Analysis

  • max time kernel
    149s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-11-2024 21:08

General

  • Target

    3004ccb109a29d66697eece46e437bfbd3a78aa801a8eb998d05d8774cc7528d.exe

  • Size

    2.3MB

  • MD5

    680aedcf312e4ae1d5929cff6404d047

  • SHA1

    b3199984d0ae28d4b09e31544361d0e693524160

  • SHA256

    3004ccb109a29d66697eece46e437bfbd3a78aa801a8eb998d05d8774cc7528d

  • SHA512

    eeb2b25c0f6e873ca04546fc19a1000313ea917c098dd18599398f25747349c6e84a7e744bdd1f80c4b70b2243a4e46f7c620c04b46cc74c89348263c20e4b83

  • SSDEEP

    24576:x1r43sfARB7U4kieI1SqjEDKcSrJIvJiu/AxWtn:Pr43o67TrXIqjbcS6vJT6Wtn

Malware Config

Extracted

Family

babylonrat

C2

doddyfire.dyndns.org

doddyfire.linkpc.net

Signatures

  • Babylon RAT

    Babylon RAT is remote access trojan written in C++.

  • Babylonrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3004ccb109a29d66697eece46e437bfbd3a78aa801a8eb998d05d8774cc7528d.exe
    "C:\Users\Admin\AppData\Local\Temp\3004ccb109a29d66697eece46e437bfbd3a78aa801a8eb998d05d8774cc7528d.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Roaming\ProcessorDistrict\ComputerBalance.exe
      "C:\Users\Admin\AppData\Roaming\ProcessorDistrict\ComputerBalance.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    834B

    MD5

    543ff9c4bb3fd6f4d35c0a80ba5533fc

    SHA1

    e318b6209faeffe8cde2dba71f226d2b161729af

    SHA256

    40c04d540c3d7d80564f34af3a512036bdd8e17b4ca74ba3b7e45d6d93466bcd

    SHA512

    6257994ac1ec8b99edcf0d666838a9874031a500adac9383d9b4242edc6c6ffec48f230740d443c1088aa911a36de26e7ce3b97313e3d36b00aede5352a8cf5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9A19ADAD9D098E039450ABBEDD5616EB_EB45958463869A839B2E6A0ABE8A149F

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A89DFCC31C360BA5CBD616749B1B1C5D

    Filesize

    73KB

    MD5

    eff6b1ce59935864f355237dfdd943ab

    SHA1

    1cfde1e55d8238da9327f683eb47c94d3e8227b4

    SHA256

    966c51a870f34da72f1c6d0e617848e1e516fa94f040461673f4848e8187a978

    SHA512

    e718bb98797f10d67eed3fab4d63a5aab5afb627337a2074daa3e794bec7f774ac697892ca3826d02c620559d6d4b96e0a8a09ffa11fa3d41715b4544ddf87cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6

    Filesize

    404B

    MD5

    a3b3678712f0cda0bf2d9553784272e1

    SHA1

    19c82422cdfe0c77d4a1623c677ccd69c9dbe37f

    SHA256

    d194e49fde1cd87f6128f5d2c9f32a0d09e23488ba7668fb41fa846e9bc60215

    SHA512

    ad731adf07ab4d369a4ff5c318cc5b81fcfae7f88df45c7d571f628baaa7e2a0423fd26d765d1af9f74dedd17776de5b9139fe23902534662c206dd45f8a8dbf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    188B

    MD5

    518d260eb7623743311d47600cc9f94b

    SHA1

    540ab6c671f5a7380c3215f59f8bb715a5350522

    SHA256

    30bbebf07dc4b1c852b35cd234462bffcf22b7d67c7f3f4f57b137a0ed6fbd51

    SHA512

    b0ee0ad346df7d8e22d5ede22b8b2b7731b2093cad7da942469f450f8ec1a987a9a8a31655138eadd0998bfed87d71baac3f00bfc9b04c50ff1b8091f0aafdaa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ddf86991e52415f0ee8e141fbaafcfb

    SHA1

    cba30cb368e6caaf4ce767bf849011133ea582ff

    SHA256

    e62c794adc79e732388764751b227e5a24bb023fa620daa13d3c11cd6fd74839

    SHA512

    d6f6a037a6a8674f9f35756b532a61e7971ba11e73d2511789ae5067e0806e418a6ac69858a0c7be5f157ccd3faa2458c156f8fbbbae425e073bd1cca0c6aa33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3640c84df7f1915d5bfaf4acadefd74b

    SHA1

    02d487bb31f57a0b179492dda25d6fcea2750b79

    SHA256

    a456ca8585a1b62f9f5cd56cf46f67ed5233a496060329d7a1b08404f1f2ffc5

    SHA512

    4696b681326c7b3f9b88c278a85e0b4df5395bde7de171dec586a43093f2b5417741f42bce37a78ee4cb0254f38327020a25c6180efbaab54de7a52331b39338

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9A19ADAD9D098E039450ABBEDD5616EB_EB45958463869A839B2E6A0ABE8A149F

    Filesize

    394B

    MD5

    0a3c54672bf5a17589e019e7a6d9348b

    SHA1

    a98344d47edc92227a355a0f848a7cd7b49ee642

    SHA256

    cae7c710e3a866f9dac174710a7862d2f58468debe71914fc012ac469ced80fe

    SHA512

    47c291faba2c7e128c395d84c593a25dff9f685d6d88119573b2fa67ecf06a4be0f07c75b0460dca8ed52d7a401cc11ebea6438ee5abcd7efdd59d134c958af0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A89DFCC31C360BA5CBD616749B1B1C5D

    Filesize

    170B

    MD5

    3c86f5ba95c40946ffadc0082be26df6

    SHA1

    a72237c86891d8f848384448ebc2edff1ee8f846

    SHA256

    782e647e4d97b771d71fea03f449c5f0bdd854aacec4274d69228287a0620b23

    SHA512

    f9cab0d5bd8beaa9e866a711fd87d3df1a1c2fbce07c05507a6bdf9ead27647bcd0cca13210d441e19a83ac5d566186327817419000a350df42add075533ac47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    889eee0289eac4326f3e1bed22508268

    SHA1

    33c986ea7b263c8daed067a44b29446c1bec1546

    SHA256

    41b1965a5ff6bcb406df9bff360e3ca13e3749eca9eeb55f84bf51817d001c82

    SHA512

    9b90ca7307d64d0a7a7b804d83dc8d8ee1745c512b346ce2f2a30f27d23da4d259e05fd824589f8708123fce61b8fada53eaf4b32c183b628faf7d5e653ae937

  • C:\Users\Admin\AppData\Local\Temp\CabC6AB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC6CD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\ProcessorDistrict\ComputerBalance.exe

    Filesize

    2.3MB

    MD5

    77a0a99e974dd756a4b641156036b1b2

    SHA1

    d7d1a8e791f9c49c0cfa01f8b5883c3da24c3feb

    SHA256

    35332ce2f90536954149b8f4a5aa8c0f4653100703d3991c24c054412061d17d

    SHA512

    a229b47caeb0a80c98dc6492a47c29f39756bf69ccf417758815f7295f8e47ccab0cf501c736d133080f9b2c2890828e4804465ba8b908ca4f5207a482568ae5

  • memory/1704-187-0x00000000740E0000-0x000000007468B000-memory.dmp

    Filesize

    5.7MB

  • memory/1704-122-0x00000000740E0000-0x000000007468B000-memory.dmp

    Filesize

    5.7MB

  • memory/1704-120-0x00000000740E0000-0x000000007468B000-memory.dmp

    Filesize

    5.7MB

  • memory/1704-194-0x00000000740E0000-0x000000007468B000-memory.dmp

    Filesize

    5.7MB

  • memory/1704-123-0x00000000740E0000-0x000000007468B000-memory.dmp

    Filesize

    5.7MB

  • memory/1940-188-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1940-193-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1940-199-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1940-198-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1940-195-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1940-192-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1940-190-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1940-189-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1940-191-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2076-108-0x00000000740E0000-0x000000007468B000-memory.dmp

    Filesize

    5.7MB

  • memory/2076-121-0x00000000740E0000-0x000000007468B000-memory.dmp

    Filesize

    5.7MB

  • memory/2076-0-0x00000000740E1000-0x00000000740E2000-memory.dmp

    Filesize

    4KB

  • memory/2076-107-0x00000000740E0000-0x000000007468B000-memory.dmp

    Filesize

    5.7MB

  • memory/2076-1-0x00000000740E0000-0x000000007468B000-memory.dmp

    Filesize

    5.7MB

  • memory/2076-9-0x00000000740E0000-0x000000007468B000-memory.dmp

    Filesize

    5.7MB