Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 18:25 UTC
Behavioral task
behavioral1
Sample
e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe
-
Size
733KB
-
MD5
e31e48662574f7d126ce9f34270a5798
-
SHA1
3febe03da0c9b11564a19e7712480b57824c15d0
-
SHA256
39133c4007c2cb44673d950bf599f0d0ed399adda1ebda2796845fe658653dbb
-
SHA512
92e48e39559bb042765d9decf7ec83e8cb807ef7d25ff0955f7d6b595edb536ee7430722d3fb895b9f8e790346595d2a7d443ee45d0aae66fb16a7184c3f78a9
-
SSDEEP
12288:NqzcpVgUXzL0TTUKZHTNloEkOpnKgofuIwV6eAj0SZxxXMcEen3paPcg:NqzcpKIL0TvZzNlNky0wVW0SZxJVg
Malware Config
Signatures
-
Babylon RAT
Babylon RAT is remote access trojan written in C++.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4756 3944 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 5402⤵
- Program crash
PID:4756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3944 -ip 39441⤵PID:1056
Network
-
Remote address:8.8.8.8:53Request97.17.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request14.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request203.142.123.92.in-addr.arpaIN PTRResponse203.142.123.92.in-addr.arpaIN PTRa92-123-142-203deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request86.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.126.166.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request217.135.221.88.in-addr.arpaIN PTRResponse217.135.221.88.in-addr.arpaIN PTRa88-221-135-217deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request10.179.89.13.in-addr.arpaIN PTRResponse
-
71 B 145 B 1 1
DNS Request
97.17.167.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
14.160.190.20.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
203.142.123.92.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
86.23.85.13.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
56.126.166.20.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
217.135.221.88.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
10.179.89.13.in-addr.arpa