Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    19-01-2025 18:30

General

  • Target

    dcd2a5fdcbba96f26247f193d5e68b5673fe48236b1b7d6a6af1842e5b80c14e.exe

  • Size

    735KB

  • MD5

    228964fd171143c0fc1a2c7067857159

  • SHA1

    eda5e7b3ce61ad23c579c953e8b3fa79aa167321

  • SHA256

    dcd2a5fdcbba96f26247f193d5e68b5673fe48236b1b7d6a6af1842e5b80c14e

  • SHA512

    3ca61bc0eac3cd487e681c48db0523ffd9d0bf7de4e65e284f66810e91914b2d0e33a511e6eaee240ae8b2a4160a18311d685f587845bd1a6ae98f6e01520847

  • SSDEEP

    12288:trsTMcgRdrEAzvHG4z2T6DSsyXUGz2FcFe0fySvZyESEGWKm:trsaRdrEAbm4zbryUGCMfySQ3m

Malware Config

Extracted

Family

babylonrat

C2

cb4cb4.ddns.net

Signatures

  • Babylon RAT

    Babylon RAT is remote access trojan written in C++.

  • Babylonrat family
  • Drops startup file 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcd2a5fdcbba96f26247f193d5e68b5673fe48236b1b7d6a6af1842e5b80c14e.exe
    "C:\Users\Admin\AppData\Local\Temp\dcd2a5fdcbba96f26247f193d5e68b5673fe48236b1b7d6a6af1842e5b80c14e.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ogq3wbss\ogq3wbss.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDAF4.tmp" "c:\Users\Admin\AppData\Local\Temp\ogq3wbss\CSCDF7CC1163D4ADEA698130D6AEDB73.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2996
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /query
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2920
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /create /sc MINUTE /tn RegAsm /MO 1 /tr "C:\ProgramData\Oracles\Svchost.exe\
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:1016
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2828
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {39325DC2-BD67-4898-A316-0875138B52F3} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\ProgramData\Oracles\Svchost.exe
      C:\ProgramData\Oracles\Svchost.exe "C:\ProgramData\Oracles\Svchost.exe\"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ai3oyce0\ai3oyce0.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2808
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES708E.tmp" "c:\Users\Admin\AppData\Local\Temp\ai3oyce0\CSC762BE2DCDAF1406AB79AD1FBF697A95B.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2236
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks.exe" /query
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1096
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:676
    • C:\ProgramData\Oracles\Svchost.exe
      C:\ProgramData\Oracles\Svchost.exe "C:\ProgramData\Oracles\Svchost.exe\"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:908
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\syc2hgxx\syc2hgxx.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:952
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5966.tmp" "c:\Users\Admin\AppData\Local\Temp\syc2hgxx\CSC376097056FC34C199045895FDC23541.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1904
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks.exe" /query
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1400
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracles\Svchost.exe

    Filesize

    735KB

    MD5

    228964fd171143c0fc1a2c7067857159

    SHA1

    eda5e7b3ce61ad23c579c953e8b3fa79aa167321

    SHA256

    dcd2a5fdcbba96f26247f193d5e68b5673fe48236b1b7d6a6af1842e5b80c14e

    SHA512

    3ca61bc0eac3cd487e681c48db0523ffd9d0bf7de4e65e284f66810e91914b2d0e33a511e6eaee240ae8b2a4160a18311d685f587845bd1a6ae98f6e01520847

  • C:\Users\Admin\AppData\Local\Temp\RES5966.tmp

    Filesize

    1KB

    MD5

    e8fd56c4f996318bf11af185bcbb3f24

    SHA1

    94489034639336689b85b7911d43cf32995c5024

    SHA256

    a330fae43c72f721865ba6e776cf9ba15bfef3b39845223a470fb1723ce7b6e1

    SHA512

    4a38cb0b3024fcbc7653f00b57c2241840dba09675c7bce3b52b0d4ebc6287ca0b604127d82b859b690c4ed88bb4863e911dd65073bb42bf245d955a0264d38e

  • C:\Users\Admin\AppData\Local\Temp\RES708E.tmp

    Filesize

    1KB

    MD5

    05f6236289d1f070963e70b1e0a567e3

    SHA1

    2e76f1a7b52687b0eadde0cd55dbc0eefd1c2f43

    SHA256

    893781aa452e5691948e31d5388d9e3289afe5431b37c7c9a72d924d6b1a4113

    SHA512

    9918c17c1732405d6c1361afb24187a12fe651c0d03901c305e5f5c01767c50ac567f4e27c3ab447a3d489ddf275b795d94f32a56c628d535f58ecc4e99a24b0

  • C:\Users\Admin\AppData\Local\Temp\RESDAF4.tmp

    Filesize

    1KB

    MD5

    ac79bfa9ed180fba177aff63694491cc

    SHA1

    9acbbda0f29bac234e8996b486ea8355552f89bb

    SHA256

    a0a9c8fe7ae94dabc82ca87f489217ad6e0a390672495022d61e555728d8015d

    SHA512

    1ab3eee84919f9d0e214a6c89c8a38c728a9a568b35fbe6ce3c9bc50b9b52ee72e579f24dcb7ef1e3b16559a65c0838b503407d05b24c5262290560526985571

  • C:\Users\Admin\AppData\Local\Temp\ai3oyce0\ai3oyce0.dll

    Filesize

    7KB

    MD5

    b67ca49b665f1868e69672e4de9057ee

    SHA1

    ac0aa4cc28d987febdd1065518fbc7867726a712

    SHA256

    b983f6ea82d812cb707019e860e97f2b2f1729073d1bc29236f112ffb54fde73

    SHA512

    9cc1de949d00ca33c31e8931ad271266d6b888f6d241bdc5e7ff3092f6a5d2870cf795f165071a6f619aa91785ea6abf5df4c50b3fcb74501903d6f75be1d379

  • C:\Users\Admin\AppData\Local\Temp\ai3oyce0\ai3oyce0.pdb

    Filesize

    19KB

    MD5

    d45d1a8c72a3f0c5b2ae2613e009893e

    SHA1

    0a3c8e7b1ec5457c6ddf6e6e8d917fccfd87509d

    SHA256

    f6da8f864239cd753bf285ff9306d4493c1091794bd3962a0e8a206ee8c1e1ea

    SHA512

    1d4b699ad0ca1b7144ce20d669c661a321f60f691527b82c910ded45e4bb9f09dfa235a712095e3e84c81a6ffa27e8bc0c491db92835c18a3c70b35c84b20965

  • C:\Users\Admin\AppData\Local\Temp\ogq3wbss\ogq3wbss.dll

    Filesize

    7KB

    MD5

    9dee1040330490fe6380c95c1ef5b164

    SHA1

    f8b805e2ac6431f0656753082c5a4a6c01f51ec5

    SHA256

    d8520dd6b964f2a52154a9d394392d0708c824bcdf42468e323e746e77087781

    SHA512

    9174c664777cb519f012b90fc92400ab993ace4c90effc14f018a011df2f85072fb642307eb7d384f388c111c842011b6db09bed6ff31decd7f857096f31d58f

  • C:\Users\Admin\AppData\Local\Temp\ogq3wbss\ogq3wbss.pdb

    Filesize

    19KB

    MD5

    44fc6aebed53fe06d76cd8b21eb0fc33

    SHA1

    ccaabb46f20ae4a4c2a2aac318d497e091dd4732

    SHA256

    306fcf07306b7f6d8041049b4414bea0425b12e06f666db3cd33c2ce6c9d6aba

    SHA512

    f0358190092d3c52736a120bca7a182142707595df650456d4f3a4ae865f7da439183e669747048be9e30061104eef85702cadd8f35c555ebf2211ddc43b4284

  • C:\Users\Admin\AppData\Local\Temp\syc2hgxx\syc2hgxx.dll

    Filesize

    7KB

    MD5

    da317befab220c6427a1f865dd48daad

    SHA1

    378fafc06564d27bd3d9fbb7d7de565955e50236

    SHA256

    41be5d4f991f31cdbfc3116b5cec2070738b2a2ed7407022910dd5f4bc36217f

    SHA512

    e383354cc6d4f74a264dec30c05a1c57dfe62297468a68b2e4671e238191d7f3944a2bf0bbc01767baca280fabd2b99637d73ba42b3c34b8e9bf7553219643c6

  • C:\Users\Admin\AppData\Local\Temp\syc2hgxx\syc2hgxx.pdb

    Filesize

    19KB

    MD5

    9b0d351fbea7cd720f4562d88887339f

    SHA1

    69dc1be4e155b81919e2c18611b285b04908535e

    SHA256

    0be309705c9ef1d1c06f228e081dd011082e8992c2aebfe3bcc37a1436a9e2b8

    SHA512

    a0fb76bad621a3f86a644e07f1b408d0fd805b4e3be1ac4bef960facd9a043a236f9cf5de0a12fd2e2147a6f72152fb65ebd9071663fb0c102f15a829078cc07

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RegAsm.url

    Filesize

    68B

    MD5

    b8477d3bff8523c13f210b0ffee52a3f

    SHA1

    a6efbbfd4e8a2f7b8a5a7a64b1532f9470f69517

    SHA256

    e7d3cc54dbb09c8ba10e05537a7a0bdfd52400fa140be2f47601d785874c2c28

    SHA512

    ea85d0cf152a9f4e50cf38ba0ab821df8fd67f50b7f7b0004d871c529de224c456767b4cb87db483d0342e1ce376ca2dedc2cdf4f771c35511a47822a09692da

  • \??\c:\Users\Admin\AppData\Local\Temp\ai3oyce0\CSC762BE2DCDAF1406AB79AD1FBF697A95B.TMP

    Filesize

    1KB

    MD5

    d569e1c7695c27cf1b4beda554c93d09

    SHA1

    b910fd71ce41b328506a0f3378185f907fbe1414

    SHA256

    9a7d4ee86978e8581f9e35d6a61f3b6b26bf87367ce4a2f98e386db838af48c0

    SHA512

    4a44e35252b70e34084a37d3b741f2908435179a0521c9600e5ec4258d739200e15fab0aa9f83c459858a4723065269d0e19b48722ad046e49253a2cb1beaa7b

  • \??\c:\Users\Admin\AppData\Local\Temp\ai3oyce0\ai3oyce0.cmdline

    Filesize

    312B

    MD5

    958be05af98ef0b52bbd6d39ad5dda6f

    SHA1

    955049a8ae9f258392745dda23e7d1ceec12ae9a

    SHA256

    00c538e3777f30b10e5e83fd191fc46e05e97db940609728070d1c020125ea2a

    SHA512

    52ca3e5a3a2b292ef23e94c6819208da6f65db13821184e18f288eac0acf36667dc842b1043950241cc0dc5de7575121e0d6698c688cc24982e7755dd5ed5484

  • \??\c:\Users\Admin\AppData\Local\Temp\ogq3wbss\CSCDF7CC1163D4ADEA698130D6AEDB73.TMP

    Filesize

    1KB

    MD5

    4c58f8ed88530de676f6fac212220e26

    SHA1

    f01b858b08929319f2008d8a0b92262dfe257536

    SHA256

    cd0c276085ad73df345967b942cac9a2ffc2be097e5fca4a9d328782f9840390

    SHA512

    6661013f38e154fe91cf1b2006f141d20421742d2118c71c90726d380e686e999b384d638f4510e96ecbf71e723d53c91ada71fb881b97667b538a31d2c44e63

  • \??\c:\Users\Admin\AppData\Local\Temp\ogq3wbss\ogq3wbss.0.cs

    Filesize

    6KB

    MD5

    a100d6abfd6918aec8158600c442d61a

    SHA1

    19141bd6e9d00da1aec73b3dc062e8c366dee46d

    SHA256

    f27ca4618b977a51753ff4441613b3705dd422035c07f8bd7939bfc6cfaea888

    SHA512

    b7a558144ca0d3f6e3cfd4ad8899006cad58e8e0cc7621d38ee194be2e4e3807b3400c457e049cc89aa8f0522d316a42403c165d8649836ff2edd8532e4c71f0

  • \??\c:\Users\Admin\AppData\Local\Temp\ogq3wbss\ogq3wbss.cmdline

    Filesize

    312B

    MD5

    fe37b129747b55767acd081bf458bd80

    SHA1

    766260197906f7dd8a1a89399ed9053e235b26e9

    SHA256

    aa46b38a28a2874a4a85b3043f36b9ac5145e0a522123d8fbe1bcd289a4e46d2

    SHA512

    dd900e7e84b9e6c487e04df7c770ff7bf1aff3a704a53c2b5b278cb414e37b001359e804e70540cb13fb7f4ab1e264f3b6541168b58e69552d84e255a3bf501e

  • \??\c:\Users\Admin\AppData\Local\Temp\syc2hgxx\CSC376097056FC34C199045895FDC23541.TMP

    Filesize

    1KB

    MD5

    47391f23c917e397e3ae50feae8d6191

    SHA1

    959d12c5e8c16bc2ccb4392aa0477e28587aa3fc

    SHA256

    313e5b0c7ce9d120ec036f8a2f3f9db76f2f85470696f023cebc51e061e12bb5

    SHA512

    9b15ac6d034252f0f4571588e049a7cb339a90f5be087b87e87e6e267f947c7a51fdd4e85fb4ce0954e166bedbc31ba39839953d6cc225201a0f812463fd062e

  • \??\c:\Users\Admin\AppData\Local\Temp\syc2hgxx\syc2hgxx.cmdline

    Filesize

    312B

    MD5

    233c6223cb8a0da7219ca8e5e052680a

    SHA1

    2650bdb9a4db9df1f687b0076fdba2e906f4c236

    SHA256

    26cc6649c7dda63438ad17c5c699e91d22de58d8b343969474a437c9bbf61298

    SHA512

    fc31518a10403b101636a1a65371195b3b131ad4bdb03f1e4be9699bf2fc24c8aab69957f409d7ce1ddc637fcd534ed40bfc16c5503b7a1f7234b0f83b9a69c9

  • memory/676-86-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/908-119-0x0000000000BD0000-0x0000000000C74000-memory.dmp

    Filesize

    656KB

  • memory/908-134-0x00000000003C0000-0x00000000003C8000-memory.dmp

    Filesize

    32KB

  • memory/908-138-0x0000000004D10000-0x0000000004DD4000-memory.dmp

    Filesize

    784KB

  • memory/2096-72-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2096-57-0x0000000000080000-0x0000000000124000-memory.dmp

    Filesize

    656KB

  • memory/2124-20-0x00000000009C0000-0x00000000009CC000-memory.dmp

    Filesize

    48KB

  • memory/2124-23-0x0000000004F50000-0x0000000005014000-memory.dmp

    Filesize

    784KB

  • memory/2124-1-0x0000000000BB0000-0x0000000000C54000-memory.dmp

    Filesize

    656KB

  • memory/2124-4-0x0000000074D40000-0x000000007542E000-memory.dmp

    Filesize

    6.9MB

  • memory/2124-17-0x00000000008E0000-0x00000000008E8000-memory.dmp

    Filesize

    32KB

  • memory/2124-19-0x0000000002060000-0x00000000020C8000-memory.dmp

    Filesize

    416KB

  • memory/2124-0-0x0000000074D4E000-0x0000000074D4F000-memory.dmp

    Filesize

    4KB

  • memory/2124-34-0x0000000074D40000-0x000000007542E000-memory.dmp

    Filesize

    6.9MB

  • memory/2208-151-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2828-36-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2828-32-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2828-24-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2828-26-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2828-29-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2828-30-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2828-33-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2828-35-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2828-47-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2828-37-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2828-38-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2828-40-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2828-49-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB