Analysis

  • max time kernel
    376s
  • max time network
    374s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-07-2024 01:20

General

  • Target

    BuilderBabylonRAT/Babylon RAT/Babylon RAT.exe

  • Size

    6.7MB

  • MD5

    aecdce1d7e2a637d1dcacd2b4580487b

  • SHA1

    d5cd12f7a18d6777c9ec8458694aa3a74fd23701

  • SHA256

    9157a48c53ca7a4543bac5b771886c87ea407bab6bbb053b50bc22709111d572

  • SHA512

    8bb5ad64f1b2e75e47c4671396a713018c74c44e84803887c6b4a200ea85f4c020ccfe15211af3899cdcf9d0f46ef994bfd939e462f61062044874f7a64d7a35

  • SSDEEP

    98304:KbldsCQTcsBL54TRRTk3w0ZIWoPzSSosDlh7OLifNLxu2UVaCS2e7Csb6j9cgl36:GnPsHqRwvoPzSSosDlhCKzi9/2BO4T

Score
10/10

Malware Config

Signatures

  • Babylon RAT

    Babylon RAT is remote access trojan written in C++.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BuilderBabylonRAT\Babylon RAT\Babylon RAT.exe
    "C:\Users\Admin\AppData\Local\Temp\BuilderBabylonRAT\Babylon RAT\Babylon RAT.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2744
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffac701ab58,0x7ffac701ab68,0x7ffac701ab78
      2⤵
        PID:3012
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:2
        2⤵
          PID:3480
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:8
          2⤵
            PID:3648
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2288 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:8
            2⤵
              PID:5000
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:1
              2⤵
                PID:4596
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:1
                2⤵
                  PID:2924
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3908 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:1
                  2⤵
                    PID:2760
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4464 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:8
                    2⤵
                      PID:388
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4484 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:8
                      2⤵
                        PID:5080
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:8
                        2⤵
                          PID:3488
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:8
                          2⤵
                            PID:5076
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5100 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:8
                            2⤵
                              PID:4764
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5312 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:1
                              2⤵
                                PID:2740
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5484 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:8
                                2⤵
                                  PID:2100
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5564 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:8
                                  2⤵
                                    PID:4728
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5732 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:8
                                    2⤵
                                      PID:2796
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5864 --field-trial-handle=1956,i,2050857838662015544,7597899685091105448,131072 /prefetch:1
                                      2⤵
                                        PID:3808
                                    • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                      1⤵
                                        PID:4032

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00000a

                                        Filesize

                                        154KB

                                        MD5

                                        ccb536a8bf8b76c8d17d2e5defaca6c5

                                        SHA1

                                        704914cabe15dd86b08813443d8fcabc188ed651

                                        SHA256

                                        77adc5c2a7c86d5de61cfb3a1c546f74ee27e6b7cb619ff54d3813377d193e0e

                                        SHA512

                                        c11a6400c4f877088473b4002237ed4a44c3e8e4631f91255f0c02854e0e902ce12c7e64f273a06838bd96a639d56cd70dec55e172d43e59b8c1f2d764735c2d

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                        Filesize

                                        2B

                                        MD5

                                        d751713988987e9331980363e24189ce

                                        SHA1

                                        97d170e1550eee4afc0af065b78cda302a97674c

                                        SHA256

                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                        SHA512

                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                        Filesize

                                        523B

                                        MD5

                                        4fe170397f2c6449944ccc1492905246

                                        SHA1

                                        7e4f01db1985ff5779b9ecfbf398927eb56592b4

                                        SHA256

                                        a1ae94bbcb5ec9c4f3b4a931d37735d6758a6f0d4e4a8695f4f8c91cb2449059

                                        SHA512

                                        eb21f69804b740219ce897ca705acc7ef95a2144ef85b064c0d66a2971e91468dd2eee4db046b9c69f37adf7778439d2447de4f946940bf75f4b32a9fded96d5

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                        Filesize

                                        523B

                                        MD5

                                        5227e4e2490b7b0f0c7cd05457e36d57

                                        SHA1

                                        da3bb32e547d1bb79d4471d37a56a2251b02d706

                                        SHA256

                                        2c7f4eb9246b176e80a7416827fb7a4e4c83448726543796ff9d60c903d93a66

                                        SHA512

                                        137e39aff163885b433f99460caf8ed10ac9d5ada1bba8b0d158301b5fbc9bca481920d5855f44f0827a1927e4bb5ac5991aff0a42a936bfb3c8ede8ce1b807e

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        7KB

                                        MD5

                                        fc2740ad7401cb3bd9fd46bd736603c7

                                        SHA1

                                        53a331a5bf5fa520f3470d3adaf715d885aa5273

                                        SHA256

                                        10135914687c1a86b96d294d1c85c9859f1c99f21b1a2294350f4558a470936b

                                        SHA512

                                        b6846ba4b89ad03954937548806ccb88fba2e220e82de1d2a04dcfd718ac5ee391a79d0170d0b480daf617067f4f80cea61443312e3ddfd8df2c1f328cd5d7aa

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        b5e6c6d9df69a199b8ad85c6b82e3382

                                        SHA1

                                        ef1ff46e5818797ac937953c21153c9eab708e64

                                        SHA256

                                        8877aa87032463a563b7c516b842c684619f75ef7ab34d1d6fd8c5434a99139d

                                        SHA512

                                        0510cefc900de66850b39d30d2e6a93f09ccb3a7e70dbfd1389ea88dd9d4615df108845c0ab1438050e899429c394631910b95442f842449d2321680902b2830

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        278KB

                                        MD5

                                        8e35d9021805cacb0e7aa97262d02117

                                        SHA1

                                        22a2d5f894790f937f02def7e8ddd7b0d14e7cb3

                                        SHA256

                                        8f5020650f140efb14f01330ed57b394d243fe345c260dceaf5b120890bf4868

                                        SHA512

                                        132e8cbf04f3868bb8734016f8efda7907020210c2ec850d37528b29712034b7484178057ec323710f5c1cd3f6f85a2030d110aebc9f006300f2c64ab30cf590

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        278KB

                                        MD5

                                        988295f0d62ed46c02446823c78556aa

                                        SHA1

                                        60b24608dfa077c85dd3caf5720bcfa37a3b6cdc

                                        SHA256

                                        313f94080a7f380a34641beed38c215998c8690fa692fb20290fef0283f311c7

                                        SHA512

                                        0a1015caa1784f7b9566d07ee6cb2f550819b5b199a5c85fa28efc8b4521832cd3aa81f7d8694b4d042b416ca24e1a79953c888c4b7ec4df7479803d8ca0e612

                                      • memory/2744-5-0x00000000055F0000-0x00000000055FA000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/2744-10-0x000000007462E000-0x000000007462F000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/2744-11-0x0000000074620000-0x0000000074DD0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/2744-12-0x0000000074620000-0x0000000074DD0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/2744-9-0x0000000074620000-0x0000000074DD0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/2744-8-0x000000000A820000-0x000000000A8BC000-memory.dmp

                                        Filesize

                                        624KB

                                      • memory/2744-7-0x0000000008CA0000-0x0000000008D0C000-memory.dmp

                                        Filesize

                                        432KB

                                      • memory/2744-6-0x0000000008240000-0x000000000825E000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/2744-0-0x000000007462E000-0x000000007462F000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/2744-4-0x0000000074620000-0x0000000074DD0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/2744-3-0x00000000080B0000-0x0000000008142000-memory.dmp

                                        Filesize

                                        584KB

                                      • memory/2744-2-0x0000000008580000-0x0000000008B24000-memory.dmp

                                        Filesize

                                        5.6MB

                                      • memory/2744-1-0x0000000000B20000-0x00000000011E2000-memory.dmp

                                        Filesize

                                        6.8MB