Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 15:32

General

  • Target

    23b101ef7ee302d8ef4fb86266343f54a7d1250080a68b3aad7f7fd1bdb78358.exe

  • Size

    2.3MB

  • MD5

    86b78d0385dcd977ec0bb2d65a11611d

  • SHA1

    d756ae4d08c2bff65455a0a4699436594cb57396

  • SHA256

    23b101ef7ee302d8ef4fb86266343f54a7d1250080a68b3aad7f7fd1bdb78358

  • SHA512

    7ae019ab651ec23b3b98bb86af992e2cc44bb5dbec3d8f29278d2fb994fcca679842b23e985b4361af9ebe47771dc989a8aac2a4c2392acf4cfed4e1c36f83c9

  • SSDEEP

    24576:x1r43sfARB7U4kieI1SqjEDKcSrJIvJiu/AxWt+:Pr43o67TrXIqjbcS6vJT6Wt+

Malware Config

Extracted

Family

babylonrat

C2

doddyfire.dyndns.org

doddyfire.linkpc.net

Signatures

  • Babylon RAT

    Babylon RAT is remote access trojan written in C++.

  • Babylonrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23b101ef7ee302d8ef4fb86266343f54a7d1250080a68b3aad7f7fd1bdb78358.exe
    "C:\Users\Admin\AppData\Local\Temp\23b101ef7ee302d8ef4fb86266343f54a7d1250080a68b3aad7f7fd1bdb78358.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Roaming\ProcessorDistrict\ComputerBalance.exe
      "C:\Users\Admin\AppData\Roaming\ProcessorDistrict\ComputerBalance.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1068
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    834B

    MD5

    543ff9c4bb3fd6f4d35c0a80ba5533fc

    SHA1

    e318b6209faeffe8cde2dba71f226d2b161729af

    SHA256

    40c04d540c3d7d80564f34af3a512036bdd8e17b4ca74ba3b7e45d6d93466bcd

    SHA512

    6257994ac1ec8b99edcf0d666838a9874031a500adac9383d9b4242edc6c6ffec48f230740d443c1088aa911a36de26e7ce3b97313e3d36b00aede5352a8cf5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9A19ADAD9D098E039450ABBEDD5616EB_EB45958463869A839B2E6A0ABE8A149F

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A89DFCC31C360BA5CBD616749B1B1C5D

    Filesize

    71KB

    MD5

    70ded9a2a6cfe1b02b5f8125e1130217

    SHA1

    29fd7f0bec45e6bf5385a7676e35d0bb677ae1db

    SHA256

    108ff73f2b347b12802395016abeccf4cf78aa12152e8cafc8330a6e50015cfd

    SHA512

    d5a77037f7581be7083af1eb49b26b337ea331be16e58b4da5188f167c8177e131914dfdae60663ab28b7db6d4af7e9a2ec142213a5b95edc687b51ae3cb53e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6

    Filesize

    404B

    MD5

    80605950327db695ae861c19f61d4d9a

    SHA1

    cd31b02a2ec4fe27ef67dba6c00a81a6616a0228

    SHA256

    9d54f0317be8e33a6cd73123c32d9bd1bb05f2a07351c784c022ad1d24601646

    SHA512

    f4d8a9283255c28c26ac12b748cd426abc1adc2e288f82b332dbc4b9071d258553e6c51b90ff5e0b6997ecf3c162d5e23b1bea6669a03e90c1426e331d68c8e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    188B

    MD5

    e1f7dfe7aadcab7e0154b857d1f54ea7

    SHA1

    d9d1430c15e067b73eaafa3bf923d9d1a63fe18c

    SHA256

    d06905c019b361097b6a58fd378574fedb582abd09e5e2aac6ee8cd11b4d8b74

    SHA512

    9faac8e6dd0439132eed9e1a1277e50ebf013a6c487746fb242c463709d1e6bb8e442d6a7f19852ddd18a686c1e5be46e69c01c22cb20bc15bbbc86d67306ed4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c38e0d38081fbb7a44a5a4728c712f8

    SHA1

    aafa6f24f517483a6c941a632dfd67634d90d105

    SHA256

    f6930cd6cc0b89e3d438f6b5e6d0630405a77777737e41e8e7cfa91113f1eca9

    SHA512

    09fd69e8cae62068d41d8830509a2d309737642bd1734468f295a76a7e7580e34569d2f09a7437c208c1bd43c898e2109ea55b783676f4b35eb4cb3549c6cad8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77b2995676fd11e4023143536b0eeab9

    SHA1

    856785fd6d0931d1af7711caa0b8b232ae7050f1

    SHA256

    d0fc849087646903796cf65baf722d6118f5ca9a719029b511b21230f25abc24

    SHA512

    fd7882cb9082271bacf6c23388e03e2a19b4251a075f239e6b095381d2f2bd6c1c6209f57fc97a9cbc16cfeb4cc6c15e194f474f2827848d64509030891fdbaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9A19ADAD9D098E039450ABBEDD5616EB_EB45958463869A839B2E6A0ABE8A149F

    Filesize

    394B

    MD5

    6e7ba0d68e09e9511b114137be023173

    SHA1

    678d00ffdf83624df0063f6f29de59f8838dbcf4

    SHA256

    8ae91ac4685531cf5c693079a6368f68ea2311123bf8700f44198be37c1b9292

    SHA512

    fb3dbdc38ea28d8f61f43b189e5e64c402d4e7948f31e51b38b4065a18f8f602e5961041a0bd151dc8e4cb9a73d4c0f364cf333c6d6e9c1125330ec47714a0bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A89DFCC31C360BA5CBD616749B1B1C5D

    Filesize

    170B

    MD5

    8c6b3d262a21d3fcc6d23bab4be01826

    SHA1

    c9a89d4577ac0033fd80f4f817d534d92d9d746b

    SHA256

    d4ff2d4caca96b5729ed1aefab5055b054b7571c3635028f13696341a5febdce

    SHA512

    b6fd5203467d08eb58380023177369a06330831bf83fe952158f47cdc389b2b97fd60583c0d444f4317934535afeb25ce187d6e5ece4e335838099f9e7923144

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    187056a4ba20e647433f657cbc4f102a

    SHA1

    79b8903d73788da58d0439c744c689d2dc30d28c

    SHA256

    12e147eef57f3d2c8afee6fd9e7512e3cec24a9048539b287049170df3adc7d4

    SHA512

    16871b9153b20edbe73e2a09e8f1478206b862d0555d4764826d451b679c0e796321f170a56b248bc4a21ae82c1801bb8f7bbb494cff4de1ddeec628199634a2

  • C:\Users\Admin\AppData\Local\Temp\CabAE7A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAE8C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\ProcessorDistrict\ComputerBalance.exe

    Filesize

    2.3MB

    MD5

    e0769e3c9d019abcc31be2134484e432

    SHA1

    cf15feb27103f490fb7dbc024b73eda633419582

    SHA256

    d72e3d35d4c738e83b43203c1c8d40290028e3b6e75eb597f8c8cc08b33519ac

    SHA512

    0c99de7dbd838dbb1189d0a20219b93d2a698d486e5c142b0bb985bff67eef6b013fa24db77f0e52fbb85d528f3eafb22a01014c64f4cd94c9f6b0f2fe00f799

  • memory/1068-189-0x0000000074870000-0x0000000074E1B000-memory.dmp

    Filesize

    5.7MB

  • memory/1068-122-0x0000000074870000-0x0000000074E1B000-memory.dmp

    Filesize

    5.7MB

  • memory/1068-186-0x0000000074870000-0x0000000074E1B000-memory.dmp

    Filesize

    5.7MB

  • memory/1068-121-0x0000000074871000-0x0000000074872000-memory.dmp

    Filesize

    4KB

  • memory/1972-0-0x0000000074E21000-0x0000000074E22000-memory.dmp

    Filesize

    4KB

  • memory/1972-108-0x0000000074E20000-0x00000000753CB000-memory.dmp

    Filesize

    5.7MB

  • memory/1972-107-0x0000000074E20000-0x00000000753CB000-memory.dmp

    Filesize

    5.7MB

  • memory/1972-2-0x0000000074E20000-0x00000000753CB000-memory.dmp

    Filesize

    5.7MB

  • memory/1972-1-0x0000000074E20000-0x00000000753CB000-memory.dmp

    Filesize

    5.7MB

  • memory/1972-119-0x0000000074E20000-0x00000000753CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2576-198-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2576-188-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2576-190-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2576-193-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2576-191-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2576-192-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2576-194-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2576-196-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2576-187-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB