Analysis

  • max time kernel
    145s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    13-11-2024 01:28

General

  • Target

    ab55d958bbe9c65cd360a724fb0b19b642cb089387defdd8e748e15a4f377f45.exe

  • Size

    2.3MB

  • MD5

    268ee5fb777b47236bfdef31c8e33241

  • SHA1

    4ff784fc21c2f314c43cd562e6beb00a381a4aca

  • SHA256

    ab55d958bbe9c65cd360a724fb0b19b642cb089387defdd8e748e15a4f377f45

  • SHA512

    599d5eb1a30b7a19c15495b1ba353946332dd1666604e697669f52905e2e4c83c1a9b2bb6bb98a7f665fbfbff21a8879a2f9ef792c85a588737bee6554fbde3a

  • SSDEEP

    24576:x1r43sfARB7U4kieI1SqjEDKcSrJIvJiu/AxWts:Pr43o67TrXIqjbcS6vJT6Wts

Malware Config

Extracted

Family

babylonrat

C2

doddyfire.dyndns.org

doddyfire.linkpc.net

Signatures

  • Babylon RAT

    Babylon RAT is remote access trojan written in C++.

  • Babylonrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab55d958bbe9c65cd360a724fb0b19b642cb089387defdd8e748e15a4f377f45.exe
    "C:\Users\Admin\AppData\Local\Temp\ab55d958bbe9c65cd360a724fb0b19b642cb089387defdd8e748e15a4f377f45.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Users\Admin\AppData\Roaming\ProcessorDistrict\ComputerBalance.exe
      "C:\Users\Admin\AppData\Roaming\ProcessorDistrict\ComputerBalance.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1804
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    834B

    MD5

    543ff9c4bb3fd6f4d35c0a80ba5533fc

    SHA1

    e318b6209faeffe8cde2dba71f226d2b161729af

    SHA256

    40c04d540c3d7d80564f34af3a512036bdd8e17b4ca74ba3b7e45d6d93466bcd

    SHA512

    6257994ac1ec8b99edcf0d666838a9874031a500adac9383d9b4242edc6c6ffec48f230740d443c1088aa911a36de26e7ce3b97313e3d36b00aede5352a8cf5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9A19ADAD9D098E039450ABBEDD5616EB_EB45958463869A839B2E6A0ABE8A149F

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A89DFCC31C360BA5CBD616749B1B1C5D

    Filesize

    72KB

    MD5

    1b3569e60936739efa6088916a49d1a3

    SHA1

    4bef7cbcc05291b13dca48710b5198c5f3fafc6c

    SHA256

    a3144a3992f42b57bd38178892bb2e6751d5f99cc5d9eed9d1eb41a372a97cee

    SHA512

    ef95e4b3ecee8e6930b699f40d6464eee93c65f4d61b39c597d57ebb567231615182dc00636a010fe9910cf65c16929410cb004d2f045ca5ce11068360a9f313

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6

    Filesize

    404B

    MD5

    4204404c377a5440df4979e97d23414f

    SHA1

    e4aebb5ae1d9112148686abc0c47315b5c549415

    SHA256

    9f1f8b2ed0783941ca94ab533b2764025827959f9c19d5c02fc642644f8d4ee9

    SHA512

    331836e31f96d3cc90b5434872d548151802cc310f3084d8b05ed716e322233306cfe09c0ea32d6d6327927fc21b14e057a82f4c5434eb32c7bda580a5928301

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    188B

    MD5

    076763299e1ffc6aaadc5ea83c8a04a1

    SHA1

    6d86fb823fe81f57d3218da3fdc1a7e8afd2bebf

    SHA256

    a84cd59f0fcfd312f11256d73db61a1befe45e757189b17c29f6593b300d62ef

    SHA512

    1e8336651a44633425eb58d72d63b0b1ac421a0af24b32c0af69ad0aa9678b07cb992a10176adedfe0028fa33412614430f88334700754c13ea0461cd46d1464

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc7ae1b5840bac0afae5bd63f737936b

    SHA1

    eea7d3f63929229634145124c878bb8bb7dad016

    SHA256

    3ce2fb8e23670e86adbd42af1466b5f024be9025fc3fc656d62f7d33be403663

    SHA512

    8321da3c68e22ded07e61f391d7ee0d3502b91e0f762a51bd60f27e5699c9235fb238e81ce49b2740fc54a05ebc1fb7fe8feca4d9bbbf7d0263db85d1228436c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9A19ADAD9D098E039450ABBEDD5616EB_EB45958463869A839B2E6A0ABE8A149F

    Filesize

    394B

    MD5

    028b8780b719013f409e704635bc9ad5

    SHA1

    91d88a1a4c1e0bc8aef6e2afe3d82b9c0b08aa53

    SHA256

    77ac9529a8745014b872b45525a219677b079bd5efdf9b5f37dc9920c9f9bfe4

    SHA512

    3a3396b46ba2383f3e4eaf6870ea0af3a14b60f362f1238ab9473f4d0de6c5056139241ae9e79ea32650d4a19658499fcc1888e16be6d6cf6048cd0c23ddc41e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A89DFCC31C360BA5CBD616749B1B1C5D

    Filesize

    170B

    MD5

    c09b33727f581a830bd38285a0363a70

    SHA1

    5d3b837dd9b1370ddc533b39f653318fda460875

    SHA256

    5154bb66f3c13bad6f1558f8e2b7f7a87f3be1cc622641e834030f9aa6fe1937

    SHA512

    b54571284c91927e9d40f2953b87dda134cfd78476bfe2f24b89d8748ca9b92e5b7f020c6cd0b6d6e6eed3a48701e7dcfd490df2085d7c41b214b504d4f3be09

  • C:\Users\Admin\AppData\Local\Temp\CabBC01.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBC23.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\ProcessorDistrict\ComputerBalance.exe

    Filesize

    2.3MB

    MD5

    86d1bb187e6bff44d0dab8a31fa2db27

    SHA1

    72d1841e22eefebb4355d9bf3b54bbec5b808d83

    SHA256

    396b3d0e8a5bbae5a0927c054fe1081e7bc462cd6bceb382cf86f762ab0f0e91

    SHA512

    d0c3f9042454770c668349c4a6ecd476bfab38f7aaa9ea532371be90ab083197673f17e98e847a15e719ec8d2d568b9a78513f1c9a4adadc07a66e809dd78a5f

  • memory/1804-187-0x0000000074170000-0x000000007471B000-memory.dmp

    Filesize

    5.7MB

  • memory/1804-141-0x0000000074170000-0x000000007471B000-memory.dmp

    Filesize

    5.7MB

  • memory/1804-131-0x0000000074170000-0x000000007471B000-memory.dmp

    Filesize

    5.7MB

  • memory/1804-132-0x0000000074170000-0x000000007471B000-memory.dmp

    Filesize

    5.7MB

  • memory/1804-189-0x0000000074170000-0x000000007471B000-memory.dmp

    Filesize

    5.7MB

  • memory/1956-199-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1956-197-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1956-196-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1956-194-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1956-192-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1956-191-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1956-188-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1956-190-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2064-0-0x0000000074171000-0x0000000074172000-memory.dmp

    Filesize

    4KB

  • memory/2064-1-0x0000000074170000-0x000000007471B000-memory.dmp

    Filesize

    5.7MB

  • memory/2064-2-0x0000000074170000-0x000000007471B000-memory.dmp

    Filesize

    5.7MB

  • memory/2064-117-0x0000000074170000-0x000000007471B000-memory.dmp

    Filesize

    5.7MB

  • memory/2064-118-0x0000000074170000-0x000000007471B000-memory.dmp

    Filesize

    5.7MB

  • memory/2064-130-0x0000000074170000-0x000000007471B000-memory.dmp

    Filesize

    5.7MB