Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
f6f367b46590f7ac422b745c1014218b6869885c40ca99a6ba6ad58a63a71379.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f6f367b46590f7ac422b745c1014218b6869885c40ca99a6ba6ad58a63a71379.exe
Resource
win10v2004-20241007-en
General
-
Target
f6f367b46590f7ac422b745c1014218b6869885c40ca99a6ba6ad58a63a71379.exe
-
Size
2.3MB
-
MD5
7b6594e7173e4ceb5289beb37766540f
-
SHA1
136bc9aec75fe1b3b21822d390e4c465d37a1948
-
SHA256
f6f367b46590f7ac422b745c1014218b6869885c40ca99a6ba6ad58a63a71379
-
SHA512
7bd06f49b6eeffde5afb941ea14d6e8b5da68503cd8614415ee7ac0f8fc54fc61c20584027ed73db1ba285edda6da1e6b0d3b7aa352435996dd3b78ceca99210
-
SSDEEP
24576:x1r43sfARB7U4kieI1SqjEDKcSrJIvJiu/AxWtV:Pr43o67TrXIqjbcS6vJT6WtV
Malware Config
Extracted
babylonrat
doddyfire.dyndns.org
doddyfire.linkpc.net
Signatures
-
Babylon RAT
Babylon RAT is remote access trojan written in C++.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation f6f367b46590f7ac422b745c1014218b6869885c40ca99a6ba6ad58a63a71379.exe -
Executes dropped EXE 1 IoCs
pid Process 2976 ComputerBalance.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ProcessorDistrict = "C:\\Users\\Admin\\AppData\\Roaming\\ProcessorDistrict\\ComputerBalance.exe" f6f367b46590f7ac422b745c1014218b6869885c40ca99a6ba6ad58a63a71379.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2976 set thread context of 1380 2976 ComputerBalance.exe 114 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6f367b46590f7ac422b745c1014218b6869885c40ca99a6ba6ad58a63a71379.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ComputerBalance.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 1380 vbc.exe Token: SeDebugPrivilege 1380 vbc.exe Token: SeTcbPrivilege 1380 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1380 vbc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2976 2140 f6f367b46590f7ac422b745c1014218b6869885c40ca99a6ba6ad58a63a71379.exe 107 PID 2140 wrote to memory of 2976 2140 f6f367b46590f7ac422b745c1014218b6869885c40ca99a6ba6ad58a63a71379.exe 107 PID 2140 wrote to memory of 2976 2140 f6f367b46590f7ac422b745c1014218b6869885c40ca99a6ba6ad58a63a71379.exe 107 PID 2976 wrote to memory of 1380 2976 ComputerBalance.exe 114 PID 2976 wrote to memory of 1380 2976 ComputerBalance.exe 114 PID 2976 wrote to memory of 1380 2976 ComputerBalance.exe 114 PID 2976 wrote to memory of 1380 2976 ComputerBalance.exe 114 PID 2976 wrote to memory of 1380 2976 ComputerBalance.exe 114 PID 2976 wrote to memory of 1380 2976 ComputerBalance.exe 114 PID 2976 wrote to memory of 1380 2976 ComputerBalance.exe 114 PID 2976 wrote to memory of 1380 2976 ComputerBalance.exe 114 PID 2976 wrote to memory of 1380 2976 ComputerBalance.exe 114 PID 2976 wrote to memory of 1380 2976 ComputerBalance.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6f367b46590f7ac422b745c1014218b6869885c40ca99a6ba6ad58a63a71379.exe"C:\Users\Admin\AppData\Local\Temp\f6f367b46590f7ac422b745c1014218b6869885c40ca99a6ba6ad58a63a71379.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Roaming\ProcessorDistrict\ComputerBalance.exe"C:\Users\Admin\AppData\Roaming\ProcessorDistrict\ComputerBalance.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1380
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD549ae4ccc60586d2ba50cdd396cb8ad9a
SHA1931d94a05c97571b5f57205804d3eea31991d4ab
SHA256d325abf471ea5e92165cab1de8beacbbbcd9d2a71564cb3ff438df8079298c08
SHA5129daf0796e82c856ca95cf511772ebef5cdac8785deedf8073da86a436a97465c36c8411ccd46a8679a05a0dbf5973b8023f1e36d899768f892ee86a166448c9a