Analysis
-
max time kernel
148s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 14:55
Behavioral task
behavioral1
Sample
testrat.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
testrat.exe
-
Size
355KB
-
MD5
878372bf6c0f6e2ad6cec68369ec2016
-
SHA1
ef84acb11b67b1a250b79e73254e732f00f02814
-
SHA256
bfddac5c47e2cc4e3ddf8a42f28117739563811e2305550d8cfebbd881ae27ab
-
SHA512
c21a0f4e1a211a32d234812a267fa158da0f2d47d9e36c7096d9d3818e30a54e52b51ed081f466fdb17bda270625c3708ef4b0fdc5652b1b1af40aa01ec7aed2
-
SSDEEP
6144:ZL1ncfWwN0oc35jeRh8Xqfy/Ka1OHAH0tMrKCTEABG+Z9d3cQT/9nR4Ioy19X:ZLdcfxaeM6fy/KaVUtgKkTZ73coNRJ
Score
10/10
Malware Config
Signatures
-
Babylon RAT
Babylon RAT is remote access trojan written in C++.
-
resource yara_rule behavioral1/memory/4856-0-0x0000000000340000-0x0000000000409000-memory.dmp upx behavioral1/memory/4856-1-0x0000000000340000-0x0000000000409000-memory.dmp upx behavioral1/memory/4856-2-0x0000000000340000-0x0000000000409000-memory.dmp upx behavioral1/memory/4856-3-0x0000000000340000-0x0000000000409000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4856 testrat.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 4856 testrat.exe Token: SeDebugPrivilege 4856 testrat.exe Token: SeTcbPrivilege 4856 testrat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4856 testrat.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\testrat.exe"C:\Users\Admin\AppData\Local\Temp\testrat.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4856
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4244,i,13035806169561352434,1332896185314862791,262144 --variations-seed-version --mojo-platform-channel-handle=4168 /prefetch:81⤵PID:864