Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/03/2024, 02:50

General

  • Target

    Babalar.exe

  • Size

    154.5MB

  • MD5

    0fc5102a2cbcf6b049fa89171a56a102

  • SHA1

    8515d0e6bc5fc93f1bc03737c380c8d7437ca456

  • SHA256

    330b558cfa340ee080c93becbc09e639215ba63232a1a48f2759b2eaf6297147

  • SHA512

    9ee79b08ccdbbe5322fab2c4fdafe8bccab4f194e14084395c1f633e7b324b00793332d9eb65278f960fac697c40aea9d9405afe9fbe1a0cbcf59a89d0a5d92b

  • SSDEEP

    1572864:cCquurbtqKajQe7vqrTU4PrCsdCXrBngPE1cG7VOWe2IkBmUgq3Fd6iU3x6VCdbm:2DAgZi

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Babalar.exe
    "C:\Users\Admin\AppData\Local\Temp\Babalar.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:60
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Windows\system32\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:1748
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1324
      • C:\Windows\system32\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:1824
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,192,218,118,111,122,74,164,64,163,38,154,151,69,200,225,129,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,43,198,53,56,60,158,173,64,46,88,150,22,150,74,187,10,162,35,140,44,194,181,226,8,96,53,28,241,227,95,72,133,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,102,101,34,50,234,149,184,54,179,243,5,180,220,157,236,48,3,140,208,250,50,130,86,214,249,202,131,208,174,19,48,179,48,0,0,0,101,181,136,200,32,24,200,118,33,230,159,117,175,31,130,153,187,35,81,54,254,162,142,197,9,70,200,154,182,118,147,21,86,47,155,233,186,26,170,45,229,96,41,41,233,239,151,110,64,0,0,0,44,142,18,253,21,65,67,0,192,174,58,149,232,66,42,90,118,74,43,1,229,78,42,231,161,75,234,179,143,155,184,141,46,195,24,219,63,97,49,7,90,101,67,17,152,32,183,104,236,22,2,146,68,74,127,88,178,142,78,131,25,63,114,148), $null, 'CurrentUser')"
      2⤵
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:4180
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,192,218,118,111,122,74,164,64,163,38,154,151,69,200,225,129,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,43,198,53,56,60,158,173,64,46,88,150,22,150,74,187,10,162,35,140,44,194,181,226,8,96,53,28,241,227,95,72,133,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,102,101,34,50,234,149,184,54,179,243,5,180,220,157,236,48,3,140,208,250,50,130,86,214,249,202,131,208,174,19,48,179,48,0,0,0,101,181,136,200,32,24,200,118,33,230,159,117,175,31,130,153,187,35,81,54,254,162,142,197,9,70,200,154,182,118,147,21,86,47,155,233,186,26,170,45,229,96,41,41,233,239,151,110,64,0,0,0,44,142,18,253,21,65,67,0,192,174,58,149,232,66,42,90,118,74,43,1,229,78,42,231,161,75,234,179,143,155,184,141,46,195,24,219,63,97,49,7,90,101,67,17,152,32,183,104,236,22,2,146,68,74,127,88,178,142,78,131,25,63,114,148), $null, 'CurrentUser')
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2764
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,192,218,118,111,122,74,164,64,163,38,154,151,69,200,225,129,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,201,230,97,125,240,15,113,26,243,39,203,109,36,159,227,153,24,176,220,244,135,232,118,95,13,22,189,3,220,32,148,128,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,227,14,209,42,3,149,123,15,186,217,226,89,144,161,234,86,128,81,66,158,124,161,224,147,94,247,210,71,122,229,64,50,48,0,0,0,87,26,76,98,25,166,137,35,42,36,178,81,91,209,188,75,165,169,34,40,51,94,90,219,183,188,10,128,116,142,31,226,61,123,161,5,9,192,40,151,152,169,184,87,118,178,175,147,64,0,0,0,86,197,110,156,197,95,221,79,211,15,146,26,140,170,247,130,90,255,169,126,20,43,4,78,172,249,146,43,123,49,193,191,2,25,241,225,11,103,214,38,72,37,132,171,97,107,38,187,12,240,239,239,139,86,241,90,119,246,172,254,232,37,229,58), $null, 'CurrentUser')"
      2⤵
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:1888
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,192,218,118,111,122,74,164,64,163,38,154,151,69,200,225,129,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,201,230,97,125,240,15,113,26,243,39,203,109,36,159,227,153,24,176,220,244,135,232,118,95,13,22,189,3,220,32,148,128,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,227,14,209,42,3,149,123,15,186,217,226,89,144,161,234,86,128,81,66,158,124,161,224,147,94,247,210,71,122,229,64,50,48,0,0,0,87,26,76,98,25,166,137,35,42,36,178,81,91,209,188,75,165,169,34,40,51,94,90,219,183,188,10,128,116,142,31,226,61,123,161,5,9,192,40,151,152,169,184,87,118,178,175,147,64,0,0,0,86,197,110,156,197,95,221,79,211,15,146,26,140,170,247,130,90,255,169,126,20,43,4,78,172,249,146,43,123,49,193,191,2,25,241,225,11,103,214,38,72,37,132,171,97,107,38,187,12,240,239,239,139,86,241,90,119,246,172,254,232,37,229,58), $null, 'CurrentUser')
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4276
    • C:\Users\Admin\AppData\Local\Temp\Babalar.exe
      "C:\Users\Admin\AppData\Local\Temp\Babalar.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Babalar" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1880,i,6234342849899864782,14053026923868221289,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
        PID:3428
      • C:\Users\Admin\AppData\Local\Temp\Babalar.exe
        "C:\Users\Admin\AppData\Local\Temp\Babalar.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Babalar" --mojo-platform-channel-handle=2164 --field-trial-handle=1880,i,6234342849899864782,14053026923868221289,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
        2⤵
          PID:4852
        • C:\Users\Admin\AppData\Local\Temp\Babalar.exe
          "C:\Users\Admin\AppData\Local\Temp\Babalar.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\Babalar" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1880,i,6234342849899864782,14053026923868221289,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2360

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        3KB

        MD5

        f48896adf9a23882050cdff97f610a7f

        SHA1

        4c5a610df62834d43f470cae7e851946530e3086

        SHA256

        3ae35c2828715a2f9a5531d334a0cfffc81396c2dc058ca42a9943f3cdc22e78

        SHA512

        16644246f2a35a186fcb5c2b6456ed6a16e8db65ad1383109e06547f9b1f9358f071c30cca541ca4cf7bae66cb534535e88f75f6296a4bfc6c7b22b0684a6ba9

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        edde8f0d1c2b354e54dfe40cc569eab0

        SHA1

        527e75e7d1bcbd62eddb32544e5f8e0a5a09296a

        SHA256

        0f34a5a9c6db0916597e6f822b6619350204fe2f1ff21a4e10c87098f33e5d41

        SHA512

        039f8707b428dee74545279c435975a07a2b4743819f67270188beb12cc9bce9233b0b3e81c4219ea31a530952f297a7bf63b9c61ba0950acbccab753db182fd

      • C:\Users\Admin\AppData\Local\Temp\61f7d4e5-7bb9-4b33-bd14-18e165bd9ef2.tmp.node

        Filesize

        1.8MB

        MD5

        3072b68e3c226aff39e6782d025f25a8

        SHA1

        cf559196d74fa490ac8ce192db222c9f5c5a006a

        SHA256

        7fb52b781709b065c240b6b81394be6e72e53fe11d7c8e0f7b49dd417eb78a01

        SHA512

        61ebc72c20195e99244d95af1ab44fa06201a1aee2b5da04490fdc4312e8324a40b0e15a7b42fab5179753d767c1d08ae1a7a56ac71a6e100e63f83db849ee61

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dmili1jk.rz5.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/2360-79-0x00000199C4120000-0x00000199C4121000-memory.dmp

        Filesize

        4KB

      • memory/2360-78-0x00000199C4120000-0x00000199C4121000-memory.dmp

        Filesize

        4KB

      • memory/2360-76-0x00000199C4120000-0x00000199C4121000-memory.dmp

        Filesize

        4KB

      • memory/2360-68-0x00000199C4120000-0x00000199C4121000-memory.dmp

        Filesize

        4KB

      • memory/2360-77-0x00000199C4120000-0x00000199C4121000-memory.dmp

        Filesize

        4KB

      • memory/2360-80-0x00000199C4120000-0x00000199C4121000-memory.dmp

        Filesize

        4KB

      • memory/2360-74-0x00000199C4120000-0x00000199C4121000-memory.dmp

        Filesize

        4KB

      • memory/2360-75-0x00000199C4120000-0x00000199C4121000-memory.dmp

        Filesize

        4KB

      • memory/2360-70-0x00000199C4120000-0x00000199C4121000-memory.dmp

        Filesize

        4KB

      • memory/2360-69-0x00000199C4120000-0x00000199C4121000-memory.dmp

        Filesize

        4KB

      • memory/2764-19-0x00000221D00F0000-0x00000221D0140000-memory.dmp

        Filesize

        320KB

      • memory/2764-23-0x00007FFC12590000-0x00007FFC13051000-memory.dmp

        Filesize

        10.8MB

      • memory/2764-18-0x00000221CF1E0000-0x00000221CF1F0000-memory.dmp

        Filesize

        64KB

      • memory/2764-17-0x00000221CF1E0000-0x00000221CF1F0000-memory.dmp

        Filesize

        64KB

      • memory/2764-16-0x00007FFC12590000-0x00007FFC13051000-memory.dmp

        Filesize

        10.8MB

      • memory/2764-6-0x00000221CF290000-0x00000221CF2B2000-memory.dmp

        Filesize

        136KB

      • memory/4276-41-0x00007FFC12590000-0x00007FFC13051000-memory.dmp

        Filesize

        10.8MB

      • memory/4276-38-0x0000023EAEC10000-0x0000023EAEC20000-memory.dmp

        Filesize

        64KB

      • memory/4276-37-0x0000023EAEC10000-0x0000023EAEC20000-memory.dmp

        Filesize

        64KB

      • memory/4276-36-0x00007FFC12590000-0x00007FFC13051000-memory.dmp

        Filesize

        10.8MB