Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    153s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2024, 00:38

General

  • Target

    Badlion Client.exe

  • Size

    134.1MB

  • MD5

    bf90ab00ffa52c6e5a9acd7f38bd1313

  • SHA1

    c073d0047b5bc37d16add60da739b28bdcffd7da

  • SHA256

    de989473039d37c45d0fb39d3bfaf15a08833c91bc53918bafafc0b7aef459d6

  • SHA512

    d42d1cd5618b9b06a96d127d48867a9056994cb571acd63f16f1e9904aa9bdabbd53e5c915351d4c65518491918e2b09f428280d796ab9aff850f31fd9bc429c

  • SSDEEP

    1572864:myhU9i4Qmh8AxfjKhRh+10tb8lc6i/R60:xEjV0D/w0

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies registry class 10 IoCs
  • Modifies system certificate store 2 TTPs 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe
    "C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks computer location settings
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1440
    • C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe" --type=gpu-process --field-trial-handle=2644,10984069313696378985,14455975695745748193,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --disable-gpu-sandbox --user-data-dir="C:\Users\Admin\AppData\Roaming\Badlion Client" --gpu-preferences=UAAAAAAAAADgAAAIAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2680 /prefetch:2
      2⤵
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:2448
    • C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2644,10984069313696378985,14455975695745748193,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Badlion Client" --mojo-platform-channel-handle=3008 /prefetch:8
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4612
    • C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Badlion Client" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --autoplay-policy=no-user-gesture-required --field-trial-handle=2644,10984069313696378985,14455975695745748193,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:1
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      PID:3024
    • C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Badlion Client" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --autoplay-policy=no-user-gesture-required --field-trial-handle=2644,10984069313696378985,14455975695745748193,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:1
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      PID:4940
    • C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2644,10984069313696378985,14455975695745748193,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=audio --user-data-dir="C:\Users\Admin\AppData\Roaming\Badlion Client" --mojo-platform-channel-handle=3920 /prefetch:8
      2⤵
        PID:5864
      • C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe
        "C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe" --type=gpu-process --field-trial-handle=2644,10984069313696378985,14455975695745748193,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --disable-gpu-sandbox --user-data-dir="C:\Users\Admin\AppData\Roaming\Badlion Client" --gpu-preferences=UAAAAAAAAADoAAAIAAAAAAAAAAAAAAAAAABgAAAIAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2576 /prefetch:2
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:5512
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x4ec 0x2c8
      1⤵
        PID:5992

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\269c2048-a72e-4add-ace9-c10afdd5c6fb.tmp

        Filesize

        371B

        MD5

        38d4d2beb4a0c4b076d8f1afa0ecc02c

        SHA1

        e526174db2ea7d524e57bfd063d631ed631944c1

        SHA256

        9b3ee21e0bcef70610bdc13fc896a5445dd88efc8592e9c42df249d8fb9a26fe

        SHA512

        83ea99d80a001eaeaa3395889ea5d6cc91217a41cead06ebd78d6f489baca098e7dfb2a3a533c74801c674b785aa06900d57232ab097f4082da47b49cc7aa180

      • C:\Users\Admin\AppData\Roaming\Badlion Client\Network Persistent State

        Filesize

        1KB

        MD5

        70bed45ec161252bf52cfc71a12b0923

        SHA1

        c4a26cc17bd4882490fdb5986435a5c281e9b1ce

        SHA256

        c36fb17072e4dea3c46653acd339e0148aa1df5715619d017ad5815e9ea18df2

        SHA512

        b91e915311aecdd83c34fdc09ad21b6540fa4dceb4644df7195ffc7ffc21771c411578d6dbf99fd1ed4e05a75a57747d35e347a8a49aac9ea738ebad83cdfc36

      • C:\Users\Admin\AppData\Roaming\Badlion Client\Network Persistent State~RFe58e21e.TMP

        Filesize

        59B

        MD5

        2800881c775077e1c4b6e06bf4676de4

        SHA1

        2873631068c8b3b9495638c865915be822442c8b

        SHA256

        226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

        SHA512

        e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

      • C:\Users\Admin\AppData\Roaming\Badlion Client\Preferences

        Filesize

        57B

        MD5

        58127c59cb9e1da127904c341d15372b

        SHA1

        62445484661d8036ce9788baeaba31d204e9a5fc

        SHA256

        be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de

        SHA512

        8d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a

      • C:\Users\Admin\AppData\Roaming\Badlion Client\Preferences~RFe57e34b.TMP

        Filesize

        86B

        MD5

        d11dedf80b85d8d9be3fec6bb292f64b

        SHA1

        aab8783454819cd66ddf7871e887abdba138aef3

        SHA256

        8029940de92ae596278912bbbd6387d65f4e849d3c136287a1233f525d189c67

        SHA512

        6b7ec1ca5189124e0d136f561ca7f12a4653633e2d9452d290e658dfe545acf6600cc9496794757a43f95c91705e9549ef681d4cc9e035738b03a18bdc2e25f0

      • C:\Users\Admin\AppData\Roaming\Badlion Client\Session Storage\CURRENT

        Filesize

        16B

        MD5

        46295cac801e5d4857d09837238a6394

        SHA1

        44e0fa1b517dbf802b18faf0785eeea6ac51594b

        SHA256

        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

        SHA512

        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

      • C:\Users\Admin\AppData\Roaming\Badlion Client\config.json

        Filesize

        1KB

        MD5

        62d5d73ee869a0a2654d8fd554aaf742

        SHA1

        be1d557c26633ffd5edcb5caf37b2a09f47c6667

        SHA256

        9ef970b76a91f607002afb164aa7f01d85e20290cf242e4adafb7f6026900b59

        SHA512

        8706794249e1bd7fcaa3e7e25c0b976a069b02abc877a0fdf9fce408a12b4aa5c151e5e3f75fc81185f8fef84a0b9c5a908b84f60102ac9aa03aec908a094550

      • C:\Users\Admin\AppData\Roaming\Badlion Client\config.json

        Filesize

        1KB

        MD5

        d2da35e826a1e6af049f99048b4fb6ec

        SHA1

        ad261dccdbf7c44cdcc00a24bcd1bb4fa95da29e

        SHA256

        21eaa56d4ca1308f21bb534c446d5b0e56410efe28d08fd8780b75a02222d227

        SHA512

        d85f391144bc05992ab86569e03fe12bedee427e2b1ed7be4eb55a3a428e6bca118b23e9c567fc381b6329f60e67413cb35a06126c268b2063b8fa0d89d95162

      • C:\Users\Admin\AppData\Roaming\Badlion Client\logs\main.log

        Filesize

        2KB

        MD5

        32ceb08202a9e9c5bc77d93e40328719

        SHA1

        fd5109dcf9298df96856159560bd97585b8b1ca9

        SHA256

        865182519c77a129b6455c192123d672c6e775729264dc78833cc50417c626e0

        SHA512

        7dc4ef78beeb11d04f18c7db2a69e5d19b18c27afee54bb6f2142a20a388c1acbf55c9de23cd3b1c73be3e33bc8e7d4e84c43ac554a49e6a536b8e639c4dd872

      • C:\Users\Admin\AppData\Roaming\Badlion Client\logs\main.log

        Filesize

        3KB

        MD5

        2a7815f5769a3d1774332d27f22ba73d

        SHA1

        ce3a7305c97a7a21680a0eceaa05402b562855e4

        SHA256

        eca28b1eb82dc67a77e5c67dd7ac5ed23e3187e186551f79de566afc8dae4ecb

        SHA512

        43866ec79525d3d94aecf2865a8b4cd88397ae2664c399dd45eac482c5b9ca34a574677640ec523806571f9eb074eb461e5eedb7f9a85045b22e88a2a017e8cd

      • C:\Users\Admin\AppData\Roaming\Badlion Client\logs\main.log

        Filesize

        14KB

        MD5

        c8134a6be50a7b1a7615f6367abbbd96

        SHA1

        3bbc860e94243941dc7d61fe1bf97aeb808d95e7

        SHA256

        fbec1f1937c27d10c3d7b38cc9048af71ac23e76c59cb748a61fd710a3577d04

        SHA512

        acddd4fcc71bdcf393e7e0dcf2d98d194cfc1f4d133b370091cb251e9a039b1ae0baad87209856579b29e7dd87c6596340724f53d01a24ae380588887fb79175

      • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • C:\Windows\system32\drivers\etc\hosts

        Filesize

        1KB

        MD5

        008fba141529811128b8cd5f52300f6e

        SHA1

        1a350b35d82cb4bd7a924b6840c36a678105f793

        SHA256

        ab0e454a786ef19a3ae1337f10f47354ffa9521ea5026e9e11174eca22d86e84

        SHA512

        80189560b6cf180a9c1ecafc90018b48541687f52f5d49b54ca25e040b3264da053e3d4dbb0cd38caaf496e23e516de18f500b333e3cda1fd1b25c6e9632defc

      • memory/5512-727-0x000002883A300000-0x000002883A301000-memory.dmp

        Filesize

        4KB

      • memory/5512-725-0x000002883A300000-0x000002883A301000-memory.dmp

        Filesize

        4KB

      • memory/5512-726-0x000002883A300000-0x000002883A301000-memory.dmp

        Filesize

        4KB

      • memory/5512-731-0x000002883A300000-0x000002883A301000-memory.dmp

        Filesize

        4KB

      • memory/5512-732-0x000002883A300000-0x000002883A301000-memory.dmp

        Filesize

        4KB

      • memory/5512-733-0x000002883A300000-0x000002883A301000-memory.dmp

        Filesize

        4KB

      • memory/5512-734-0x000002883A300000-0x000002883A301000-memory.dmp

        Filesize

        4KB

      • memory/5512-735-0x000002883A300000-0x000002883A301000-memory.dmp

        Filesize

        4KB

      • memory/5512-736-0x000002883A300000-0x000002883A301000-memory.dmp

        Filesize

        4KB

      • memory/5512-737-0x000002883A300000-0x000002883A301000-memory.dmp

        Filesize

        4KB

      • memory/5864-464-0x00007FFCB23B0000-0x00007FFCB23B1000-memory.dmp

        Filesize

        4KB