Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
submitted
28/03/2024, 07:26
Static task
static1
Behavioral task
behavioral1
Sample
006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
006c50e0d2c17bdcf357c18c33c16bd4
-
SHA1
30c7fd7f2ed979b81df64c5130a7aaab0514197f
-
SHA256
fa3d137dbf86138f13a9a51fdf586222f72d2201962a6aa9c5890aa3c2c097a3
-
SHA512
fa59cf0b02c60cf0542ea2fdea3bf275237179998625312425c44f3543783acf1cfb8da51624c0998dc4bf0c1e85335561c1507ba1e0037e83f57c4e9ce6479f
-
SSDEEP
24576:NAHnh+eWsN3skA4RV1Hom2KXMmHa2XOS+/ODFJ2ifnTBMJ52cDT0F5:sh+ZkldoPK8Ya2X2WzlMJIcna
Malware Config
Extracted
babylonrat
ournewcompany2.hopto.org
Signatures
-
Babylon RAT
Babylon RAT is remote access trojan written in C++.
-
Babylonrat family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1296 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\111.exe powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\111.exe powershell.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1664 set thread context of 1260 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 33 PID 1664 set thread context of 2248 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 34 PID 1664 set thread context of 1760 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 35 PID 1664 set thread context of 2028 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 36 PID 1664 set thread context of 524 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 37 PID 1664 set thread context of 1628 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 38 -
resource yara_rule behavioral1/memory/1760-18-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/1760-19-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/1760-21-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/1760-28-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/1760-33-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2028-42-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2028-49-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/524-59-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/1760-48-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/1628-63-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/1760-64-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/1760-66-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/1760-67-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/1760-68-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/1760-70-0x0000000000400000-0x00000000004C9000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1296 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1760 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 1296 powershell.exe Token: SeShutdownPrivilege 1760 RegAsm.exe Token: SeDebugPrivilege 1760 RegAsm.exe Token: SeTcbPrivilege 1760 RegAsm.exe Token: SeShutdownPrivilege 2028 RegAsm.exe Token: SeDebugPrivilege 2028 RegAsm.exe Token: SeTcbPrivilege 2028 RegAsm.exe Token: SeShutdownPrivilege 524 RegAsm.exe Token: SeDebugPrivilege 524 RegAsm.exe Token: SeTcbPrivilege 524 RegAsm.exe Token: SeShutdownPrivilege 1628 RegAsm.exe Token: SeDebugPrivilege 1628 RegAsm.exe Token: SeTcbPrivilege 1628 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1760 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1296 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 31 PID 1664 wrote to memory of 1296 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 31 PID 1664 wrote to memory of 1296 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 31 PID 1664 wrote to memory of 1296 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 31 PID 1664 wrote to memory of 1260 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 33 PID 1664 wrote to memory of 1260 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 33 PID 1664 wrote to memory of 1260 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 33 PID 1664 wrote to memory of 1260 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 33 PID 1664 wrote to memory of 1260 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 33 PID 1664 wrote to memory of 1260 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 33 PID 1664 wrote to memory of 1260 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 33 PID 1664 wrote to memory of 1260 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 33 PID 1664 wrote to memory of 2248 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 34 PID 1664 wrote to memory of 2248 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 34 PID 1664 wrote to memory of 2248 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 34 PID 1664 wrote to memory of 2248 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 34 PID 1664 wrote to memory of 2248 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 34 PID 1664 wrote to memory of 2248 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 34 PID 1664 wrote to memory of 2248 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 34 PID 1664 wrote to memory of 2248 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 34 PID 1664 wrote to memory of 1760 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 35 PID 1664 wrote to memory of 1760 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 35 PID 1664 wrote to memory of 1760 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 35 PID 1664 wrote to memory of 1760 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 35 PID 1664 wrote to memory of 1760 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 35 PID 1664 wrote to memory of 1760 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 35 PID 1664 wrote to memory of 1760 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 35 PID 1664 wrote to memory of 1760 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 35 PID 1664 wrote to memory of 1760 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 35 PID 1664 wrote to memory of 1760 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 35 PID 1664 wrote to memory of 1760 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 35 PID 1664 wrote to memory of 2028 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 36 PID 1664 wrote to memory of 2028 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 36 PID 1664 wrote to memory of 2028 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 36 PID 1664 wrote to memory of 2028 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 36 PID 1664 wrote to memory of 2028 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 36 PID 1664 wrote to memory of 2028 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 36 PID 1664 wrote to memory of 2028 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 36 PID 1664 wrote to memory of 2028 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 36 PID 1664 wrote to memory of 2028 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 36 PID 1664 wrote to memory of 2028 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 36 PID 1664 wrote to memory of 2028 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 36 PID 1664 wrote to memory of 524 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 37 PID 1664 wrote to memory of 524 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 37 PID 1664 wrote to memory of 524 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 37 PID 1664 wrote to memory of 524 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 37 PID 1664 wrote to memory of 524 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 37 PID 1664 wrote to memory of 524 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 37 PID 1664 wrote to memory of 524 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 37 PID 1664 wrote to memory of 524 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 37 PID 1664 wrote to memory of 524 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 37 PID 1664 wrote to memory of 524 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 37 PID 1664 wrote to memory of 524 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 37 PID 1664 wrote to memory of 1628 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 38 PID 1664 wrote to memory of 1628 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 38 PID 1664 wrote to memory of 1628 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 38 PID 1664 wrote to memory of 1628 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 38 PID 1664 wrote to memory of 1628 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 38 PID 1664 wrote to memory of 1628 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 38 PID 1664 wrote to memory of 1628 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 38 PID 1664 wrote to memory of 1628 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 38 PID 1664 wrote to memory of 1628 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 38 PID 1664 wrote to memory of 1628 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 38 PID 1664 wrote to memory of 1628 1664 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden ( Copy-Item -Path "C:\Users\Admin\AppData\Local\Temp\006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe" -Destination "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\'Start Menu'\Programs\Startup\111.exe" )2⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵PID:1260
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵PID:2248
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1760
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:524
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1628
-