Overview
overview
7Static
static
323077a27be...18.exe
windows7-x64
723077a27be...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...TB.exe
windows7-x64
7$PLUGINSDI...TB.exe
windows10-2004-x64
7$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3GinoPlayer.exe
windows7-x64
6GinoPlayer.exe
windows10-2004-x64
6Interop.WMPLib.dll
windows7-x64
1Interop.WMPLib.dll
windows10-2004-x64
1Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3launcher.exe
windows7-x64
1launcher.exe
windows10-2004-x64
1Analysis
-
max time kernel
53s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 16:24
Static task
static1
Behavioral task
behavioral1
Sample
23077a27be48f8eaf5734896d581fb72_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
23077a27be48f8eaf5734896d581fb72_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/MyBabylonTB.exe
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/MyBabylonTB.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
GinoPlayer.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
GinoPlayer.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Interop.WMPLib.dll
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
Interop.WMPLib.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
Uninstall.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
Uninstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
launcher.exe
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
launcher.exe
Resource
win10v2004-20240611-en
General
-
Target
$PLUGINSDIR/MyBabylonTB.exe
-
Size
898KB
-
MD5
7c90f77d368cabea7b726a3758d6d761
-
SHA1
dd569e70a6786216bfeb2e06442f644d3ced4929
-
SHA256
960c95043c1ab3c4b4cd7b331cfe753ff1c5e641a3389161ffe7011d497b0c02
-
SHA512
769f962c38e1964cf03e27ce977863be1bda7452cd2000c764387d70a7d43dd78d693dadf2fe5eebdb163069cc0781871907efd70a184b69f706c034a237bae6
-
SSDEEP
24576:mntSf1MvRztcBax4ckpSy+k50pdEGlWU3W:mt81MpByaxTEf03h3W
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2968 Setup.exe -
Loads dropped DLL 5 IoCs
pid Process 2560 rundll32.exe 4840 rundll32.exe 3556 rundll32.exe 1996 rundll32.exe 3748 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Setup.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\IESettingSync Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Setup.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Test.cap Setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\TEST.CAP Setup.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2968 Setup.exe Token: SeTakeOwnershipPrivilege 2968 Setup.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2968 Setup.exe 2968 Setup.exe 2968 Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1036 wrote to memory of 2968 1036 MyBabylonTB.exe 81 PID 1036 wrote to memory of 2968 1036 MyBabylonTB.exe 81 PID 1036 wrote to memory of 2968 1036 MyBabylonTB.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\MyBabylonTB.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\MyBabylonTB.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\C7981E0C-BAB0-7891-B4C8-1F06D44729EC\Setup.exe"C:\Users\Admin\AppData\Local\Temp\C7981E0C-BAB0-7891-B4C8-1F06D44729EC\Setup.exe" Files\Common Files2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2968 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\C7981E~1\IECOOK~1.DLL,UpdateProtectedModeCookieCache URI|http://babylon.com3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2560
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\C7981E~1\IECOOK~1.DLL,UpdateProtectedModeCookieCache affilID|http://babylon.com3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4840
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\C7981E~1\IECOOK~1.DLL,UpdateProtectedModeCookieCache visitorID|http://babylon.com3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3556
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\C7981E~1\IECOOK~1.DLL,UpdateProtectedModeCookieCache trkInfo|http://babylon.com3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1996
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\C7981E~1\IECOOK~1.DLL,UpdateProtectedModeCookieCache trkInfo|http://babylon.com3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD5db5e9ad61b4b79e90a234d03e477f4df
SHA168f39fdc5c97b7d3b93a4b793e3e9daf1ed75344
SHA256c55f47f36d379832a290ce11ae31341587a366e563888e5849e421750ec5bee8
SHA5126b5b7eec611fd31df92dc209d27b656dedacd678b328d9b01a52617d4a9e8eff8e86cb7919d10b2056696177cc10d7b7718d8e512e2da07673e164ec4ec392cc
-
Filesize
10KB
MD58e6b33a7f03e2693a614002587a35ddd
SHA1c7508aa4225cae079526f90d218cb1245b996667
SHA256504baa961bfc83a0da0a7b5ab45f713a81b06642602f3d4c032fae8a1391be30
SHA512ef8891b1183a8c19afa4c41cb9a443ebda58f5b82b372b25c0b7e7eacf32b8c9c8d8e0ebdd946b860b111431ed5e613db9c141e66f398715e4000770834d2e41
-
Filesize
3KB
MD5f42ef9814569ec9f8c120d0ed4914326
SHA1ec41ceb084d6a4c4a001929dbbd7d589d78a6994
SHA256f7c80d69aefe9999bdb82e1fadd400945d8e0bc958cfbeb23dd8d2f547a58e0e
SHA512f2d06c6a052715e247f9a53e25c8d1e275b616d82789af7fa9ac8f838d5238f0a8364f5419e3b06c358d1ab227c5694a7ce19373307646eb708b136382c26beb
-
Filesize
3KB
MD561326fe65b7ab277221d5fd3c3d8154f
SHA1292d39c304209e0c87cbab00f8c5c37fcd0b1887
SHA256055cc4086e5c6f5991aab46999cb147c155a1b4bd4675b1fe673ccc8527dbd07
SHA5121f77de3af5266342429baf3e26ac71b5d476026213cb2a06f74b37251e4ba442f468b49c5691c4a0563373dfe4274bd606cf8bbb5033bacc2cd665a31022b93c
-
Filesize
77KB
MD51636d09667d7915d32f5c1b157942d70
SHA1d1cf1cc5605a37dca84c5b7ae7185c06059974b0
SHA2561815293d1d5e20d2798a09938212f92647d5e9096c75c566b75a61fe04b0b2b9
SHA512a624e6e84a650eff6462fc0c504a9eea79f9e5174e5a97f26bd4fce02862681e71ad8a04530336454bf2264ae657ce8c9b5bcec4f423cef8184ea2aed788b749
-
Filesize
25KB
MD5d494998cd34c0ff5973635026f0805d6
SHA141ad724f4579b944b6f0fee5c1e21b7556d131e3
SHA256430ca1aac14605774a79f057a628305e0861d8adb095d3c347ea9f4179cdcd17
SHA51207f7668286f25c7c6b61bdea85f26f52b3e5931ca0e1aa1ab02405c7c90936de5ba195541822fd9ad3f9cd6fd44a7947f27f4f1fd74211ed83d96bd910c8cfc0
-
Filesize
3KB
MD526621cb27bbc94f6bab3561791ac013b
SHA14010a489350cf59fd8f36f8e59b53e724c49cc5b
SHA256e512d5b772fef448f724767662e3a6374230157e35cab6f4226496acc7aa7ad3
SHA5129a19e8f233113519b22d9f3b205f2a3c1b59669a0431a5c3ef6d7ed66882b93c8582f3baa13df4647bcc265d19f7c6543758623044315105479d2533b11f92c6
-
Filesize
3KB
MD5d4c0d08d93a6dd53b2ce883f4ad8f22c
SHA13cae3a2011e1b470def8e1e8446338aec3cee003
SHA256360fc111e7210a166e739b2ecd666e7c612f3c8871dc0a6e854e6613fe8e0a18
SHA5123d2134b95c46715ced09769f0c9a3b593ff49bc705b4606aa300c08e35686dfd83eabef8cbfed8cad3709efce128d0395929b6c2268ae57342e94e3554324b25
-
Filesize
4KB
MD529d9063a9364656b7fca644a6b1787e8
SHA13b3d72585b030544ef2e8c5c8b1fa2945a828a25
SHA2567deb6d31eb6a22ca95a4a88f26f99143f8a3d2e9041fb06614589332d362b6ef
SHA5128cf756c1577fafc3c0f8fd32e77efb61e77363941519434a0db9ac7a1cf2a666348a1e28728d7b8249c4779d0c773bc24dc51d5194d2606e9a07e883a8ba5342
-
Filesize
7KB
MD5b256a4b205477a42e0ff9dffb970798e
SHA1786d14051995ced77ce2c8e5b0c536682996b34e
SHA25657479e66687f58766dc6720c8fad8b5b8b5936103f52d1a1cbaa00d05afae5c2
SHA512ea87d201da7618dd41a4d1c80b5218ec98c9bc051796360db2630d63490af8685cf99e183ab06d11378e9ad621a084ffb1ca975e38447974c35a4c8dbd4cc78b
-
Filesize
3KB
MD54a26ecdeecfb5bd336096c42f2de6d68
SHA132901acbdc53fab44f926868874a12ae5257c0d9
SHA2568a045229d5eb1bf50f095d96ad77532d2e9f3c928b23838fbbae034f0063255f
SHA512b3589302ac1dd25556962591f6c28617bd4e2e98cc405f4318dcaaca85de5fcf5ccfa1ff44076b7ce15e576070158d8256476b46fc10675c5b716db022bed1b7
-
Filesize
2KB
MD5613f21fd9be71493f7f0f7f289faba46
SHA13085884627bb5cbe1af9c29e9acaf353299b192f
SHA256dc7e17ccfdf805ea69c553abdea2b6a86fd27ec68d58f759b9a85e5a4be98e17
SHA5123be478d24f712d2b4ca3d9142fc446986426290678ddc89518155e7c46a6bae5659b9a748b30eb26ba20323c9d9a2c67e7dfe770d0689ab1548a9a48568df8ab
-
Filesize
3KB
MD5fd652a422b85b3e5a13862375e2d80ed
SHA1a3316ca7e787eddb0ddc5c16b9d4d1e0359eb3b3
SHA256e9f27b584301bc168a086931785a54b0f1e50f275ffe29dab64d073a6ed464fd
SHA5123bebe03287dfbc604211af784223a5d6d8ba6e1e791b94838fdfcd0ae8c40a31dfa1024d2e643dc573557ba17f37561789066370f2476905a663af694a1027f2
-
Filesize
3KB
MD559658b575f68f8cc30e5790720e705de
SHA1168dbe10003f0fc25ad4f9a08379642d696e7912
SHA2566b1584d3370a4dd55e328723a4cefd3397f2841ded01ab3f817214448d5664d5
SHA51231e511828c72bba656dd23023e5c5d350c44ddbf05204601beafb948b88c7dd5547af99f438c0c2f68c6b39cf147b5958587e2bba93e5d44eae2b21eeba752f4
-
Filesize
1KB
MD53acbc4a0b720fd5daff11530ae9e0295
SHA123031d0a31bc05de190843a9b0d8b3745c796385
SHA25659b5de1efe45a796fab6130ee94db0dc13be896ab798e126cb2c5889aead32b7
SHA512abc4815f7df7f65c57c61facd568616c9b844cdfea8d12ae819987dcec256d82c7ef040c1df24be2ddef0b42601f1a8e22755b7320d1fcbcee0dd94055092b62
-
Filesize
667B
MD5c4f7cc784a074a1f6e27cab8afb994fd
SHA1a826ea520097a30867f191c628d27d727aa669a0
SHA2564ab7495b6e019e3c753aea8821d3d4786f25afd8692a87265288d00132e122ec
SHA512c742fbebed175e12f75ef91173c73312b63e135a356763825b66ca08e3306d3157ed3fbc1de6ed6144a91b8efa596b7f7752b3ef1889ff7061119083b83d27a6
-
Filesize
25KB
MD512ef76069cc40b8ad478d9091915ded6
SHA1fabad560b6e6839f9e5ae1268695d11ca35f9d74
SHA2564be568ed2044e1b74bc1d61d13ce71080e5a9717ed481616a6efc1ec4c35dd0c
SHA5125625082a87aa75266c9680a4f4b31eb7b1df084bba6c7e2e70512f232556f9029af06a0a63b342ffc220bf3797cc09f333437fe26547ea6494913f1c59b2e067
-
Filesize
44KB
MD5a9e1f1f2b2628c6ee61c1e11c7288baf
SHA148b2f87ad6bc5d7cdc22500df46a967acb077cfa
SHA256c336644e20a898fc28b216d91908c9ed4b716f572c0b06d5b3a5a68e43c6aeb9
SHA5123027aead5dc0a2de2dfe7bbdaefeac1dfc1829db1edcd60493f51bbe3d3f75363b938f60a2cc6c46dd9992d9c33df5f8ab7a62e4235ca0858358cb73ad2dc514
-
Filesize
19KB
MD556dc3cb42b46309e642c15167003685d
SHA1045749de2c1492e5dfc4c44f9eb6c0feefe06b3d
SHA256bc488502223b3369dd657e8bac70abc42ffde2223a0661fb507c8ec87778bca1
SHA5125f3dc868d6e128407e071d6d7d7b9d0bbe7e45a32ff76985dfa53fe9dad0f5fb372ce64d35170c3719a06dd6762e4bb33089bfaedf93e6064c06c74a21b65a60
-
Filesize
2KB
MD51385093e8869c3de726a0d5e04d1da97
SHA168ec235899825f9529c86147ee36e52437a0750b
SHA256dac95d45107e929298649746c75d475d68321ef1f85e3a7d492974a4ea9120d3
SHA5124041b3649a459baeaf75604d509149baf3811898689b44b81bd16bfe1b97e28f6d246120cd03bb230fd84995b1b36843fbfc3af9860f6ef3491e48cc40e0cdda
-
Filesize
1.7MB
MD5ca99dd593a24a7369d07ddef76023819
SHA1c88d76106c34d093167bd69b433cff15f24cfe68
SHA25626da2d1f83383091e735b74e10c87d69368817c5403c6757537eaeff0982173e
SHA512a3f2fb49e8c9be8e7f3fd205983985876e3b04dc097aeb237dc5f057bab54b3b39324820ca3028e19439f5abbeae09dc6bc81f4af7811c1430ef57fd32d93b4f
-
Filesize
76KB
MD534546aee591222803ec21650738ae9ee
SHA12ec0abb3af0dae627a93f10e1c96adaa02f59913
SHA25654649f1a6a7259e2cb59f9c6ddb1e7dd7c8393dcf07bd1aa9b1590560c400eed
SHA5126f84a7ec4ae8cdcc62bef4fe587a34d61ae12a9bcc77c8f2bc593621da7bf8693a4a2076adff7079bf9c17468367ac387d8e5064e14b6d3f6a63d5139c483d95
-
Filesize
181B
MD528faa959d9d1ed6b34cdee923798c719
SHA166d1a274fb14c9265c2576e43fc087912f9019a8
SHA25610c37eb401f44949f9c7be2426f2fb8b62f5b0b44993caf2085a501afd8126c3
SHA5127f210aab5b0f467d386a4ca217d377db4419cdb22a09de09587cab95a4390d63cb2a1929713934c32dc4c20a48a3914334d4ae3e268f63b94c6519584e68f07b
-
Filesize
236B
MD51ee8c638e49ee7137607722768afc5a2
SHA18719d7a498a49b042cd6fc411cac6c44f3c0f43a
SHA2561368324e8df1654fb9c3bcae320e982ff9f40e76e0cc118d5f507649e1ec2f2e
SHA5122acb5547bb9b62505a5332e3b2752c5004fee9579bc45c46271e53d42fff5f412f3a18863ed382052d961d33d0e0449d9c111950060663660d7dbb21e9bff575
-
Filesize
174B
MD54f6e1fdbef102cdbd379fdac550b9f48
SHA15da6ee5b88a4040c80e5269e0cd2b0880b20659c
SHA256e58ea352c050e6353fb5b4fa32a97800298c1603489d3b47794509af6c89ec4c
SHA51254efc9bde44f332932a97396e59eca5b6ea1ac72f929ccffa1bdab96dc3ae8d61e126adbd26d12d0bc83141cee03b24ad2bada411230c4708b7a9ae9c60aecbe
-
Filesize
508KB
MD50f66e8e2340569fb17e774dac2010e31
SHA1406bb6854e7384ff77c0b847bf2f24f3315874a3
SHA256de818c832308b82c2fabd5d3d4339c489e6f4e9d32bb8152c0dcd8359392695f
SHA51239275df6e210836286e62a95ace7f66c7d2736a07b80f9b7e9bd2a716a6d074c79deae54e2d21505b74bac63df0328d6780a2129cdfda93aec1f75b523da9e05
-
Filesize
5KB
MD5d1a5aebe2a21c95d965372831fa1befc
SHA1d128cbaf3def02bd11a92a43c36d540e47bf06e0
SHA256070fdc276b32d07a840ff89982dbf164128320020e87495f3a9fa0f60546634b
SHA5123ac7326bd101a02ecdda60a66d4b19b13de4b2bc97beeb0500d80e5e926ae568538f50e7a521ea1fe44325188f5423f770f63e526090e78f1fbaa0a6ed398c4a