Analysis

  • max time kernel
    148s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    24-10-2024 02:38

General

  • Target

    f6f367b46590f7ac422b745c1014218b6869885c40ca99a6ba6ad58a63a71379.exe

  • Size

    2.3MB

  • MD5

    7b6594e7173e4ceb5289beb37766540f

  • SHA1

    136bc9aec75fe1b3b21822d390e4c465d37a1948

  • SHA256

    f6f367b46590f7ac422b745c1014218b6869885c40ca99a6ba6ad58a63a71379

  • SHA512

    7bd06f49b6eeffde5afb941ea14d6e8b5da68503cd8614415ee7ac0f8fc54fc61c20584027ed73db1ba285edda6da1e6b0d3b7aa352435996dd3b78ceca99210

  • SSDEEP

    24576:x1r43sfARB7U4kieI1SqjEDKcSrJIvJiu/AxWtV:Pr43o67TrXIqjbcS6vJT6WtV

Malware Config

Extracted

Family

babylonrat

C2

doddyfire.dyndns.org

doddyfire.linkpc.net

Signatures

  • Babylon RAT

    Babylon RAT is remote access trojan written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6f367b46590f7ac422b745c1014218b6869885c40ca99a6ba6ad58a63a71379.exe
    "C:\Users\Admin\AppData\Local\Temp\f6f367b46590f7ac422b745c1014218b6869885c40ca99a6ba6ad58a63a71379.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Users\Admin\AppData\Roaming\ProcessorDistrict\ComputerBalance.exe
      "C:\Users\Admin\AppData\Roaming\ProcessorDistrict\ComputerBalance.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1480
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    834B

    MD5

    543ff9c4bb3fd6f4d35c0a80ba5533fc

    SHA1

    e318b6209faeffe8cde2dba71f226d2b161729af

    SHA256

    40c04d540c3d7d80564f34af3a512036bdd8e17b4ca74ba3b7e45d6d93466bcd

    SHA512

    6257994ac1ec8b99edcf0d666838a9874031a500adac9383d9b4242edc6c6ffec48f230740d443c1088aa911a36de26e7ce3b97313e3d36b00aede5352a8cf5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9A19ADAD9D098E039450ABBEDD5616EB_EB45958463869A839B2E6A0ABE8A149F

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A89DFCC31C360BA5CBD616749B1B1C5D

    Filesize

    74KB

    MD5

    d3bfcca956e75101065613c790179a9c

    SHA1

    851c1dbf9bc4d56e87f982bbba8fe942a731fbaa

    SHA256

    39523f862117c86fd724a85311da880be8386bc5c4163a5262fae036c6f2554f

    SHA512

    6c2c685097ff0cac974e13480141839640062d262c80f77e4a58dae6806a66634d378f510bdcf0af01fe3f151933755cc65009cd52c1b1fc90ec00413f93e69e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6

    Filesize

    404B

    MD5

    282ee1a654a3b01472f2b897dd7438c3

    SHA1

    d657d4434fcaf22c560d045d6b5eb4fa4d006ea4

    SHA256

    0f96fb22769a94cf06d9191d60d714d634b06dd984767dd3964e089846eb51ea

    SHA512

    616032e794309a8229641005599f548418276646af9e17e70adf805bc7ba7e41466c660a3c467b70e0bbfc68d573de77015ae36a2e4d1958957058c1cd98c35b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    188B

    MD5

    e01614138a0e44beec0c6d907de9e77e

    SHA1

    2a01a25e5eb0a642615ec0eaf6e1941028612b3e

    SHA256

    71d78424e03ea75b52175d0461f82fe2d94424ff2d2906b7ecd5570cd3332aba

    SHA512

    d77037147a1d6fecdf2b6fb2786665414f1c9f424e6d4ee96ee16f4c8dc207c2b465b94270116565fe24c55e52eff718a847a4c7af9ecebd4199b5b34f961046

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee9e5b338888a1134c82fd426e166636

    SHA1

    971a3ce2ebf7c689b731351fe311755605ed6b47

    SHA256

    75a969709fe0d44eb9cb80c3c538e7b43570f5abb10301e60d6f2e71b6ab0f2e

    SHA512

    5778a7e4eab45a91e0b08dd5594f21d10156adc075656ab356017ab58d6c714abc79bea00f367d331c0315811b91d0cb9e8e35ec781b88997d1639ae6678dbda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67c94030300b8ce610045a9c71d0db38

    SHA1

    1460229d748e10f4a78cfffcd5899ff1d8af9805

    SHA256

    f1e118e57b3f23e710a54a45e4d59bef8c8bf3fde6aee9c1a4057776cb8f414d

    SHA512

    11f004e3d2696bd117b26b84d9aad0c2f07b35ca6f19137727a362db807b30fd4816563eafeed8194d0271cbb101f637d0a2376a90499c133592092798c9e800

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9A19ADAD9D098E039450ABBEDD5616EB_EB45958463869A839B2E6A0ABE8A149F

    Filesize

    394B

    MD5

    18499f505c57b887f781efeacc1119ac

    SHA1

    d8ff72fe09c917013b4492b9a4f94a91f2b938f1

    SHA256

    8ce1977764c379bdbad66af1aef377b949bac9068d54ad4e1d026b2ff67dfb37

    SHA512

    612d3dfcb8a44707c8a16dd35258e408df998d940380d5a6ad1596c6746856d17b086b0e43bb774f45db3b71d796f4e049aa0abe80fcab51746f51066b58acb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A89DFCC31C360BA5CBD616749B1B1C5D

    Filesize

    170B

    MD5

    bdb0d6093eade6364733fb0aa4f4b37b

    SHA1

    e8610e4d5c0514a1fc77150c1dfe9b49a163bcce

    SHA256

    f4273d0e149b0b6f8882ab38503dd1ff77a8f4bf2d3bea875fbb47ebaf05a460

    SHA512

    711cf4b1d169c36cfbe702951c53258b7d9f92b0e7e5dc3ed6e666cb8f0ce873be1e8ef086cfcc8540d3bcb97d3c70d21866e568a33b447f2a62882833f91c4a

  • C:\Users\Admin\AppData\Local\Temp\CabD0A9.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD0DB.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\ProcessorDistrict\ComputerBalance.exe

    Filesize

    2.3MB

    MD5

    310fe54f36348eb54abc2720b6664fc4

    SHA1

    874fc90baa3949f52d1df567cd9fff4943977b86

    SHA256

    02346b931eb2a636e60f9ee3e5d66d7162b54f95b838e8dda0c087ae7cb4f181

    SHA512

    8d8c125e8edb4a739f2b1fc2ecb63ac69fc2e40787133a8e2ea81eb3e6b129eaf8826f0bf25b752d90dbdded8082f8d93d1eccda6ffea178d3aa664193e9c837

  • memory/1480-121-0x0000000074E80000-0x000000007542B000-memory.dmp

    Filesize

    5.7MB

  • memory/1480-122-0x0000000074E80000-0x000000007542B000-memory.dmp

    Filesize

    5.7MB

  • memory/1480-176-0x0000000074E80000-0x000000007542B000-memory.dmp

    Filesize

    5.7MB

  • memory/1480-180-0x0000000074E80000-0x000000007542B000-memory.dmp

    Filesize

    5.7MB

  • memory/2108-108-0x0000000074E80000-0x000000007542B000-memory.dmp

    Filesize

    5.7MB

  • memory/2108-120-0x0000000074E80000-0x000000007542B000-memory.dmp

    Filesize

    5.7MB

  • memory/2108-0-0x0000000074E81000-0x0000000074E82000-memory.dmp

    Filesize

    4KB

  • memory/2108-107-0x0000000074E80000-0x000000007542B000-memory.dmp

    Filesize

    5.7MB

  • memory/2108-2-0x0000000074E80000-0x000000007542B000-memory.dmp

    Filesize

    5.7MB

  • memory/2108-1-0x0000000074E80000-0x000000007542B000-memory.dmp

    Filesize

    5.7MB

  • memory/2384-179-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2384-178-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2384-177-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2384-183-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2384-181-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2384-184-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2384-186-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2384-188-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB