Analysis
-
max time kernel
156s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 03:53
Static task
static1
Behavioral task
behavioral1
Sample
0d8cae7fa55a7e095e11fbb9aa4350f7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0d8cae7fa55a7e095e11fbb9aa4350f7.exe
Resource
win10v2004-20231215-en
General
-
Target
0d8cae7fa55a7e095e11fbb9aa4350f7.exe
-
Size
791KB
-
MD5
0d8cae7fa55a7e095e11fbb9aa4350f7
-
SHA1
f0f9bd8f9110fbb06a51f4a987b1444bb96bb6a9
-
SHA256
2bdcbd54ec387b521cdd9e14777d7d24794ba6bb71c85a0402eb2bd8ba8696f0
-
SHA512
1d3da3b90042c7fb1ea2d09741a3f7b69835f5f8a885ddd3ad3d2819f80ed82397d8002d273f26685712183b3c08fb875a7d39a1d60c0e6bb0c89ce2f3033ce4
-
SSDEEP
12288:w0YDrHInYYiaqIH7jc4vfBZj2of9zqHh882KqXRRxFgMzxks+gvJFbWVzK7ISFj:wfjWYcbEc5R2oFWB88F2sKtJwVzK7I
Malware Config
Signatures
-
Babylon RAT
Babylon RAT is remote access trojan written in C++.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe" winlogon.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 0d8cae7fa55a7e095e11fbb9aa4350f7.exe -
Executes dropped EXE 1 IoCs
pid Process 1876 winlogon.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1876 set thread context of 4424 1876 winlogon.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4292 0d8cae7fa55a7e095e11fbb9aa4350f7.exe Token: SeDebugPrivilege 1876 winlogon.exe Token: SeShutdownPrivilege 4424 vbc.exe Token: SeDebugPrivilege 4424 vbc.exe Token: SeTcbPrivilege 4424 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4424 vbc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4292 wrote to memory of 1876 4292 0d8cae7fa55a7e095e11fbb9aa4350f7.exe 103 PID 4292 wrote to memory of 1876 4292 0d8cae7fa55a7e095e11fbb9aa4350f7.exe 103 PID 4292 wrote to memory of 1876 4292 0d8cae7fa55a7e095e11fbb9aa4350f7.exe 103 PID 1876 wrote to memory of 4424 1876 winlogon.exe 104 PID 1876 wrote to memory of 4424 1876 winlogon.exe 104 PID 1876 wrote to memory of 4424 1876 winlogon.exe 104 PID 1876 wrote to memory of 4424 1876 winlogon.exe 104 PID 1876 wrote to memory of 4424 1876 winlogon.exe 104 PID 1876 wrote to memory of 4424 1876 winlogon.exe 104 PID 1876 wrote to memory of 4424 1876 winlogon.exe 104 PID 1876 wrote to memory of 4424 1876 winlogon.exe 104 PID 1876 wrote to memory of 4424 1876 winlogon.exe 104 PID 1876 wrote to memory of 4424 1876 winlogon.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d8cae7fa55a7e095e11fbb9aa4350f7.exe"C:\Users\Admin\AppData\Local\Temp\0d8cae7fa55a7e095e11fbb9aa4350f7.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Roaming\winlogon.exe"C:\Users\Admin\AppData\Roaming\winlogon.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4424
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
791KB
MD50d8cae7fa55a7e095e11fbb9aa4350f7
SHA1f0f9bd8f9110fbb06a51f4a987b1444bb96bb6a9
SHA2562bdcbd54ec387b521cdd9e14777d7d24794ba6bb71c85a0402eb2bd8ba8696f0
SHA5121d3da3b90042c7fb1ea2d09741a3f7b69835f5f8a885ddd3ad3d2819f80ed82397d8002d273f26685712183b3c08fb875a7d39a1d60c0e6bb0c89ce2f3033ce4
-
Filesize
512KB
MD55be131c35ca35a69af37518b692fb5c2
SHA18f691dcc7889b9c2871a34f48744abf146700554
SHA256cdeb1b619417bb77e022552e1356b3b32efe836566266fdb50882f31544c063b
SHA51223a66cd940d7fdc84fa0a125cea16683b0a630f2e205a15565d58e282712ea903af865492ec54e2f969552b7a3f915423a1a41a805e4b70a4f9ffee3184a58ff