Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-04-2024 23:55

General

  • Target

    eea523161809e39ee734d8deb02f9f98_JaffaCakes118.exe

  • Size

    604KB

  • MD5

    eea523161809e39ee734d8deb02f9f98

  • SHA1

    a563069349eb551da8121fbb1b84690cc60a1eb4

  • SHA256

    12028366e44c4e772f26201af6920dbdf20adcec01d4f1d01b5c6058e5c190cb

  • SHA512

    a1901ab67bb41d40f728f0329c42d948245fd6b1ae6c762b200f04f67918fcfd365d54214259a976bf3930069203d8e24dea5f1be5f7ae1ca842b9d88d98ff35

  • SSDEEP

    12288:fWrrr46mYSAkuzMbGtHLkur085gLO3PzB9TxNLKvtzA9ey:CrrrSAkuoGtpoM6O/DTxtKvt6ey

Malware Config

Signatures

  • Babylon RAT

    Babylon RAT is remote access trojan written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eea523161809e39ee734d8deb02f9f98_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eea523161809e39ee734d8deb02f9f98_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops desktop.ini file(s)
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Users\Admin\AppData\Local\Temp\a7I0Lu6pvUv7PGad\tskmsgl.exe
      "C:\Users\Admin\AppData\Local\Temp\a7I0Lu6pvUv7PGad\tskmsgl.exe"
      2⤵
      • Executes dropped EXE
      PID:3128
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3128 -s 536
        3⤵
        • Program crash
        PID:4664
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3128 -ip 3128
    1⤵
      PID:4360

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\a7I0Lu6pvUv7PGad\tskmsgl.exe

      Filesize

      604KB

      MD5

      eea523161809e39ee734d8deb02f9f98

      SHA1

      a563069349eb551da8121fbb1b84690cc60a1eb4

      SHA256

      12028366e44c4e772f26201af6920dbdf20adcec01d4f1d01b5c6058e5c190cb

      SHA512

      a1901ab67bb41d40f728f0329c42d948245fd6b1ae6c762b200f04f67918fcfd365d54214259a976bf3930069203d8e24dea5f1be5f7ae1ca842b9d88d98ff35

    • memory/2096-0-0x0000000074E20000-0x00000000753D1000-memory.dmp

      Filesize

      5.7MB

    • memory/2096-1-0x0000000001550000-0x0000000001560000-memory.dmp

      Filesize

      64KB

    • memory/2096-2-0x0000000074E20000-0x00000000753D1000-memory.dmp

      Filesize

      5.7MB

    • memory/2096-17-0x0000000074E20000-0x00000000753D1000-memory.dmp

      Filesize

      5.7MB

    • memory/2096-18-0x0000000001550000-0x0000000001560000-memory.dmp

      Filesize

      64KB

    • memory/2096-19-0x0000000074E20000-0x00000000753D1000-memory.dmp

      Filesize

      5.7MB

    • memory/3128-9-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/3128-13-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/3128-14-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/3128-16-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB