Analysis

  • max time kernel
    148s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    09-04-2024 03:00

General

  • Target

    cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe

  • Size

    10.2MB

  • MD5

    3b469784a485d1705edfd3196df0e1e5

  • SHA1

    228467ee42bf0a6b32717b59932d7d61d6b08caf

  • SHA256

    cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb

  • SHA512

    28c0c4f2325d27d2615b80d94fc71dce7b5577ebd130e743d5ffa12c7f497c21e5cb61ab55275762ace80dcbdd44ca1535b984ee22785914020c8007c8a323bb

  • SSDEEP

    196608:V7oSNqzagn5zuf5rTRqcYdXuxTumr3cBS8Si2NdDcnSoiThhryQvwnbL:VUSNC9Y5/NYEk6OXSlNFBJwbL

Malware Config

Extracted

Family

babylonrat

C2

175.209.69.173

Signatures

  • Babylon RAT

    Babylon RAT is remote access trojan written in C++.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 8 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe
    "C:\Users\Admin\AppData\Local\Temp\cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\Def_off.cmd" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Windows\SysWOW64\sc.exe
        sc config Sense start= disabled
        3⤵
        • Launches sc.exe
        PID:2652
      • C:\Windows\SysWOW64\net.exe
        net stop Sense
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2704
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop Sense
          4⤵
            PID:2480
        • C:\Windows\SysWOW64\sc.exe
          sc config WdFilter start= disabled
          3⤵
          • Launches sc.exe
          PID:2784
        • C:\Windows\SysWOW64\net.exe
          net stop WdFilter
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:320
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop WdFilter
            4⤵
              PID:2456
          • C:\Windows\SysWOW64\sc.exe
            sc config WdNisSvc start= disabled
            3⤵
            • Launches sc.exe
            PID:1984
          • C:\Windows\SysWOW64\net.exe
            net stop WdNisSvc Track
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2964
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop WdNisSvc Track
              4⤵
                PID:2960
            • C:\Windows\SysWOW64\sc.exe
              sc config WinDefend start= disabled
              3⤵
              • Launches sc.exe
              PID:3008
            • C:\Windows\SysWOW64\net.exe
              net stop WinDefend
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2124
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop WinDefend
                4⤵
                  PID:1764
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\System\CurrentControlSet\Services\Sense" /v "Start" /t REG_DWORD /d "4" /f
                3⤵
                  PID:2268
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f
                  3⤵
                    PID:1652
                  • C:\Windows\SysWOW64\reg.exe
                    reg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f
                    3⤵
                      PID:2780
                    • C:\Windows\SysWOW64\reg.exe
                      reg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f
                      3⤵
                      • Modifies security service
                      PID:2804
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
                      3⤵
                        PID:2820
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
                        3⤵
                          PID:2844
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
                          3⤵
                            PID:2920
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
                            3⤵
                              PID:2996
                            • C:\Windows\SysWOW64\reg.exe
                              reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
                              3⤵
                                PID:2944
                              • C:\Windows\SysWOW64\reg.exe
                                reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f
                                3⤵
                                  PID:2636
                                • C:\Windows\SysWOW64\reg.exe
                                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d 1 /f
                                  3⤵
                                  • Modifies Windows Defender Real-time Protection settings
                                  PID:2764
                                • C:\Windows\SysWOW64\reg.exe
                                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d 1 /f
                                  3⤵
                                  • Modifies Windows Defender Real-time Protection settings
                                  PID:1640
                                • C:\Windows\SysWOW64\reg.exe
                                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f
                                  3⤵
                                  • Modifies Windows Defender Real-time Protection settings
                                  PID:240
                                • C:\Windows\SysWOW64\reg.exe
                                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d 1 /f
                                  3⤵
                                  • Modifies Windows Defender Real-time Protection settings
                                  PID:1644
                                • C:\Windows\SysWOW64\reg.exe
                                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d 1 /f
                                  3⤵
                                    PID:1636
                                  • C:\Windows\SysWOW64\reg.exe
                                    reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d 0 /f
                                    3⤵
                                      PID:1624
                                    • C:\Windows\SysWOW64\reg.exe
                                      reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d 0 /f
                                      3⤵
                                        PID:1548
                                      • C:\Windows\SysWOW64\reg.exe
                                        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d 0 /f
                                        3⤵
                                          PID:1432
                                        • C:\Windows\SysWOW64\reg.exe
                                          reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f
                                          3⤵
                                            PID:1524
                                        • C:\Windows\SysWOW64\rundll32.exe
                                          "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\변제확인서.hwp
                                          2⤵
                                          • Modifies registry class
                                          PID:2656
                                          • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
                                            "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\변제확인서.hwp"
                                            3⤵
                                            • Suspicious behavior: GetForegroundWindowSpam
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2036
                                        • C:\Users\Admin\AppData\Local\Temp\oracleserver.exe
                                          "C:\Users\Admin\AppData\Local\Temp\oracleserver.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Adds Run key to start application
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2672
                                          • C:\ProgramData\OracleInc\oracleserver.exe
                                            "C:\ProgramData\OracleInc\oracleserver.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • Adds Run key to start application
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious behavior: GetForegroundWindowSpam
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1816
                                            • C:\ProgramData\OracleInc\oracleserver.exe
                                              "C:\ProgramData\OracleInc\oracleserver.exe" 1816
                                              4⤵
                                              • Executes dropped EXE
                                              • Adds Run key to start application
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:632
                                        • C:\Windows\SysWOW64\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\del.vbs"
                                          2⤵
                                            PID:2692

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Temp\Def_off.cmd

                                          Filesize

                                          2KB

                                          MD5

                                          7e1105b6b22ea8685d836a0315ebd27b

                                          SHA1

                                          a8588b878ab15b8f74d129f6a0d6edfee8c202d5

                                          SHA256

                                          75dacc04526bcc4f5e3a31109a1a5c534082b72df6824f8498b24849aba2e655

                                          SHA512

                                          f4663bfe1117ac56c47fe743ee1b4e95c0912fc6bf6a762a44134b3c3dce26eee21081d6c6eb75e925b541952283e8766d918c1e840572ec4f7815b05e1812d8

                                        • C:\Users\Admin\AppData\Local\Temp\del.vbs

                                          Filesize

                                          644B

                                          MD5

                                          6b5174248e3ac313dae6b3ac958be2e6

                                          SHA1

                                          cfa6b347004145cf8744339f70ab41af9f1e3fd4

                                          SHA256

                                          71f5befbd43a1f3c242650c24f36618bea541d09cb733eeffeb81353cb861380

                                          SHA512

                                          df11f0c682c50c8d75a87e6aca449e1f54788c511b8a6cb080d899755b2c990c211a7e3c633f5b6903dc1e05a3398e3672cc4e178c405a3ed5f1fc36f2355a2b

                                        • C:\Users\Admin\AppData\Local\Temp\변제확인서.hwp

                                          Filesize

                                          263KB

                                          MD5

                                          6f4d5b74e8787c4c4fe3e7a5271a6c84

                                          SHA1

                                          d94094098fb2afe2147f9fb98fc2df72d0e07d4f

                                          SHA256

                                          a2042c39a6d90b543a298df988762bd03bb69551c885adb98b3f3758ffcca6ed

                                          SHA512

                                          fe2a4af5feadc4b955b3db475c09ee112d30b4ca45aaef627fb7da24a43428c7356ed06fdfba67009aeedca27c214df863267d686e435e8cd7b12fef90ae74ae

                                        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

                                          Filesize

                                          3KB

                                          MD5

                                          eed15741cabdb175690465b877109f55

                                          SHA1

                                          f58e160588ae8b2ed34e837025fe64952544bcc8

                                          SHA256

                                          bfa713926217c6428cad14440d56b31a2f4485af3255ea0583a682b845a37401

                                          SHA512

                                          f33bf08a3a7b6f38880e9da4e2c55a91d568d29c4571740cb57edee9843e482fe4fa5acc462957f7c2e6441fc60b290ede6a417237153c0542a7ce378710c9c5

                                        • \Users\Admin\AppData\Local\Temp\oracleserver.exe

                                          Filesize

                                          10.1MB

                                          MD5

                                          86e6ca2678744229869b3d6ef0d52ed5

                                          SHA1

                                          09922524d1d30a08a6fd1da17bc2e288316406d3

                                          SHA256

                                          73321634971c0494584f0698de2021ca46432d9ade7ca062046b8d03633b6c17

                                          SHA512

                                          a0f55c6ac8f06c39682b677ae0ec491fc07a14824bab90256ae1425ead767cc7eb5cf9f42cdf617e6a8e524e55d38cd49641874c0c5bbf0dc6ebe711c1a16450

                                        • memory/632-97-0x0000000001220000-0x000000000224A000-memory.dmp

                                          Filesize

                                          16.2MB

                                        • memory/632-73-0x00000000000A0000-0x00000000000A1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/632-75-0x0000000077BB0000-0x0000000077BB1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/632-71-0x00000000000A0000-0x00000000000A1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/632-70-0x0000000001220000-0x000000000224A000-memory.dmp

                                          Filesize

                                          16.2MB

                                        • memory/1816-60-0x0000000001220000-0x000000000224A000-memory.dmp

                                          Filesize

                                          16.2MB

                                        • memory/1816-57-0x0000000001220000-0x000000000224A000-memory.dmp

                                          Filesize

                                          16.2MB

                                        • memory/1816-62-0x0000000000150000-0x0000000000151000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1816-63-0x0000000077BB0000-0x0000000077BB1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1816-58-0x0000000000150000-0x0000000000151000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1816-79-0x0000000001220000-0x000000000224A000-memory.dmp

                                          Filesize

                                          16.2MB

                                        • memory/2672-53-0x00000000013A0000-0x00000000023CA000-memory.dmp

                                          Filesize

                                          16.2MB

                                        • memory/2672-45-0x0000000077BB0000-0x0000000077BB1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2672-43-0x00000000013A0000-0x00000000023CA000-memory.dmp

                                          Filesize

                                          16.2MB

                                        • memory/2672-37-0x00000000000E0000-0x00000000000E1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2672-39-0x00000000000E0000-0x00000000000E1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2672-41-0x00000000000E0000-0x00000000000E1000-memory.dmp

                                          Filesize

                                          4KB