Overview
overview
7Static
static
33e6273c13b...18.exe
windows7-x64
73e6273c13b...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...TB.exe
windows7-x64
7$PLUGINSDI...TB.exe
windows10-2004-x64
7$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3GotClip.exe
windows7-x64
1GotClip.exe
windows10-2004-x64
1launcher.exe
windows7-x64
1launcher.exe
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 18:21
Static task
static1
Behavioral task
behavioral1
Sample
3e6273c13b864518c46990f31b6e4440_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3e6273c13b864518c46990f31b6e4440_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/MyBabylonTB.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/MyBabylonTB.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
GotClip.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
GotClip.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
launcher.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
launcher.exe
Resource
win10v2004-20240709-en
General
-
Target
$PLUGINSDIR/MyBabylonTB.exe
-
Size
898KB
-
MD5
6bc41ba846a2e42c0aeee31a994f969a
-
SHA1
ef414742749b388d4f6a3fd2bcf089125b23fa2c
-
SHA256
a4b727bb1618decf1516f440974db01cef293272c096a81c5cf10f935bd847c7
-
SHA512
07a7d1c09d69227561df28b2423c8fbef5430fc2064ac760e9dbfca55698da66a363ad79bd6e6399ecf48f95b3db19237e35bad65c9d5ccf6e67866dcc4efa2f
-
SSDEEP
24576:5eYlVdeFg0QYKHlAkE182RJGLVuPdrS+7aheS:YiyrQYiBDnJuPFS+7aoS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4752 Setup.exe -
Loads dropped DLL 5 IoCs
pid Process 1216 rundll32.exe 4920 rundll32.exe 5032 rundll32.exe 4684 rundll32.exe 4100 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Microsoft\Internet Explorer\IESettingSync Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Setup.exe Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Setup.exe -
Modifies registry class 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\TEST.CAP Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Test.cap Setup.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4752 Setup.exe Token: SeTakeOwnershipPrivilege 4752 Setup.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4752 Setup.exe 4752 Setup.exe 4752 Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4672 wrote to memory of 4752 4672 MyBabylonTB.exe 82 PID 4672 wrote to memory of 4752 4672 MyBabylonTB.exe 82 PID 4672 wrote to memory of 4752 4672 MyBabylonTB.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\MyBabylonTB.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\MyBabylonTB.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\0DF56AE4-BAB0-7891-AC66-E491B411B969\Setup.exe"C:\Users\Admin\AppData\Local\Temp\0DF56AE4-BAB0-7891-AC66-E491B411B969\Setup.exe" Files\Common Files2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4752 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\0DF56A~1\IECOOK~1.DLL,UpdateProtectedModeCookieCache URI|http://babylon.com3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1216
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\0DF56A~1\IECOOK~1.DLL,UpdateProtectedModeCookieCache affilID|http://babylon.com3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4920
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\0DF56A~1\IECOOK~1.DLL,UpdateProtectedModeCookieCache visitorID|http://babylon.com3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5032
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\0DF56A~1\IECOOK~1.DLL,UpdateProtectedModeCookieCache trkInfo|http://babylon.com3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4684
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\0DF56A~1\IECOOK~1.DLL,UpdateProtectedModeCookieCache trkInfo|http://babylon.com3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4100
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD5d42ac5e3ecbd76776a4e4f0a57039401
SHA1a823d4d557d4deafbe264cc8760dbfe85c24c4a0
SHA2566052b6bccbe5354bd46f4ac69f2ef9d62e39f0d0b5a00a2d8c85a1197486b498
SHA51229db2ed2c78015e1aa58b466cbe1e135c7afbe08eb29e8ce643364a241fe20580ed4ec146ae32836bffaacef4ad6a49999ca51b2976c552d4b52b70204e2d2e5
-
Filesize
10KB
MD58e6b33a7f03e2693a614002587a35ddd
SHA1c7508aa4225cae079526f90d218cb1245b996667
SHA256504baa961bfc83a0da0a7b5ab45f713a81b06642602f3d4c032fae8a1391be30
SHA512ef8891b1183a8c19afa4c41cb9a443ebda58f5b82b372b25c0b7e7eacf32b8c9c8d8e0ebdd946b860b111431ed5e613db9c141e66f398715e4000770834d2e41
-
Filesize
3KB
MD5f42ef9814569ec9f8c120d0ed4914326
SHA1ec41ceb084d6a4c4a001929dbbd7d589d78a6994
SHA256f7c80d69aefe9999bdb82e1fadd400945d8e0bc958cfbeb23dd8d2f547a58e0e
SHA512f2d06c6a052715e247f9a53e25c8d1e275b616d82789af7fa9ac8f838d5238f0a8364f5419e3b06c358d1ab227c5694a7ce19373307646eb708b136382c26beb
-
Filesize
3KB
MD561326fe65b7ab277221d5fd3c3d8154f
SHA1292d39c304209e0c87cbab00f8c5c37fcd0b1887
SHA256055cc4086e5c6f5991aab46999cb147c155a1b4bd4675b1fe673ccc8527dbd07
SHA5121f77de3af5266342429baf3e26ac71b5d476026213cb2a06f74b37251e4ba442f468b49c5691c4a0563373dfe4274bd606cf8bbb5033bacc2cd665a31022b93c
-
Filesize
77KB
MD51636d09667d7915d32f5c1b157942d70
SHA1d1cf1cc5605a37dca84c5b7ae7185c06059974b0
SHA2561815293d1d5e20d2798a09938212f92647d5e9096c75c566b75a61fe04b0b2b9
SHA512a624e6e84a650eff6462fc0c504a9eea79f9e5174e5a97f26bd4fce02862681e71ad8a04530336454bf2264ae657ce8c9b5bcec4f423cef8184ea2aed788b749
-
Filesize
25KB
MD5d494998cd34c0ff5973635026f0805d6
SHA141ad724f4579b944b6f0fee5c1e21b7556d131e3
SHA256430ca1aac14605774a79f057a628305e0861d8adb095d3c347ea9f4179cdcd17
SHA51207f7668286f25c7c6b61bdea85f26f52b3e5931ca0e1aa1ab02405c7c90936de5ba195541822fd9ad3f9cd6fd44a7947f27f4f1fd74211ed83d96bd910c8cfc0
-
Filesize
3KB
MD526621cb27bbc94f6bab3561791ac013b
SHA14010a489350cf59fd8f36f8e59b53e724c49cc5b
SHA256e512d5b772fef448f724767662e3a6374230157e35cab6f4226496acc7aa7ad3
SHA5129a19e8f233113519b22d9f3b205f2a3c1b59669a0431a5c3ef6d7ed66882b93c8582f3baa13df4647bcc265d19f7c6543758623044315105479d2533b11f92c6
-
Filesize
3KB
MD5d4c0d08d93a6dd53b2ce883f4ad8f22c
SHA13cae3a2011e1b470def8e1e8446338aec3cee003
SHA256360fc111e7210a166e739b2ecd666e7c612f3c8871dc0a6e854e6613fe8e0a18
SHA5123d2134b95c46715ced09769f0c9a3b593ff49bc705b4606aa300c08e35686dfd83eabef8cbfed8cad3709efce128d0395929b6c2268ae57342e94e3554324b25
-
Filesize
4KB
MD529d9063a9364656b7fca644a6b1787e8
SHA13b3d72585b030544ef2e8c5c8b1fa2945a828a25
SHA2567deb6d31eb6a22ca95a4a88f26f99143f8a3d2e9041fb06614589332d362b6ef
SHA5128cf756c1577fafc3c0f8fd32e77efb61e77363941519434a0db9ac7a1cf2a666348a1e28728d7b8249c4779d0c773bc24dc51d5194d2606e9a07e883a8ba5342
-
Filesize
7KB
MD5b256a4b205477a42e0ff9dffb970798e
SHA1786d14051995ced77ce2c8e5b0c536682996b34e
SHA25657479e66687f58766dc6720c8fad8b5b8b5936103f52d1a1cbaa00d05afae5c2
SHA512ea87d201da7618dd41a4d1c80b5218ec98c9bc051796360db2630d63490af8685cf99e183ab06d11378e9ad621a084ffb1ca975e38447974c35a4c8dbd4cc78b
-
Filesize
3KB
MD54a26ecdeecfb5bd336096c42f2de6d68
SHA132901acbdc53fab44f926868874a12ae5257c0d9
SHA2568a045229d5eb1bf50f095d96ad77532d2e9f3c928b23838fbbae034f0063255f
SHA512b3589302ac1dd25556962591f6c28617bd4e2e98cc405f4318dcaaca85de5fcf5ccfa1ff44076b7ce15e576070158d8256476b46fc10675c5b716db022bed1b7
-
Filesize
2KB
MD52641599e885add2226fefafaafb80614
SHA146c7b4746589568b915da9bec5b728a3741cf26f
SHA25630cbfb5563400e7d889215c95fa38669d163653b460a8a1819139e65cccd2df0
SHA51210fe7caa3478602b437f3b20e79bc0d245ceb91332a05df6c657f75934decf312c3ad8a9f19fb751962897ecb7ad6d1d652195d1ac39273a161e9c2baad6ca91
-
Filesize
3KB
MD50600fea401bc17f17898655b334bb780
SHA1860e1ac3e24115f93f69996a8946cdc76e58d801
SHA25667f92f162a4ca44ce3e8a51383cd60e4a6b041d15c5660e7b326e8b1cb9e3346
SHA5126e1ceda35006a4d54ea2697a190758e72de1129e97f5f43af789f62880b69760104cb798375b42d6b7c6cd01b8d2f973b820f575a2bda0e813287aa889c19797
-
Filesize
3KB
MD5363f0f3d45f0216c0fe482ffd16d0675
SHA1591a0abd816777279a8800c78688ab7a89cd693c
SHA256ae4e3d3302a08fc1c618c0b828a4c7441ec94766f862767ef02a8ee4017feab2
SHA51201340365335a195cbd43d4ca510e743928153c0aa5c033ec43f0c228b24776430b266756f9f6ee77fc228533c5f0b3e97ba6603a1a515fb43f4ec0b85b375d40
-
Filesize
1KB
MD53100155ea6e7151ee06afc80f073b02c
SHA1355b119306516dc09cabd9213ec13889cdc02ffc
SHA256bd0437fc8cdab734dfbc7381112baf03ac38ee05d3247ae13b0aae339b9e4fb3
SHA5129eae0cabb66cbd57a37b16e28203fbefa7aefb931965894744d55bf3fd4d346807db1c4aaf7336a280ecc1504b86008118c425630cb694bccb02e663a19b260f
-
Filesize
667B
MD5c4f7cc784a074a1f6e27cab8afb994fd
SHA1a826ea520097a30867f191c628d27d727aa669a0
SHA2564ab7495b6e019e3c753aea8821d3d4786f25afd8692a87265288d00132e122ec
SHA512c742fbebed175e12f75ef91173c73312b63e135a356763825b66ca08e3306d3157ed3fbc1de6ed6144a91b8efa596b7f7752b3ef1889ff7061119083b83d27a6
-
Filesize
25KB
MD512ef76069cc40b8ad478d9091915ded6
SHA1fabad560b6e6839f9e5ae1268695d11ca35f9d74
SHA2564be568ed2044e1b74bc1d61d13ce71080e5a9717ed481616a6efc1ec4c35dd0c
SHA5125625082a87aa75266c9680a4f4b31eb7b1df084bba6c7e2e70512f232556f9029af06a0a63b342ffc220bf3797cc09f333437fe26547ea6494913f1c59b2e067
-
Filesize
44KB
MD5a9e1f1f2b2628c6ee61c1e11c7288baf
SHA148b2f87ad6bc5d7cdc22500df46a967acb077cfa
SHA256c336644e20a898fc28b216d91908c9ed4b716f572c0b06d5b3a5a68e43c6aeb9
SHA5123027aead5dc0a2de2dfe7bbdaefeac1dfc1829db1edcd60493f51bbe3d3f75363b938f60a2cc6c46dd9992d9c33df5f8ab7a62e4235ca0858358cb73ad2dc514
-
Filesize
19KB
MD556dc3cb42b46309e642c15167003685d
SHA1045749de2c1492e5dfc4c44f9eb6c0feefe06b3d
SHA256bc488502223b3369dd657e8bac70abc42ffde2223a0661fb507c8ec87778bca1
SHA5125f3dc868d6e128407e071d6d7d7b9d0bbe7e45a32ff76985dfa53fe9dad0f5fb372ce64d35170c3719a06dd6762e4bb33089bfaedf93e6064c06c74a21b65a60
-
Filesize
2KB
MD51385093e8869c3de726a0d5e04d1da97
SHA168ec235899825f9529c86147ee36e52437a0750b
SHA256dac95d45107e929298649746c75d475d68321ef1f85e3a7d492974a4ea9120d3
SHA5124041b3649a459baeaf75604d509149baf3811898689b44b81bd16bfe1b97e28f6d246120cd03bb230fd84995b1b36843fbfc3af9860f6ef3491e48cc40e0cdda
-
Filesize
1.7MB
MD55553fc878db68c806b07e588ad25e5ea
SHA145d1104ca6be51eda80b5994403e9abd523082a3
SHA256755b217185ad086661667431ece729f7e9bdc72ed1e4ef9f16a44b22027f8da5
SHA51232f3eeb4e4e17a3c663a56f52b8d6ad7649b53bad5920583580799f5dfbe537fba59e84a3e46935f50e38a95defb25bb3f4d0f17aad53860f7e5f9fb70c8c930
-
Filesize
76KB
MD534546aee591222803ec21650738ae9ee
SHA12ec0abb3af0dae627a93f10e1c96adaa02f59913
SHA25654649f1a6a7259e2cb59f9c6ddb1e7dd7c8393dcf07bd1aa9b1590560c400eed
SHA5126f84a7ec4ae8cdcc62bef4fe587a34d61ae12a9bcc77c8f2bc593621da7bf8693a4a2076adff7079bf9c17468367ac387d8e5064e14b6d3f6a63d5139c483d95
-
Filesize
181B
MD556809f064ee419ff7b0ff0924f0384ee
SHA15b0699fc791dca8b8933dc9b72dd35d8bd6f9cc2
SHA2560de8ca8c20612b8c46629a5da5c8e321ae0acae17a53a28c8d7439f46b4365bf
SHA5124dd3269596895ddd7fe554a65b2e51353e67dc0add49f5f70a35f327bae9deaa62d75e36522be2d69194db574b15f513eb3db7fd042179f1cbe84eaac618047b
-
Filesize
236B
MD51ee8c638e49ee7137607722768afc5a2
SHA18719d7a498a49b042cd6fc411cac6c44f3c0f43a
SHA2561368324e8df1654fb9c3bcae320e982ff9f40e76e0cc118d5f507649e1ec2f2e
SHA5122acb5547bb9b62505a5332e3b2752c5004fee9579bc45c46271e53d42fff5f412f3a18863ed382052d961d33d0e0449d9c111950060663660d7dbb21e9bff575
-
Filesize
174B
MD54f6e1fdbef102cdbd379fdac550b9f48
SHA15da6ee5b88a4040c80e5269e0cd2b0880b20659c
SHA256e58ea352c050e6353fb5b4fa32a97800298c1603489d3b47794509af6c89ec4c
SHA51254efc9bde44f332932a97396e59eca5b6ea1ac72f929ccffa1bdab96dc3ae8d61e126adbd26d12d0bc83141cee03b24ad2bada411230c4708b7a9ae9c60aecbe
-
Filesize
508KB
MD50f66e8e2340569fb17e774dac2010e31
SHA1406bb6854e7384ff77c0b847bf2f24f3315874a3
SHA256de818c832308b82c2fabd5d3d4339c489e6f4e9d32bb8152c0dcd8359392695f
SHA51239275df6e210836286e62a95ace7f66c7d2736a07b80f9b7e9bd2a716a6d074c79deae54e2d21505b74bac63df0328d6780a2129cdfda93aec1f75b523da9e05
-
Filesize
5KB
MD5ec251442edf171639b4b27112f6bcef1
SHA1e9966958672afc5363cd47f153ca2ed0c87112df
SHA256b5fa3fb04b49204e4f33acc8cd163c9a75383430b9a15cbaf02a8c2a02d8af12
SHA512fb0699a40d9a135df2867302f9f06a0bd8b3a90d72bf4588adc88c93db160e2f06d20fe2e6c5b052ca36cfc4e7c7ec7e760f76c4a25bef0952f4308271a8b392