local\Temp\1a3d5d5741d2246c11e4408bd44b0c88.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3864
    • C:\Users\Admin\AppData\Roaming\WinPump\extensions.exe
      C:\Users\Admin\AppData\Roaming\WinPump\extensions.exe /aff=901 /saff=1318 /affilID=36
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3744
      • C:\Users\Admin\AppData\Local\Temp\BABYLON.exe
        "C:\Users\Admin\AppData\Local\Temp\BABYLON.exe" -affilID=18836 -s
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4108
        • C:\Users\Admin\AppData\Local\Temp\{B6C8F9B3-BAB0-7891-A6F5-FD362E988BAE}\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\{B6C8F9B3-BAB0-7891-A6F5-FD362E988BAE}\Setup.exe" -affilID=18836 -s
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          • Modifies Internet Explorer settings
          • Modifies Internet Explorer start page
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2088
    • C:\Users\Admin\AppData\Roaming\WinPump\WinPump.exe
      "C:\Users\Admin\AppData\Roaming\WinPump\WinPump.exe" ""
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Users\Admin\AppData\Roaming\WinPump\pumpa.exe
        "C:\Users\Admin\AppData\Roaming\WinPump\pumpa.exe"
        3⤵
        • Executes dropped EXE
        PID:1924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Babylon\Setup\Setup.exe

    Filesize

    46KB

    MD5

    af537180fcb1b8942a1fe2463caecbe1

    SHA1

    804193ee993e8304194f6dce19b17da4ac24cfc3

    SHA256

    0ed414c6bfde7b39b88d299063464dbc9b47cd36471610436552289b6f4ab4e6

    SHA512

    769f12fbe8c3021dada5ab552838dd39474a964a3e999dcb7c9442834e940492ab239fdf99bd9c07a82991e90d8b5503c9fb04acd618984aef2d51b3c2464ac1

  • C:\Users\Admin\AppData\Local\Babylon\Setup\Setup2-9.0.2.2.zpb

    Filesize

    3KB

    MD5

    5e6230b3b16798e23720958756ac6d9e

    SHA1

    c7bcb001c48a67d4c9d6e70e92473ebd85b30585

    SHA256

    d49ec47f5d27a09a17e00a6eb78f49a761c9f5881ec81fb07cc49fd0a5f287b2

    SHA512

    6b1c132f0e4fc2ca6b5e8d807671c586d84e044e4db8380682fd4d071160177c0f7e7a6afae3ee74a4fbd5c65aca0c0876948f5a42deafdbb685c5b7989b5aae

  • C:\Users\Admin\AppData\Local\Temp\BABYLON.exe

    Filesize

    31KB

    MD5

    9b3cc3b7ddf59423fe36f4837851922b

    SHA1

    57f5b8f2def254c79fa9b42a98383edef436aabf

    SHA256

    a3b907536cf20290463906b16cf733f210411ecd2c1ff669b37dc4677c5dc297

    SHA512

    df103aa39ab7a69a8f56c26687519574f93d73a6ec7310faea86732fde8672d41383cddb15b917c73dc629371eb15810e91ad5f0ad6b140698bde1506819ee2b

  • C:\Users\Admin\AppData\Local\Temp\BABYLON.exe

    Filesize

    8KB

    MD5

    6a27bf497eb5866cffd830b2e96fb6e3

    SHA1

    ecffae109315fa369124aca89bb3f06aa5641cc4

    SHA256

    abece4cefcd05ace8c7c259d4ad02b6fb0c3fd73b2e71b15ca7bc6069720f865

    SHA512

    7224e4882e4493d46584a035a5c9e7096e5fa02564f2082b4faa486501a5dfd5d01b2bbd0c142452bf86bff9b4d21f835f959f0a47d20c352bcdcb21eb597ccf

  • C:\Users\Admin\AppData\Local\Temp\BABYLON.exe

    Filesize

    3KB

    MD5

    a27604c227594fe55d675ee8b33b24b4

    SHA1

    2dcd17dad62487b90635e4b2777a59e7da46c3cd

    SHA256

    18aeea6f08694af5244b2e6f2ee5d9971a8082b285439e38eb2ba3f2b9ec8eba

    SHA512

    dc611b2789b6b6694271e08750f4ebc037ad3ac9784f17a33c180f27fdb800d650a0b6fa5e062b9521c799f7d316619f704aa51da15db5306f9fdf14193b5336

  • C:\Users\Admin\AppData\Local\Temp\{B6C8F9B3-BAB0-7891-A6F5-FD362E988BAE}\BException.dll

    Filesize

    92KB

    MD5

    d74d045d60c447d10238976c12419ee6

    SHA1

    aa145b66b5dc4db16835ee9a50817ff0f6052507

    SHA256

    53e6ad2228c7484edac83f120c21eed064b7112c82cb7f3f93bf7626a5aee3cf

    SHA512

    51e7aba40dbc184a52d776c578403b5d26aceb5a6bf1829846f53e0ab6e97cc7c82776391698ba231cc1666d7a033f6008f3b0a7b5a5044731e8c4fe81250447

  • C:\Users\Admin\AppData\Local\Temp\{B6C8F9B3-BAB0-7891-A6F5-FD362E988BAE}\BException.dll

    Filesize

    73KB

    MD5

    ac3e0db52a3d8308708b1b52fc53fefd

    SHA1

    dcf0691fc8e75036cd9a233d57bda86c1a30b943

    SHA256

    650497d7f34291a75da005014179db3fca5d4c569d2fb49acdd9f4618f52b098

    SHA512

    76041348d439ce92e1f8a9efd73418c93df065d069924aebfb375ef83e388c2fbf6196f757c8b19131f4bc5703fac7b7840eb04d3b1551525b2bbb08dcc6088c

  • C:\Users\Admin\AppData\Local\Temp\{B6C8F9B3-BAB0-7891-A6F5-FD362E988BAE}\BabyServices.DLL

    Filesize

    131KB

    MD5

    0eb3938d85071e9873bd5dba018f2a60

    SHA1

    155282c430490d4fdfc9662cf3519436db575982

    SHA256

    72608c77e4813884bf52ce8330dac544e847bc47e9209e3fe0ecfafd8ee798a4

    SHA512

    8fcc74a483e5f369a5f753661a267472960883f301c3115d1cda51973323819750b717c6df8943966506df15d809fb19964ac5a350f1017f9c710777c01d579e

  • C:\Users\Admin\AppData\Local\Temp\{B6C8F9B3-BAB0-7891-A6F5-FD362E988BAE}\BabyServices.dll

    Filesize

    127KB

    MD5

    e7b643efa27d0a6acebade517294732c

    SHA1

    9cecb4d2f2ec5031fbfb3394133bb71b55a26607

    SHA256

    d471450cf765c735e08e37988fba7d21e641060b7a4c8ddf1bdf87bd29b099d1

    SHA512

    95235e13f2240beed6de9ee324864cfe51855d64a372af7b91c9d1f9675229bf4f01e02540dc39f912adba3ea18de5d797cf4f4dd7b8bc7dcd8612eedff92851

  • C:\Users\Admin\AppData\Local\Temp\{B6C8F9B3-BAB0-7891-A6F5-FD362E988BAE}\BabyServices.dll

    Filesize

    78KB

    MD5

    eec98c239675f4a070505c98ae98f766

    SHA1

    44c07a72e0d6ec4e004375ec7599f4db4090faeb

    SHA256

    ae0b1eda9edcac4d7b37c4affb2f146c1931a1e13d121883e7c51f74132e657d

    SHA512

    dd0e6296208c29e57f5539a86a12bd59627dc568ff3c2c2b1fd7418a79efde6b22f001d9ce8d96c9c1916377d1dcc94c0ac6df52fdb6f76a923760b4773068d0

  • C:\Users\Admin\AppData\Local\Temp\{B6C8F9B3-BAB0-7891-A6F5-FD362E988BAE}\Babylon.dat

    Filesize

    10KB

    MD5

    55d46ea4db2b02f1efe85a39813aad8b

    SHA1

    0715de98f95a4d02efaa627759d3aebca0a71234

    SHA256

    fe42637b0157aed3e4d129280e74bbecfd05336f28ba8d036bd61e48242051ae

    SHA512

    5b53926c7fa8a0cc581a3dcae0e6d7e052729aecef1f673c7750166409b51eb530da1e2d7b5d98632dad6c254f7096470bdfe88198a944f57637ce924112d106

  • C:\Users\Admin\AppData\Local\Temp\{B6C8F9B3-BAB0-7891-A6F5-FD362E988BAE}\EULA.rtf

    Filesize

    108KB

    MD5

    aa8b1a869fb07cb59671a1a65888683c

    SHA1

    e846c2c65b5ef72610f47631057bba7664ea7c3e

    SHA256

    c75359ec25cbc8c531ffbdf76c5ee9c90c7620a62e63d6fb1de9a96dbd8d860b

    SHA512

    055eedcc67c7e87872da49402b941f0589dbd53abeb248a9133d818e16a311faf3e7bb34000dd6c2e0ef4db91f650cfefe077dde39e7b9a9064396e3712f09bf

  • C:\Users\Admin\AppData\Local\Temp\{B6C8F9B3-BAB0-7891-A6F5-FD362E988BAE}\Setup.exe

    Filesize

    48KB

    MD5

    86879c84ee35d8b09fb8bd2cc60bcdc1

    SHA1

    a64023dc68c8d1195018c2b7bcb8428a6015a34e

    SHA256

    393a2c83f6a4c99a6fbca5e8ed045d8cfb5469a5dda6cc3482e1d595825dcfb9

    SHA512

    28f76d906096faf2dc1b913eddb3bf94ead70a2c9254a0a574b28acb174ef0da5946acfca1fc1ac4fa3569cbb36a9804e06a6c7f84dcbe701c91b0db81fb4a39

  • C:\Users\Admin\AppData\Local\Temp\{B6C8F9B3-BAB0-7891-A6F5-FD362E988BAE}\Setup.exe

    Filesize

    101KB

    MD5

    98c96f608da5f33751f692d152ee2c9c

    SHA1

    7c5921f319c8483885df6d59648c5ad4b3b186f3

    SHA256

    e02027c83f47a259a00ef3d03a58036f3dcb76e118b09046fb89c02678fdf004

    SHA512

    2ae0a3e8fb16641609e76e207ed9196c9a7ed45d11d5579e0099c73787ddcd050e2ffa1eba926114acb0d0847f7b18088ffd898f240d9ec34e72f428a1b22768

  • C:\Users\Admin\AppData\Local\Temp\{B6C8F9B3-BAB0-7891-A6F5-FD362E988BAE}\SetupStrings.dat

    Filesize

    49KB

    MD5

    e502e1bbc4e2d7e0433981f1b0b6f19b

    SHA1

    08e4cc3759f23ad2f4c221047aa31cd15f32da45

    SHA256

    01ff567bba66f5cdf20c5c6d357bcde1a8be73d6b207cf3d2fb194f77f0c2c83

    SHA512

    872b472d81b3720a14b004d73209ee7a4f150c017a83af65e50d2af13f89d66246db01d2eeda76e55cc43606829c443738a997b4735c8478b0a9c56a0bd915e6

  • C:\Users\Admin\AppData\Local\Temp\{B6C8F9B3-BAB0-7891-A6F5-FD362E988BAE}\bab025.cbid20.dat

    Filesize

    189B

    MD5

    31b0a6106458ffd1646b92282af8c742

    SHA1

    0ff54058a685435264b74e94dc497a434ab41237

    SHA256

    6871f6258fccc0a9fff017c92bb82af9f293ced44b93a7eece34acd8eb884278

    SHA512

    76d7b2a05917ed32d50c392e541397b2f8bedec5c849b0953ab35d5bd3d9287abcb78b8c176ea1a4b981f791687e1e1104efcaad7b9a3bb647494487f4ae7905

  • C:\Users\Admin\AppData\Local\Temp\{B6C8F9B3-BAB0-7891-A6F5-FD362E988BAE}\bab027.Ttype060411_def.dat

    Filesize

    200B

    MD5

    b72f738ba66d4c371c4f5b25a5f25503

    SHA1

    05a9bb2ba88edf6f6260d3cab54a42d5a6bcdcdc

    SHA256

    ea2304b496b98ef6f458318a29b1596991579e61c1695d2c98351d5849343a67

    SHA512

    62b43a890f285e69aa6e214fc2fc5e124a2192b0d5e61f569261c424d1fef755d7db5aa311c473ab76aa03c703b8937dcca8a03780daf8a959e6246bb79e51b8

  • C:\Users\Admin\AppData\Local\Temp\{B6C8F9B3-BAB0-7891-A6F5-FD362E988BAE}\bab065.engset.dat

    Filesize

    192B

    MD5

    9d291922f477f4ab11c5a3d96def52d3

    SHA1

    625cf2c2898bdd75d7f4c3c078d964d69accde0f

    SHA256

    d0a32dc13f8763a15caea1ceb7ed0737ee0c3c5f055d9f552717548dc9bdca40

    SHA512

    897501bc61988c7f62b745f70018e5236dec3d702a09ff12fc76096b82321fb2add08d4f482ea89e2b9003a2792d4477dba40b2ce090bb29458f71fce78880ce

  • C:\Users\Admin\AppData\Local\Temp\{B6C8F9B3-BAB0-7891-A6F5-FD362E988BAE}\bab267.mntra-tb.dat

    Filesize

    443B

    MD5

    a4d79e56d805465ac8a3644c6db6a764

    SHA1

    290bcd94a932d6800c3e8631e8c2c2253b8016db

    SHA256

    ac1952944dd876ea4e383b38bbd1c6e847455744c3cafd139f4a4b91125d4f49

    SHA512

    06a9dce0923e18e32f7b1ea41a39b58dcddccc9911644ebcd906fd97316a6628436bb54d7abcba02edc1dde4788c0aaad49d3aa3b0a9822781a9412c7b67be72

  • C:\Users\Admin\AppData\Roaming\WinPump\WinPump.exe

    Filesize

    50KB

    MD5

    aec2b27c492b480b430e1f874be2f433

    SHA1

    2ca58643fd0c4e12dabdcaa92e9eab50b904de2b

    SHA256

    fff76c7555cb639188971506f65fb0d3fcc3d8e25e496267fc3f6ae586147b18

    SHA512

    e7586384d87601c2e6076c237236d70c28312ee182791d9ab92f1ac5ba6971eeb79ce2b8a895516f3e8e6157e08151cfc457637c31ad8815123f588cc4186cc5

  • C:\Users\Admin\AppData\Roaming\WinPump\WinPump.exe

    Filesize

    40KB

    MD5

    d31bec51bde60c8243d912e00fd0d18b

    SHA1

    74ac6000964a1b2a2d30c3dab0ccfa6e8fdbacd5

    SHA256

    d2de560a98ab8cd7b72fea2a39d6f3ae427d35ca2feef2ddf95507c77c00331a

    SHA512

    41150f5090438829710f52920c816df89fd403a3f46ab5e161c5d240f05b7a8bf786f0258df7683e0672a165fd2d62bf350f393bb8612c323d9917faeb3c57ce

  • C:\Users\Admin\AppData\Roaming\WinPump\extensions.exe

    Filesize

    68KB

    MD5

    143fe50b09d03cc70bf79c944eded93e

    SHA1

    28ae3b991e6d94131380615ef0a5ba23ad797c18

    SHA256

    0b786af33938ca15863b98b19ad16ad60e3d4794aa777cdd7c05af4859644d87

    SHA512

    60f419683226ccf25f4e5dfd892708984d6beaebe6ee42b863456e125a70879558bf6b21dd7d6ff4fa1ccb219997a682dd5181a288a2ff8f0c61f479d994332f

  • C:\Users\Admin\AppData\Roaming\WinPump\extensions.exe

    Filesize

    40KB

    MD5

    eeba704b65c2f1b991ca454c0b9ba056

    SHA1

    e008585bb09d38979c987c66c27f9b4985d55ae8

    SHA256

    649b6cdf261339d697fb417cb34c7a66b46749c38d2284dadc3a5a274064a240

    SHA512

    3ddb03cfbac15b8f53e1f5c7c829bf6fd33a745f75c6dea69556b2945ce3b9ca4f5a8da287effa01561bc2848c6c53c861f2a60543ca1481f2387d909dc794f6

  • C:\Users\Admin\AppData\Roaming\WinPump\pumpa.exe

    Filesize

    104KB

    MD5

    11d17e7c5e531b6fa16f5b4062a0983b

    SHA1

    5804502bb8e20d0667123a8e9ec54429b9e23a8a

    SHA256

    1dc66b7cff1a01a22bc9640fec38baf848e2d873c848497291b77fbf7080c86a

    SHA512

    99d18bbdeb362f095cd49c4bae9602930b3567e7ebf5246c6493be8079c5ebba6e0ea046fa7758a490908fcef41f3ed9e0b542d7bc2f501bde16da7f5caa81c7

  • C:\Users\Admin\AppData\Roaming\WinPump\pumpa.exe

    Filesize

    107KB

    MD5

    af5333eb55677cc7536fb862a5ee9da5

    SHA1

    59012773719e5fb1698fe7fd9e59e69ca00e3690

    SHA256

    2765787f0ff3d3d9c5649423cb3e8c1d2419afda581fadcc578c317d53fc7f70

    SHA512

    49a08cbec8968e313ac5c81cd8da20ed5efe87f440b50d10ba31ed1ac273eb6f5592a1813cf868105e022abea7782bb5dcce3c81c47803c66df63a538c18f897

  • memory/1536-14-0x0000000002370000-0x0000000002371000-memory.dmp

    Filesize

    4KB

  • memory/1536-89-0x0000000000400000-0x000000000056A000-memory.dmp

    Filesize

    1.4MB

  • memory/1536-92-0x0000000002370000-0x0000000002371000-memory.dmp

    Filesize

    4KB

  • memory/2088-43-0x00000000023B0000-0x00000000024BE000-memory.dmp

    Filesize

    1.1MB

  • memory/3744-88-0x0000000000400000-0x000000000058C000-memory.dmp

    Filesize

    1.5MB

  • memory/3744-102-0x0000000000400000-0x000000000058C000-memory.dmp

    Filesize

    1.5MB