Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-10-2024 21:42
Static task
static1
Behavioral task
behavioral1
Sample
4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe
Resource
win10v2004-20241007-en
General
-
Target
4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe
-
Size
1.4MB
-
MD5
19ef79416734ed2c19e14778f3492830
-
SHA1
f7b278023891bc8cf9452b45c9a49b908b3ee012
-
SHA256
4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebf
-
SHA512
d16142a282c4918aaef36299eba0b339085d587473bc30635bc8e4091543b924e57f832bba93a0fb1399ce6799cc7b05571e497d4fdb42ca996357ff15651f73
-
SSDEEP
24576:MAHnh+eWsN3skA4RV1Hom2KXMmHal6Tayml+2DlX+eW+zO5Zq2WLCnZyhl9vISJe:rh+ZkldoPK8YalEaRY2D8ecgXhlCv
Malware Config
Signatures
-
Babylon RAT
Babylon RAT is remote access trojan written in C++.
-
Babylonrat family
-
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 328 set thread context of 2136 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 31 PID 328 set thread context of 2836 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 32 PID 328 set thread context of 2920 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 33 PID 328 set thread context of 2408 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 34 PID 328 set thread context of 2660 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 35 PID 328 set thread context of 2628 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 36 -
resource yara_rule behavioral1/memory/2136-1-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2136-7-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2920-46-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2408-43-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2408-59-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2920-42-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2136-62-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2836-29-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2836-21-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2136-20-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2136-19-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2136-6-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2136-4-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2136-2-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2136-63-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2136-65-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2136-66-0x0000000000400000-0x00000000004C9000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2136 powershell.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeShutdownPrivilege 2136 powershell.exe Token: SeDebugPrivilege 2136 powershell.exe Token: SeTcbPrivilege 2136 powershell.exe Token: SeShutdownPrivilege 2836 powershell.exe Token: SeDebugPrivilege 2836 powershell.exe Token: SeTcbPrivilege 2836 powershell.exe Token: SeShutdownPrivilege 2920 powershell.exe Token: SeDebugPrivilege 2920 powershell.exe Token: SeTcbPrivilege 2920 powershell.exe Token: SeShutdownPrivilege 2408 powershell.exe Token: SeDebugPrivilege 2408 powershell.exe Token: SeTcbPrivilege 2408 powershell.exe Token: SeShutdownPrivilege 2628 powershell.exe Token: SeDebugPrivilege 2628 powershell.exe Token: SeTcbPrivilege 2628 powershell.exe Token: SeShutdownPrivilege 2660 powershell.exe Token: SeDebugPrivilege 2660 powershell.exe Token: SeTcbPrivilege 2660 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2136 powershell.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 328 wrote to memory of 2136 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 31 PID 328 wrote to memory of 2136 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 31 PID 328 wrote to memory of 2136 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 31 PID 328 wrote to memory of 2136 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 31 PID 328 wrote to memory of 2136 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 31 PID 328 wrote to memory of 2136 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 31 PID 328 wrote to memory of 2136 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 31 PID 328 wrote to memory of 2136 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 31 PID 328 wrote to memory of 2836 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 32 PID 328 wrote to memory of 2836 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 32 PID 328 wrote to memory of 2836 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 32 PID 328 wrote to memory of 2836 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 32 PID 328 wrote to memory of 2836 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 32 PID 328 wrote to memory of 2836 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 32 PID 328 wrote to memory of 2836 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 32 PID 328 wrote to memory of 2836 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 32 PID 328 wrote to memory of 2920 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 33 PID 328 wrote to memory of 2920 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 33 PID 328 wrote to memory of 2920 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 33 PID 328 wrote to memory of 2920 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 33 PID 328 wrote to memory of 2920 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 33 PID 328 wrote to memory of 2920 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 33 PID 328 wrote to memory of 2920 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 33 PID 328 wrote to memory of 2920 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 33 PID 328 wrote to memory of 2408 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 34 PID 328 wrote to memory of 2408 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 34 PID 328 wrote to memory of 2408 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 34 PID 328 wrote to memory of 2408 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 34 PID 328 wrote to memory of 2408 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 34 PID 328 wrote to memory of 2408 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 34 PID 328 wrote to memory of 2408 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 34 PID 328 wrote to memory of 2408 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 34 PID 328 wrote to memory of 2660 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 35 PID 328 wrote to memory of 2660 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 35 PID 328 wrote to memory of 2660 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 35 PID 328 wrote to memory of 2660 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 35 PID 328 wrote to memory of 2660 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 35 PID 328 wrote to memory of 2660 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 35 PID 328 wrote to memory of 2660 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 35 PID 328 wrote to memory of 2660 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 35 PID 328 wrote to memory of 2628 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 36 PID 328 wrote to memory of 2628 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 36 PID 328 wrote to memory of 2628 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 36 PID 328 wrote to memory of 2628 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 36 PID 328 wrote to memory of 2628 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 36 PID 328 wrote to memory of 2628 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 36 PID 328 wrote to memory of 2628 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 36 PID 328 wrote to memory of 2628 328 4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe"C:\Users\Admin\AppData\Local\Temp\4b020e512f2fedbc6cbcf046222d21fd169ae2a21ce943838100423275aadebfN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2136
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2628
-