Analysis

  • max time kernel
    164s
  • max time network
    205s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06-03-2024 00:38

General

  • Target

    Badlion Client.exe

  • Size

    134.1MB

  • MD5

    bf90ab00ffa52c6e5a9acd7f38bd1313

  • SHA1

    c073d0047b5bc37d16add60da739b28bdcffd7da

  • SHA256

    de989473039d37c45d0fb39d3bfaf15a08833c91bc53918bafafc0b7aef459d6

  • SHA512

    d42d1cd5618b9b06a96d127d48867a9056994cb571acd63f16f1e9904aa9bdabbd53e5c915351d4c65518491918e2b09f428280d796ab9aff850f31fd9bc429c

  • SSDEEP

    1572864:myhU9i4Qmh8AxfjKhRh+10tb8lc6i/R60:xEjV0D/w0

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies registry class 9 IoCs
  • Modifies system certificate store 2 TTPs 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe
    "C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks computer location settings
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe" --type=gpu-process --field-trial-handle=1992,15964383347258061378,8211432727627943224,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --disable-gpu-sandbox --user-data-dir="C:\Users\Admin\AppData\Roaming\Badlion Client" --gpu-preferences=UAAAAAAAAADgAAAIAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:2
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2772
    • C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1992,15964383347258061378,8211432727627943224,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Badlion Client" --mojo-platform-channel-handle=2100 /prefetch:8
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1692
    • C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Badlion Client" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --autoplay-policy=no-user-gesture-required --field-trial-handle=1992,15964383347258061378,8211432727627943224,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2224 /prefetch:1
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      PID:2260
    • C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Badlion Client" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --autoplay-policy=no-user-gesture-required --field-trial-handle=1992,15964383347258061378,8211432727627943224,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2372 /prefetch:1
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      PID:332
    • C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe" --type=gpu-process --field-trial-handle=1992,15964383347258061378,8211432727627943224,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --disable-gpu-sandbox --user-data-dir="C:\Users\Admin\AppData\Roaming\Badlion Client" --gpu-preferences=UAAAAAAAAADgAAAIAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2000 /prefetch:2
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2864
    • C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1992,15964383347258061378,8211432727627943224,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=audio --user-data-dir="C:\Users\Admin\AppData\Roaming\Badlion Client" --mojo-platform-channel-handle=2732 /prefetch:8
      2⤵
        PID:616
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x55c
      1⤵
        PID:1400

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

        Filesize

        1KB

        MD5

        55540a230bdab55187a841cfe1aa1545

        SHA1

        363e4734f757bdeb89868efe94907774a327695e

        SHA256

        d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

        SHA512

        c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        67KB

        MD5

        753df6889fd7410a2e9fe333da83a429

        SHA1

        3c425f16e8267186061dd48ac1c77c122962456e

        SHA256

        b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

        SHA512

        9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

        Filesize

        230B

        MD5

        8d6477f87f9a68f7fdfd2acaa4ad95b4

        SHA1

        bd0d5a757e24ddaaf94beaaf7d96d4dbb92dffd3

        SHA256

        bf8b367093420447272eb7e11702cd468e90c072be28dba1d5a8a70fc31e4d92

        SHA512

        f1ee2f7736a03c3a014fea2b5bcf9e5da61baa8a15ba10fac71ba1d41b2bd20940ab17cb5af0d3eb58b48ad86516855e6186d5eeac4a9759a15aaa8f182b1c61

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        3dc8e97d9419128fde14d7e7978ea869

        SHA1

        e05154687dc94eefa49633f85366cc183f3300a8

        SHA256

        eea2b5b6240a5f7a9a38062aa9c5f4dd09eca869dfe2770558b4d43ddb0d220e

        SHA512

        8e909c00b25426679f368339da49d0b08960aa1444aba1067da3038ad6142ae0bd05847384c5340a64b0b74db8bcec798fbb727c00f8e9745edccafd73b9029a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        89f78b5f0b4b935a37efde683a9effcb

        SHA1

        ba9ac4901a84531bf75017e0283c25ce52444741

        SHA256

        7216ddb368760025b288dda3212b9973cec8db50e14cd0b3ba5cc72a65383b22

        SHA512

        4e53350ff517cd7f516f4167e362d8bd1916933e05f8932a48d8c6f55bad935342c1017728b35885a7c55d3b600c9a036143ff76fa27fe7fa25d4676d1bf6fae

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        b10c316f3e0b7f6f6d4739a734020bb9

        SHA1

        e69559f9eb3986cc3ae4bfa40c980cb123752956

        SHA256

        d39053af86e59bfb6ba8b09e805692ade010a7b2304cfa974244f5582dfabe21

        SHA512

        f6000ee499f697b0caff8b885ef063688a08fd7debd2e7bcd6e578adb9ef3c592aea69428344ba31284dfc96843e1d6364ea873b640873762418a7c3565ece5e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        21a977040ed29d36178924ab4929a7d5

        SHA1

        2e216d37a41051af5907e734eeb9337e60b14a46

        SHA256

        3d53e8c02a76a636d95224f6df628bd068279eca06801a8865d40898ecbb557d

        SHA512

        70da59497109465d5021ebea5faf39fce28598dbe1575d9a58c1cc248691233d2fad6d9190802db946fa1e9e5cbdde5d7e70674637f41f75b57720e20a1a71d6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        37af95769cade8357da3ef32d0eddf18

        SHA1

        281b8805289d00f187e6349c18c6912efe630e90

        SHA256

        cbf2d22d3fdb49201e70c437f1229db01841ffdc07e64f0f4f5c35c59182ebfb

        SHA512

        297b55fe6e7a82c423768f9cf825f3aca28d49d2a2ba218e3342065b0f7d9571c12f56f423c24df63d4879de87f80651de6d3160806204978d045aa46f45ea4f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        ae9a85d7ed187f4cc5f2c589b5012ec9

        SHA1

        8e669a496c8a4c28d5be1da2be43a459488c0dfd

        SHA256

        f2c12cefddcac4632e39c4541f67e2c91a2143d1496aa4a8f43b78ddc9fa0877

        SHA512

        68fdd215213b6523c2f650545a52934a38b1a91d7d7c2e43e1d4ab86142a02458a6de618daea8fbe180926b9aaf322c9248e0c545aa44f2f9fc912f7b3d758a7

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        423140335be0d9f1305c58a8b2b513f9

        SHA1

        b71ce9a8aefc236254cdf8477f87fb004a82d1fb

        SHA256

        649daa24a04e06450ecf96367886d57e4bb78e0ab5b8b536fca8e883b182fe21

        SHA512

        18fc9960eb9fd43d47510297d84326c3ad25b1e64a32ddf330945ca8bdff0b96fc284838eca657a991a82c6a833ffed0bd31b165efbafe3b01c89b7093a8cdc2

      • C:\Users\Admin\AppData\Local\Temp\CabA5F.tmp

        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\Tar12F9.tmp

        Filesize

        171KB

        MD5

        9c0c641c06238516f27941aa1166d427

        SHA1

        64cd549fb8cf014fcd9312aa7a5b023847b6c977

        SHA256

        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

        SHA512

        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

      • C:\Users\Admin\AppData\Local\Temp\Tar1EF1.tmp

        Filesize

        175KB

        MD5

        dd73cead4b93366cf3465c8cd32e2796

        SHA1

        74546226dfe9ceb8184651e920d1dbfb432b314e

        SHA256

        a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

        SHA512

        ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

      • C:\Users\Admin\AppData\Roaming\39361add-64e5-45a6-bb46-7a0ee8840dea.tmp

        Filesize

        363B

        MD5

        076781188602ed3ce691a58745d5384b

        SHA1

        2b31b12fcfdccc9865e60c6b5ec1c73384566a54

        SHA256

        8da6f81274ffa9c45802f4f678b116c084445bce4b483633d5286008da0729b1

        SHA512

        dc1f9088796c1c5b978ee361ae59c4e3bf608e7f812a3e7b08bb9ca7275810029e5d9eb000480d1f000ef635885743a18f57019701db2d579d74170226de3b9a

      • C:\Users\Admin\AppData\Roaming\Badlion Client\Preferences

        Filesize

        57B

        MD5

        58127c59cb9e1da127904c341d15372b

        SHA1

        62445484661d8036ce9788baeaba31d204e9a5fc

        SHA256

        be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de

        SHA512

        8d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a

      • C:\Users\Admin\AppData\Roaming\Badlion Client\Session Storage\CURRENT

        Filesize

        16B

        MD5

        46295cac801e5d4857d09837238a6394

        SHA1

        44e0fa1b517dbf802b18faf0785eeea6ac51594b

        SHA256

        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

        SHA512

        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

      • C:\Users\Admin\AppData\Roaming\Badlion Client\config.json

        Filesize

        1KB

        MD5

        d2da35e826a1e6af049f99048b4fb6ec

        SHA1

        ad261dccdbf7c44cdcc00a24bcd1bb4fa95da29e

        SHA256

        21eaa56d4ca1308f21bb534c446d5b0e56410efe28d08fd8780b75a02222d227

        SHA512

        d85f391144bc05992ab86569e03fe12bedee427e2b1ed7be4eb55a3a428e6bca118b23e9c567fc381b6329f60e67413cb35a06126c268b2063b8fa0d89d95162

      • C:\Users\Admin\AppData\Roaming\Badlion Client\config.json

        Filesize

        1KB

        MD5

        62d5d73ee869a0a2654d8fd554aaf742

        SHA1

        be1d557c26633ffd5edcb5caf37b2a09f47c6667

        SHA256

        9ef970b76a91f607002afb164aa7f01d85e20290cf242e4adafb7f6026900b59

        SHA512

        8706794249e1bd7fcaa3e7e25c0b976a069b02abc877a0fdf9fce408a12b4aa5c151e5e3f75fc81185f8fef84a0b9c5a908b84f60102ac9aa03aec908a094550

      • C:\Users\Admin\AppData\Roaming\Badlion Client\config.json.tmp-9686407822950633

        Filesize

        1KB

        MD5

        ffb98039924220fb33837a443cdc5f51

        SHA1

        4731fbc7a581df4e0abc248aebc158fb377213a1

        SHA256

        9a41ec4fbdfa1329a945cc71da90f33605f5b550c8a5ffb7de31f1dd04b095ba

        SHA512

        e0e1011075b3da237776210fe81511177d093e8e64f3f241ca16f299a3e7198d7431b9a1a705a42073d8524ff77c7d09f0d5094f5cec689c4ba197e7dcf9b70c

      • C:\Users\Admin\AppData\Roaming\Badlion Client\logs\main.log

        Filesize

        1KB

        MD5

        dc3c24ba0a1e038c342e68b94f4a6045

        SHA1

        8db8f2da2874b7fe9861779bc8a9a8e688b901ae

        SHA256

        274314eaf2a580c53d936b24fc5560247ffa14dbd379b4f960fc6b63b03ae44a

        SHA512

        d7b2defb7d52aa1a5506437d365c403ebb62f1bce9d7f11e847733a426035313c843a6c1bdd529029e5ce697a7ebbedd5abfbe01d8a916de14b7348a26cc9f89

      • C:\Users\Admin\AppData\Roaming\Badlion Client\logs\main.log

        Filesize

        3KB

        MD5

        dd185e7576e8dbdf7590945dbbca3c94

        SHA1

        a023a098e187e21372cfac8c05d322688603c580

        SHA256

        973d6b4602cbe4b4fafea142dc41b1572d442d919b9dd57b4291b96ee1640d58

        SHA512

        e3973849a61cb9eceefd743649b20596bb4a9a0e7433675371325f502d02ddf717d14ba1eff35ca4bb66f8f86410ab7cf28a9fbd5faa7bb6c1c08985e7aadf61

      • C:\Users\Admin\AppData\Roaming\Badlion Client\logs\main.log

        Filesize

        14KB

        MD5

        e4a147a35752fd3482e57b7e2d010fe4

        SHA1

        5da4ddaae963d3f64138dedb039aaa544eab2425

        SHA256

        43ac8b6265e4fccd8ad2cd567a0b072339f6f70a9ea4a5b310e8213144db2e6f

        SHA512

        9b160882a71bb26de8b3164cc011592a45e36a42e72bf9a2b882dc8127e51f9b17f795cd69c7b19c16b5101964e8510bd40c936ae030bed4965e121ab9a75eaa

      • C:\Users\Admin\AppData\Roaming\dd50afbc-87ae-4cee-95d2-e69aaa98607a.tmp

        Filesize

        361B

        MD5

        709c269804e1ff735b34df94653500e8

        SHA1

        618e5b6275e15ecae65654f7a42e8070931ceaf2

        SHA256

        0026e6b9a53e857b2579a1baede4e56424ee27ed7ebdedb4cf825affdb9e46dd

        SHA512

        99bb029a89016bb308f55aed7c105ce838010f5d829d303f954e62eaa5fd1823ebbd75f9626f2a9d0e4726789982e664aee8b420f67a29632c01134ff3fb1b1f

      • C:\Windows\system32\drivers\etc\hosts

        Filesize

        977B

        MD5

        53316bc0c42b9d65743709021f1d03c7

        SHA1

        44cfe377bf7fedee2ce8f888cfacefd283e924e6

        SHA256

        600d914eb6b9ffb387be5b7300ca138192a4e86c4679c9bff36bcf0364e74b36

        SHA512

        9b390f6d7955413c8d63d02dff6988442cf78bbfb72e12f7deab56b190c1a7f455c5af3344ee5a1f7477d383c24e567af4fb7639ab6d9f014935418bf1cf00f6

      • memory/616-267-0x00000000777E0000-0x00000000777E1000-memory.dmp

        Filesize

        4KB

      • memory/616-234-0x0000000000860000-0x0000000000861000-memory.dmp

        Filesize

        4KB

      • memory/2032-199-0x00000000029E0000-0x00000000029E1000-memory.dmp

        Filesize

        4KB

      • memory/2032-133-0x00000000029E0000-0x00000000029E1000-memory.dmp

        Filesize

        4KB

      • memory/2772-137-0x0000000005060000-0x0000000005DFA000-memory.dmp

        Filesize

        13.6MB