Overview
overview
10Static
static
4d9f0268cba...5f.zip
windows7-x64
1d9f0268cba...5f.zip
windows10-2004-x64
10d9f0268cba...AS.lnk
windows7-x64
10d9f0268cba...AS.lnk
windows10-2004-x64
10d9f0268cba...AS.pdf
windows7-x64
3d9f0268cba...AS.pdf
windows10-2004-x64
3d9f0268cba...AS.ps1
windows7-x64
10d9f0268cba...AS.ps1
windows10-2004-x64
10d9f0268cba...er.exe
windows7-x64
10d9f0268cba...er.exe
windows10-2004-x64
10Analysis
-
max time kernel
281s -
max time network
300s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-08-2024 14:47
Behavioral task
behavioral1
Sample
d9f0268cbaa1ae45dfa755adab9dda2d8bdff3c8bf8a00d23bbc6894c28e225f.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d9f0268cbaa1ae45dfa755adab9dda2d8bdff3c8bf8a00d23bbc6894c28e225f.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
d9f0268cbaa1ae45dfa755adab9dda2d8bdff3c8bf8a00d23bbc6894c28e225f/PANDUAN_PENGGUNA_MyKHAS.lnk
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
d9f0268cbaa1ae45dfa755adab9dda2d8bdff3c8bf8a00d23bbc6894c28e225f/PANDUAN_PENGGUNA_MyKHAS.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
d9f0268cbaa1ae45dfa755adab9dda2d8bdff3c8bf8a00d23bbc6894c28e225f/PANDUAN_PENGGUNA_MyKHAS.pdf
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
d9f0268cbaa1ae45dfa755adab9dda2d8bdff3c8bf8a00d23bbc6894c28e225f/PANDUAN_PENGGUNA_MyKHAS.pdf
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
d9f0268cbaa1ae45dfa755adab9dda2d8bdff3c8bf8a00d23bbc6894c28e225f/PANDUAN_PENGGUNA_MyKHAS.ps1
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
d9f0268cbaa1ae45dfa755adab9dda2d8bdff3c8bf8a00d23bbc6894c28e225f/PANDUAN_PENGGUNA_MyKHAS.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
d9f0268cbaa1ae45dfa755adab9dda2d8bdff3c8bf8a00d23bbc6894c28e225f/controller.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
d9f0268cbaa1ae45dfa755adab9dda2d8bdff3c8bf8a00d23bbc6894c28e225f/controller.exe
Resource
win10v2004-20240802-en
General
-
Target
d9f0268cbaa1ae45dfa755adab9dda2d8bdff3c8bf8a00d23bbc6894c28e225f/PANDUAN_PENGGUNA_MyKHAS.ps1
-
Size
627B
-
MD5
e7d2e1452702bc0de5a92e745dbdc4a9
-
SHA1
da8e9f9f43e29f02e5a0332239f38416f4dff844
-
SHA256
b348935e378b57001e6b41d96ae498ca00dd9fb296115a4e036dad8ccc7155d3
-
SHA512
28d2c9690f5f104e73404fa025bb09ca3c189b968716ac25f06f3e5c09ad719b17dc5319035f4172e91bb1c74797a4137f2a81f226f0d6ed25a900d1ba1b1293
Malware Config
Extracted
babylonrat
149.28.19.207
fund.sekretariatparti.org
Signatures
-
Babylon RAT
Babylon RAT is remote access trojan written in C++.
-
Executes dropped EXE 1 IoCs
pid Process 2168 controller.exe -
resource yara_rule behavioral7/memory/2612-12-0x0000000000340000-0x000000000040A000-memory.dmp upx behavioral7/memory/2612-13-0x0000000000340000-0x000000000040A000-memory.dmp upx behavioral7/memory/2612-15-0x0000000000340000-0x000000000040A000-memory.dmp upx behavioral7/memory/2612-14-0x0000000000340000-0x000000000040A000-memory.dmp upx behavioral7/memory/2612-17-0x0000000000340000-0x000000000040A000-memory.dmp upx behavioral7/memory/2168-27-0x0000000000430000-0x00000000004FA000-memory.dmp upx behavioral7/memory/2168-26-0x0000000000430000-0x00000000004FA000-memory.dmp upx behavioral7/memory/2612-45-0x0000000000340000-0x000000000040A000-memory.dmp upx behavioral7/memory/2612-47-0x0000000000340000-0x000000000040A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\USBController = "C:\\Users\\Admin\\AppData\\Roaming\\controller.exe" powershell.exe -
pid Process 3028 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language controller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language controller.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3028 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2612 controller.exe 2940 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3028 powershell.exe Token: SeShutdownPrivilege 2612 controller.exe Token: SeDebugPrivilege 2612 controller.exe Token: SeTcbPrivilege 2612 controller.exe Token: SeShutdownPrivilege 2168 controller.exe Token: SeDebugPrivilege 2168 controller.exe Token: SeTcbPrivilege 2168 controller.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2940 AcroRd32.exe 2940 AcroRd32.exe 2612 controller.exe 2940 AcroRd32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2940 3028 powershell.exe 31 PID 3028 wrote to memory of 2940 3028 powershell.exe 31 PID 3028 wrote to memory of 2940 3028 powershell.exe 31 PID 3028 wrote to memory of 2940 3028 powershell.exe 31 PID 3028 wrote to memory of 2612 3028 powershell.exe 32 PID 3028 wrote to memory of 2612 3028 powershell.exe 32 PID 3028 wrote to memory of 2612 3028 powershell.exe 32 PID 3028 wrote to memory of 2612 3028 powershell.exe 32 PID 3028 wrote to memory of 2168 3028 powershell.exe 33 PID 3028 wrote to memory of 2168 3028 powershell.exe 33 PID 3028 wrote to memory of 2168 3028 powershell.exe 33 PID 3028 wrote to memory of 2168 3028 powershell.exe 33
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\d9f0268cbaa1ae45dfa755adab9dda2d8bdff3c8bf8a00d23bbc6894c28e225f\PANDUAN_PENGGUNA_MyKHAS.ps11⤵
- Adds Run key to start application
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d9f0268cbaa1ae45dfa755adab9dda2d8bdff3c8bf8a00d23bbc6894c28e225f\PANDUAN_PENGGUNA_MyKHAS.pdf"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\d9f0268cbaa1ae45dfa755adab9dda2d8bdff3c8bf8a00d23bbc6894c28e225f\controller.exe"C:\Users\Admin\AppData\Local\Temp\d9f0268cbaa1ae45dfa755adab9dda2d8bdff3c8bf8a00d23bbc6894c28e225f\controller.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2612
-
-
C:\Users\Admin\AppData\Roaming\controller.exe"C:\Users\Admin\AppData\Roaming\controller.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD547a53d36c2693f0bada46b10a536e07c
SHA1d0ca0a5beae6bf78b16e41a897dec23f522ccddd
SHA256b4ac3ef05bcf66a4dac3cc0a6b80054a94f49a69bc0866fe3e61a75989021ae6
SHA512543db014cc76b3a78de1985e132c566d1cc13f0ccfcd44a6624a1638039d3992cd8a33d869cd5cf6a8c2d692da28b832820ebe51e0042132a45f9f022322f187