Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/01/2025, 06:59

General

  • Target

    15b805ea0121bfaeadcd2e6f4cafce3199a91209f04b599bb333dca9010aeb55N.exe

  • Size

    735KB

  • MD5

    8b3abbb304f163345e23e9c6b1e70a90

  • SHA1

    2f55f460322b4a687bc08e0f527e24b4a53e029c

  • SHA256

    15b805ea0121bfaeadcd2e6f4cafce3199a91209f04b599bb333dca9010aeb55

  • SHA512

    7894285b95a882b2bf1f66822e1a0e24d07b96dd0738238e87a12155e2613bf05baca081c4faa4e9597d99d4a6eca00fabfe7c7dc45b4ff193c4fbfad27b9f37

  • SSDEEP

    12288:trsTMcgRdrEAzvHG4z2T6DSsyXUGz2FcFe0fySvZyESEGWKy:trsaRdrEAbm4zbryUGCMfySQ3y

Malware Config

Extracted

Family

babylonrat

C2

cb4cb4.ddns.net

Signatures

  • Babylon RAT

    Babylon RAT is remote access trojan written in C++.

  • Babylonrat family
  • Drops startup file 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15b805ea0121bfaeadcd2e6f4cafce3199a91209f04b599bb333dca9010aeb55N.exe
    "C:\Users\Admin\AppData\Local\Temp\15b805ea0121bfaeadcd2e6f4cafce3199a91209f04b599bb333dca9010aeb55N.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kp5yh01m\kp5yh01m.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4FD5.tmp" "c:\Users\Admin\AppData\Local\Temp\kp5yh01m\CSC987B70B7ED048DF82853ED43778C97A.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2760
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /query
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2616
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /create /sc MINUTE /tn RegAsm /MO 1 /tr "C:\ProgramData\Oracles\Svchost.exe\
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2912
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2608
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {3692D796-84EC-47A3-A446-A702C55571DD} S-1-5-21-3533259084-2542256011-65585152-1000:XPAJOTIY\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\ProgramData\Oracles\Svchost.exe
      C:\ProgramData\Oracles\Svchost.exe "C:\ProgramData\Oracles\Svchost.exe\"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:840
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\eorfhexa\eorfhexa.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2340
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCED3.tmp" "c:\Users\Admin\AppData\Local\Temp\eorfhexa\CSC3546E02BC0DF42B19B34B3CCA892522.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1972
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks.exe" /query
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1820
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2580
    • C:\ProgramData\Oracles\Svchost.exe
      C:\ProgramData\Oracles\Svchost.exe "C:\ProgramData\Oracles\Svchost.exe\"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:112
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5hq5vq05\5hq5vq05.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:900
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB857.tmp" "c:\Users\Admin\AppData\Local\Temp\5hq5vq05\CSC2AAE5C779F864DC9989A3A8B99070F5.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:824
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks.exe" /query
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2284
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracles\Svchost.exe

    Filesize

    735KB

    MD5

    8b3abbb304f163345e23e9c6b1e70a90

    SHA1

    2f55f460322b4a687bc08e0f527e24b4a53e029c

    SHA256

    15b805ea0121bfaeadcd2e6f4cafce3199a91209f04b599bb333dca9010aeb55

    SHA512

    7894285b95a882b2bf1f66822e1a0e24d07b96dd0738238e87a12155e2613bf05baca081c4faa4e9597d99d4a6eca00fabfe7c7dc45b4ff193c4fbfad27b9f37

  • C:\Users\Admin\AppData\Local\Temp\5hq5vq05\5hq5vq05.dll

    Filesize

    7KB

    MD5

    d912b373ae4a3fc2c656980dd451360a

    SHA1

    7370846d29224d756f486760026ae0c5e72d6d03

    SHA256

    6ad5ec9ed5b3a202f228ebe931845244d198979dd86f45c0472af95ce1780e12

    SHA512

    03e7941884cc17a6621e5b0f3e85a6e88e77f64f49d6cf9120cbd04f8ecfe1afee31f06342c4de00860131680761676a8548fac63f98f48b8fdf7aaef84ace91

  • C:\Users\Admin\AppData\Local\Temp\5hq5vq05\5hq5vq05.pdb

    Filesize

    19KB

    MD5

    279189e9cedb4b7165426d81331bb715

    SHA1

    b021af4cc5d3bbd6eccef53fe539db86ce0380e3

    SHA256

    ea7880970f7817f411060f849b7cf9e40ef99379048cc658f9069e710ff455cc

    SHA512

    e205a8ef3a3cd866fd80adc755815c1a84a8907c320b8dde435b3263ac698c741d4c3b1d137e31b20260864396d9ed66f6bbba5b764d3ad64709673acc07c68d

  • C:\Users\Admin\AppData\Local\Temp\RES4FD5.tmp

    Filesize

    1KB

    MD5

    1bdbfc901e4ffc3e7424ebd203e9408d

    SHA1

    d902ef783efa121960f0e97c4b69fad67ded46bf

    SHA256

    50166d44d170414169f5f92e4f33108a81b89e77424890f6b782967daba51ec5

    SHA512

    60933014d664c5ee37a9ff43715a369f49cc475a2e578651fd0a49ee43d226813afb9996bbac2e26bbd0108f0846789c00fbbfa7c70ab6fe47dbe921cd1fdbe5

  • C:\Users\Admin\AppData\Local\Temp\RESB857.tmp

    Filesize

    1KB

    MD5

    01a77d5396c531093837ce80bcd1837a

    SHA1

    f694b6cb25b3c0818305ba8485736900b6f02791

    SHA256

    ea14d6d26a4dcc3fa3be1b3098085438168d2a42f98b6d1553891769a875939a

    SHA512

    cd635b65185686f94e6a926075c9cf2a3fd144b1923fc08d7773cb89ba1d84299396e1f932d9cde19e7cf2dcb1143ca89a3f5b479b8eb324134f9c15ba714c6c

  • C:\Users\Admin\AppData\Local\Temp\RESCED3.tmp

    Filesize

    1KB

    MD5

    e26f216f96b51e85d477ec92134bf577

    SHA1

    2b137050248bcfb16cbece74fcf3580ee31630dc

    SHA256

    6c0abbc04522c5b2f854c9538135810868081a3d2422b452fa1e1b6ca9b3b97f

    SHA512

    25476c0ace0b41433ec927e5c95caa953893772a3391d244341c2c46a3fdb37512b74456af50b7557fe26a69e2e8e3ef61364b7cfe5054085dcb98851b7535e4

  • C:\Users\Admin\AppData\Local\Temp\eorfhexa\eorfhexa.dll

    Filesize

    7KB

    MD5

    fdc211054bc7bdb5c71be65e857e0b53

    SHA1

    6918b4b8d38b3561eefa2032b9d82878e906d342

    SHA256

    b46d93e4153b19a075d887e7619a2bc5d4c825508186844b9b65561601de8364

    SHA512

    7eaaebfb07fec44d5884338b6cb45d1540d0abc0bfdb05820b1ab4cfa12ce4c421dd622e80ef74ae58e79204a158879d8923939b8298d8e4133dd4c17fa174fd

  • C:\Users\Admin\AppData\Local\Temp\eorfhexa\eorfhexa.pdb

    Filesize

    19KB

    MD5

    be543dc6784a8232fbf0c56e98b5042d

    SHA1

    52a0d36eb7eb40eff12c3962da4efe7dbb155eb6

    SHA256

    ec0275e03b1712d900d8570637bdc96e2a45f20b4065f9e1edfa328fa3b7dd7e

    SHA512

    55b3a5ab4cea3fc4d71a4f7356c8f68b6964f14701c52f2eb20afdad2673ce53fdcd3a935ea45f83b120f22a38b552d58d93d4fcb23bc9c365003eab58b60051

  • C:\Users\Admin\AppData\Local\Temp\kp5yh01m\kp5yh01m.dll

    Filesize

    7KB

    MD5

    ad92f14553e940391f7462cf72ab0d81

    SHA1

    a4688f2a56c8044d3461d78afa5c8674be61715e

    SHA256

    38a9b27fe3ddbbf7dee3f0fdbed1e9daa6873035d14c4e8ef518c35530895de2

    SHA512

    ab1d73a8d1bbee800fbd35414ca5350c00951a9e0b288ce0411c93b5b029d83e96c28c26fc86e5bc104f8a7f2d10501822b8f2e7179b45e0019459644313e5eb

  • C:\Users\Admin\AppData\Local\Temp\kp5yh01m\kp5yh01m.pdb

    Filesize

    19KB

    MD5

    2d9aabf4267559ac9d35c116b6073880

    SHA1

    57f5cd5c55a066dc1059cabd27b0c799f4066c02

    SHA256

    d0fa096c823999a0dd23f43742329e42450818b4676549579ed032062e319085

    SHA512

    c87b19276fe49e1fd9b1f4003ce4e5c471b243af869bb69f6f57d3bbe35197354786ee2e11d48897433a42bd1e4fda86b3770d398b23f105b4d3584bab8ed73a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RegAsm.url

    Filesize

    68B

    MD5

    b8477d3bff8523c13f210b0ffee52a3f

    SHA1

    a6efbbfd4e8a2f7b8a5a7a64b1532f9470f69517

    SHA256

    e7d3cc54dbb09c8ba10e05537a7a0bdfd52400fa140be2f47601d785874c2c28

    SHA512

    ea85d0cf152a9f4e50cf38ba0ab821df8fd67f50b7f7b0004d871c529de224c456767b4cb87db483d0342e1ce376ca2dedc2cdf4f771c35511a47822a09692da

  • \??\c:\Users\Admin\AppData\Local\Temp\5hq5vq05\5hq5vq05.cmdline

    Filesize

    312B

    MD5

    c0b6af608649d3bbb15ca412c81201d6

    SHA1

    5300c547cc56b0534601dd6083b1e5b610049bcb

    SHA256

    4e3f7fda73eb1f5d26e01255a8c72a39daa0ef0e498e51539e9e28740280eb95

    SHA512

    a1ace52145fb7058f8e6beac48a705711e8945dec282d2e95b5600d301c5c7c15bfc87a9043402cc4e161754e881ad6f02d8c4f236a2ea81e5ace92385727e66

  • \??\c:\Users\Admin\AppData\Local\Temp\5hq5vq05\CSC2AAE5C779F864DC9989A3A8B99070F5.TMP

    Filesize

    1KB

    MD5

    1c194539c4ebf6b8b5ad487052dd86cd

    SHA1

    9a083b58f1b17b86e6a9892ec7df1d6727227fe8

    SHA256

    82f4611df7f5fc2707617df8bbacfdd83c3a9e38ea15ab12d5788c9ebd055098

    SHA512

    34ec06ae199791deea495fe02f070780c1c01afdc71f0178828cc6e9a267d5fbed550e670c73edca9a4ee4c5e12e7daad1172b8957a3edee6e5700a5e8058974

  • \??\c:\Users\Admin\AppData\Local\Temp\eorfhexa\CSC3546E02BC0DF42B19B34B3CCA892522.TMP

    Filesize

    1KB

    MD5

    44c945e9539bc1ba5f68eba5eac931d9

    SHA1

    353b865e5a5f7ddc56a4572a870ed7259592f0a3

    SHA256

    f6221ff90fca89dfd073e1545a80ff374ebeed7973954f314ecdb6d8081dca53

    SHA512

    ea2b4d66a44cd8182fd7fb69c2db83c4277899fd6ce3fb693303c1624f43e7b74a722822f5f13f5d0b009be9dd903d6523673e7077b90f56c97134fedbbcc29f

  • \??\c:\Users\Admin\AppData\Local\Temp\eorfhexa\eorfhexa.cmdline

    Filesize

    312B

    MD5

    fb9f709e85692883384018452a509208

    SHA1

    6960328863d15a0e329cdce37dfeca248b4bec32

    SHA256

    42893a6a487289c58b7b6d01dc967f7f6c9e32d7346e8fbd04f6b8f639cc056f

    SHA512

    8b643c11ea43b0d9eb9c1d98088bc1b692e31ac3f2c1c2121a425fa42eac3806bb5e8529557a5243f8cf83cab955941a400805138f5764ed32a08748c8756d1e

  • \??\c:\Users\Admin\AppData\Local\Temp\kp5yh01m\CSC987B70B7ED048DF82853ED43778C97A.TMP

    Filesize

    1KB

    MD5

    ea0c7e099771669deac6e6f4ca48bf64

    SHA1

    8ef7c59209e9d5e9396b18cdfd58842669cb4ead

    SHA256

    60f6e7bd69593419679b2b182d91b67351819fdd6973d479043f64036dae7fb3

    SHA512

    3e61644aa848fae634efbea68f9ad2249b299c8d2f7a0895449f706e6c8e8081658b47df62d78959b595cba4c829276c1bd565733e34a1dd3bb802c54b4a7e64

  • \??\c:\Users\Admin\AppData\Local\Temp\kp5yh01m\kp5yh01m.0.cs

    Filesize

    6KB

    MD5

    a100d6abfd6918aec8158600c442d61a

    SHA1

    19141bd6e9d00da1aec73b3dc062e8c366dee46d

    SHA256

    f27ca4618b977a51753ff4441613b3705dd422035c07f8bd7939bfc6cfaea888

    SHA512

    b7a558144ca0d3f6e3cfd4ad8899006cad58e8e0cc7621d38ee194be2e4e3807b3400c457e049cc89aa8f0522d316a42403c165d8649836ff2edd8532e4c71f0

  • \??\c:\Users\Admin\AppData\Local\Temp\kp5yh01m\kp5yh01m.cmdline

    Filesize

    312B

    MD5

    3924b5021a55f1e6772f0fe2b03c86a7

    SHA1

    91bbd605170714fca7c17c6a57bb768c6169e614

    SHA256

    d915b9c93cfe48761a2217f2277f85a4f47e2a50cb40de4c85ce109e3363f268

    SHA512

    a61287b51abd2fe83d06f7bec342803a4e729c50e95a748a6a7755de22796937786dfed6ce034c5678e38e032aa53370a0fdaf67d6f8aad06f14ae6cdb337b1e

  • memory/112-119-0x0000000001080000-0x0000000001124000-memory.dmp

    Filesize

    656KB

  • memory/112-138-0x0000000000BF0000-0x0000000000CB4000-memory.dmp

    Filesize

    784KB

  • memory/112-134-0x00000000001E0000-0x00000000001E8000-memory.dmp

    Filesize

    32KB

  • memory/840-70-0x0000000000740000-0x0000000000748000-memory.dmp

    Filesize

    32KB

  • memory/840-74-0x0000000000A70000-0x0000000000B34000-memory.dmp

    Filesize

    784KB

  • memory/840-55-0x0000000001080000-0x0000000001124000-memory.dmp

    Filesize

    656KB

  • memory/2196-151-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2240-20-0x0000000000470000-0x000000000047C000-memory.dmp

    Filesize

    48KB

  • memory/2240-35-0x0000000074730000-0x0000000074E1E000-memory.dmp

    Filesize

    6.9MB

  • memory/2240-1-0x00000000013C0000-0x0000000001464000-memory.dmp

    Filesize

    656KB

  • memory/2240-4-0x0000000074730000-0x0000000074E1E000-memory.dmp

    Filesize

    6.9MB

  • memory/2240-17-0x0000000000390000-0x0000000000398000-memory.dmp

    Filesize

    32KB

  • memory/2240-19-0x0000000004E40000-0x0000000004EA8000-memory.dmp

    Filesize

    416KB

  • memory/2240-0-0x000000007473E000-0x000000007473F000-memory.dmp

    Filesize

    4KB

  • memory/2240-23-0x00000000006F0000-0x00000000007B4000-memory.dmp

    Filesize

    784KB

  • memory/2580-87-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2608-30-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2608-33-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2608-34-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2608-32-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2608-28-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2608-26-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2608-24-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2608-31-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2608-52-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2608-36-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2608-37-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2608-38-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2608-40-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB