Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/04/2024, 01:50

General

  • Target

    Badlion Client.exe

  • Size

    134.1MB

  • MD5

    bf90ab00ffa52c6e5a9acd7f38bd1313

  • SHA1

    c073d0047b5bc37d16add60da739b28bdcffd7da

  • SHA256

    de989473039d37c45d0fb39d3bfaf15a08833c91bc53918bafafc0b7aef459d6

  • SHA512

    d42d1cd5618b9b06a96d127d48867a9056994cb571acd63f16f1e9904aa9bdabbd53e5c915351d4c65518491918e2b09f428280d796ab9aff850f31fd9bc429c

  • SSDEEP

    1572864:myhU9i4Qmh8AxfjKhRh+10tb8lc6i/R60:xEjV0D/w0

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies registry class 10 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe
    "C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks computer location settings
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3604
    • C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe" --type=gpu-process --field-trial-handle=2464,11214344580515085779,8413179455797514794,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --disable-gpu-sandbox --user-data-dir="C:\Users\Admin\AppData\Roaming\Badlion Client" --gpu-preferences=UAAAAAAAAADgAAAIAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2508 /prefetch:2
      2⤵
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:1640
    • C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2464,11214344580515085779,8413179455797514794,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Badlion Client" --mojo-platform-channel-handle=3000 /prefetch:8
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1612
    • C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Badlion Client" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --autoplay-policy=no-user-gesture-required --field-trial-handle=2464,11214344580515085779,8413179455797514794,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3048 /prefetch:1
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      PID:4832
    • C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Badlion Client" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --autoplay-policy=no-user-gesture-required --field-trial-handle=2464,11214344580515085779,8413179455797514794,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:1
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      PID:5100
    • C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Badlion Client.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2464,11214344580515085779,8413179455797514794,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=audio --user-data-dir="C:\Users\Admin\AppData\Roaming\Badlion Client" --mojo-platform-channel-handle=3652 /prefetch:8
      2⤵
        PID:3160
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x3d4 0x2f8
      1⤵
        PID:4596

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Badlion Client\Preferences

        Filesize

        57B

        MD5

        58127c59cb9e1da127904c341d15372b

        SHA1

        62445484661d8036ce9788baeaba31d204e9a5fc

        SHA256

        be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de

        SHA512

        8d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a

      • C:\Users\Admin\AppData\Roaming\Badlion Client\Preferences~RFe58dc22.TMP

        Filesize

        86B

        MD5

        d11dedf80b85d8d9be3fec6bb292f64b

        SHA1

        aab8783454819cd66ddf7871e887abdba138aef3

        SHA256

        8029940de92ae596278912bbbd6387d65f4e849d3c136287a1233f525d189c67

        SHA512

        6b7ec1ca5189124e0d136f561ca7f12a4653633e2d9452d290e658dfe545acf6600cc9496794757a43f95c91705e9549ef681d4cc9e035738b03a18bdc2e25f0

      • C:\Users\Admin\AppData\Roaming\Badlion Client\Session Storage\CURRENT

        Filesize

        16B

        MD5

        46295cac801e5d4857d09837238a6394

        SHA1

        44e0fa1b517dbf802b18faf0785eeea6ac51594b

        SHA256

        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

        SHA512

        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

      • C:\Users\Admin\AppData\Roaming\Badlion Client\config.json

        Filesize

        1KB

        MD5

        62d5d73ee869a0a2654d8fd554aaf742

        SHA1

        be1d557c26633ffd5edcb5caf37b2a09f47c6667

        SHA256

        9ef970b76a91f607002afb164aa7f01d85e20290cf242e4adafb7f6026900b59

        SHA512

        8706794249e1bd7fcaa3e7e25c0b976a069b02abc877a0fdf9fce408a12b4aa5c151e5e3f75fc81185f8fef84a0b9c5a908b84f60102ac9aa03aec908a094550

      • C:\Users\Admin\AppData\Roaming\Badlion Client\config.json.tmp-4182882305a98033

        Filesize

        1KB

        MD5

        d2da35e826a1e6af049f99048b4fb6ec

        SHA1

        ad261dccdbf7c44cdcc00a24bcd1bb4fa95da29e

        SHA256

        21eaa56d4ca1308f21bb534c446d5b0e56410efe28d08fd8780b75a02222d227

        SHA512

        d85f391144bc05992ab86569e03fe12bedee427e2b1ed7be4eb55a3a428e6bca118b23e9c567fc381b6329f60e67413cb35a06126c268b2063b8fa0d89d95162

      • C:\Users\Admin\AppData\Roaming\Badlion Client\config.json.tmp-4182882966832ae3

        Filesize

        1KB

        MD5

        ffb98039924220fb33837a443cdc5f51

        SHA1

        4731fbc7a581df4e0abc248aebc158fb377213a1

        SHA256

        9a41ec4fbdfa1329a945cc71da90f33605f5b550c8a5ffb7de31f1dd04b095ba

        SHA512

        e0e1011075b3da237776210fe81511177d093e8e64f3f241ca16f299a3e7198d7431b9a1a705a42073d8524ff77c7d09f0d5094f5cec689c4ba197e7dcf9b70c

      • C:\Users\Admin\AppData\Roaming\Badlion Client\logs\main.log

        Filesize

        1KB

        MD5

        cae19ab5394e7b260226cc54781dfd63

        SHA1

        30337a42d033b30c6c416316f1f3ae3f2d977b21

        SHA256

        8cc29dfd1e06a2d7594f70e544693ef90debfd5cd4d47fef5cec6e3ad6f59a0a

        SHA512

        06ea8bc4bbc79d36ff7afc555b1660b19187d537453b87c7705c830cc80ed1c011b189f150bb3b1dbd44562fc3aba2bd653a6e40d29e03a0f9cd7da93306efcf

      • C:\Users\Admin\AppData\Roaming\Badlion Client\logs\main.log

        Filesize

        2KB

        MD5

        b80839886da3dd85057911649b05a608

        SHA1

        8deb8e393841f1d7775fc9a40440dccafe118554

        SHA256

        03e9d0a8cdee5522ff133865fc4ab24e2c0d68298b475f89268ef6e05efae668

        SHA512

        849225f7a4e868dfb9a506c4dc17ca93b83bdcd96721eed13159bf6f7132005ec5267c1e094024f42d04b86ce1897c6757a6c1f67a5faeb1014d687ace71ea3c

      • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • C:\Windows\system32\drivers\etc\hosts

        Filesize

        1KB

        MD5

        008fba141529811128b8cd5f52300f6e

        SHA1

        1a350b35d82cb4bd7a924b6840c36a678105f793

        SHA256

        ab0e454a786ef19a3ae1337f10f47354ffa9521ea5026e9e11174eca22d86e84

        SHA512

        80189560b6cf180a9c1ecafc90018b48541687f52f5d49b54ca25e040b3264da053e3d4dbb0cd38caaf496e23e516de18f500b333e3cda1fd1b25c6e9632defc

      • memory/3160-999-0x00007FFFF26E0000-0x00007FFFF26E1000-memory.dmp

        Filesize

        4KB

      • memory/3160-1279-0x000001EFA4790000-0x000001EFA483C000-memory.dmp

        Filesize

        688KB

      • memory/3160-1297-0x000001EFA4790000-0x000001EFA483C000-memory.dmp

        Filesize

        688KB