Analysis

  • max time kernel
    149s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    13-11-2024 20:28

General

  • Target

    23b101ef7ee302d8ef4fb86266343f54a7d1250080a68b3aad7f7fd1bdb78358.exe

  • Size

    2.3MB

  • MD5

    86b78d0385dcd977ec0bb2d65a11611d

  • SHA1

    d756ae4d08c2bff65455a0a4699436594cb57396

  • SHA256

    23b101ef7ee302d8ef4fb86266343f54a7d1250080a68b3aad7f7fd1bdb78358

  • SHA512

    7ae019ab651ec23b3b98bb86af992e2cc44bb5dbec3d8f29278d2fb994fcca679842b23e985b4361af9ebe47771dc989a8aac2a4c2392acf4cfed4e1c36f83c9

  • SSDEEP

    24576:x1r43sfARB7U4kieI1SqjEDKcSrJIvJiu/AxWt+:Pr43o67TrXIqjbcS6vJT6Wt+

Malware Config

Extracted

Family

babylonrat

C2

doddyfire.dyndns.org

doddyfire.linkpc.net

Signatures

  • Babylon RAT

    Babylon RAT is remote access trojan written in C++.

  • Babylonrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23b101ef7ee302d8ef4fb86266343f54a7d1250080a68b3aad7f7fd1bdb78358.exe
    "C:\Users\Admin\AppData\Local\Temp\23b101ef7ee302d8ef4fb86266343f54a7d1250080a68b3aad7f7fd1bdb78358.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Users\Admin\AppData\Roaming\ProcessorDistrict\ComputerBalance.exe
      "C:\Users\Admin\AppData\Roaming\ProcessorDistrict\ComputerBalance.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1220
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    834B

    MD5

    543ff9c4bb3fd6f4d35c0a80ba5533fc

    SHA1

    e318b6209faeffe8cde2dba71f226d2b161729af

    SHA256

    40c04d540c3d7d80564f34af3a512036bdd8e17b4ca74ba3b7e45d6d93466bcd

    SHA512

    6257994ac1ec8b99edcf0d666838a9874031a500adac9383d9b4242edc6c6ffec48f230740d443c1088aa911a36de26e7ce3b97313e3d36b00aede5352a8cf5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9A19ADAD9D098E039450ABBEDD5616EB_EB45958463869A839B2E6A0ABE8A149F

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A89DFCC31C360BA5CBD616749B1B1C5D

    Filesize

    72KB

    MD5

    7e2ef4abaaf60e552ba174eabbf5ff6d

    SHA1

    1dd2cab4d7f072a7a6d2702b691d6983a251ff7e

    SHA256

    a18d38f2dc62dffde528662e579ef234439f61887e6813468c5bf592a8b3fe25

    SHA512

    fe494d4ad4665c6702a85cb4904906da855ee24f5d271bb1425f4aa7142b08b6c190bf8ccf520f4472f666aedc4e6d5ec77f769d766953f8cef7a9893df47b46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6

    Filesize

    404B

    MD5

    811c16a544b9ec05d47a4334471a9234

    SHA1

    6c56e1c986bc219d4f4352fb3336457fcdb3a0b9

    SHA256

    29c38a12411ff2d884ca6bfd8e09793435f56243fcbc48c1f20d1733531b0df8

    SHA512

    c6ae227150c0143ca5d248c5618b89a6806f197ef4adc2f73c2eedaeb3e37b4607bbe4571954dc1af774b601b1649e290861043d0451d149fc4b196c0834de17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    188B

    MD5

    3d19ee0056869e0efb2f0218db879967

    SHA1

    b4ddc4696379ab6cbb9ce35646f5544039114c22

    SHA256

    73990110cfb5610b58465c87e08fa221383be2ed3a7ec04fceeefd808052b555

    SHA512

    176eaae2f6dcd52f0309e9efbe075cb335a4a831e63906aa802476c5fa877a4bbfb20f25c24c42af90d8568cc8a1a73284b052cca0d4e3dbde13ceb245556122

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dfa611a9f3bd796930b0a324497570f9

    SHA1

    e632ad4f3d793052703c599fa569e6998afdb919

    SHA256

    1d5292581d5083b52e40a5573d761283a5b24f4d7d9a61bfc062e026ba9c48c9

    SHA512

    759ab52035bfa76c7fd0eaf3a57c1bb28b8981a037c99a9483ff45f314638f4cbb3b16233f27f53749e68af3734a28fcb43e53af98ae082bed0a518106b2d29d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd7e22bd9624f24f061f0a108aafdf63

    SHA1

    7451522e887f506f660bd20a5622ee1e2a631677

    SHA256

    03870581e7cdd1e5e75de0af2a355257baa4ba49f277f8f22d90defaa9d289c7

    SHA512

    2a49b8377f5b88f04adf9c4304b84d7b1dbef750f39bde4c598816ad21c66141cdd1b42979fae5937ace12302670732a3f449650556d21b185bb2b351dcd9ee3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9A19ADAD9D098E039450ABBEDD5616EB_EB45958463869A839B2E6A0ABE8A149F

    Filesize

    394B

    MD5

    5349b3727caca29b6198ae0a1331039a

    SHA1

    5cd34a3fd25b3472e855ba5302d2a59c8ae808af

    SHA256

    044972782b70c6d0ef6912dfff8265d3ba55686dd3149b20d812d900a77a847e

    SHA512

    2c23275c9cbf79eba9a10adeb7ac724b00236def6be8f9acd196418b1fa67d7dda02d10882d261df7c60365e0b036c61fdbec5233eb0ad3b7337815a1300918c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A89DFCC31C360BA5CBD616749B1B1C5D

    Filesize

    170B

    MD5

    0d82b0f9a6b4d309a6540404b1572b72

    SHA1

    ac76b2a71c272bb4fb4cab1b47e95d14b5721d79

    SHA256

    9e57247761f2bc8d7edb767a65024ccfed840a51f643df7d6bf0b6aa519e9c03

    SHA512

    4740b2fdb4c61b864c7f011bcb1eb2da8cbc529ae74f48cd0a8a4e05b6f296deab6a34a9b9feb4995dada1fd4fc51cc8192572fd6869fab21b6c0862b7e11b55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    deca5931e183cc8d9f85c0bcf6f0a185

    SHA1

    e8de79a7119596eeb89ca2ff6d4f93646f4a98b2

    SHA256

    8f53720a32b4d45e1b727517bce94f51a229d1cd9f9e299b58d6758b0473e9ae

    SHA512

    fa23ba26a37909c97f4dc02c53d31a8475536a95f0e82415a14b68f092e3e3e8f233dafb0931140174618fb67132e876ea3535054da0197bae951261cae79670

  • C:\Users\Admin\AppData\Local\Temp\Cab38CE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar38F0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\ProcessorDistrict\ComputerBalance.exe

    Filesize

    2.3MB

    MD5

    c42d76941ede2ddcc6f4274071a7adcb

    SHA1

    9c0c2898ede39eba806cd0701a11266a6f8ad326

    SHA256

    95ceb58c0411c412c0b6ecf72f69d4c8b604d81c2012ad10b19961287e645e6d

    SHA512

    c3688217f205741fd7ece63c9b00bad3c52efe85a86db265ae94c0c9b81f83c23ce60b820cd306f5069b1c1327140f9d3b861f974dbeaff754597e5e722602d1

  • memory/1220-120-0x00000000746A0000-0x0000000074C4B000-memory.dmp

    Filesize

    5.7MB

  • memory/1220-121-0x00000000746A0000-0x0000000074C4B000-memory.dmp

    Filesize

    5.7MB

  • memory/1220-185-0x00000000746A0000-0x0000000074C4B000-memory.dmp

    Filesize

    5.7MB

  • memory/1220-188-0x00000000746A0000-0x0000000074C4B000-memory.dmp

    Filesize

    5.7MB

  • memory/1456-118-0x00000000746A0000-0x0000000074C4B000-memory.dmp

    Filesize

    5.7MB

  • memory/1456-1-0x00000000746A0000-0x0000000074C4B000-memory.dmp

    Filesize

    5.7MB

  • memory/1456-107-0x00000000746A0000-0x0000000074C4B000-memory.dmp

    Filesize

    5.7MB

  • memory/1456-2-0x00000000746A0000-0x0000000074C4B000-memory.dmp

    Filesize

    5.7MB

  • memory/1456-0-0x00000000746A1000-0x00000000746A2000-memory.dmp

    Filesize

    4KB

  • memory/2656-187-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2656-189-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2656-186-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2656-190-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2656-192-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2656-191-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2656-193-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2656-195-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2656-197-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB