Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 11:22
Static task
static1
Behavioral task
behavioral1
Sample
0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44.exe
Resource
win10v2004-20250129-en
General
-
Target
0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44.exe
-
Size
951KB
-
MD5
aa82ab6c120ad91f064822494fe62efb
-
SHA1
eb10220cfcad3f8e92d5bcbda0d49cf1866df9a0
-
SHA256
0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44
-
SHA512
3edfd8f420f3a29477a006000ce6c809814f496edc30ae86278b6cda103641ac69fec086698d4171be8f3975cb373ef5502ab34266fd8d1338b51ff2fa020920
-
SSDEEP
24576:AN+cu49fdt9rdqyPWLzAh0ldWjWCV6JApBpgK5Fz:i+cuWt9RZPgK0ldWjWCPppFz
Malware Config
Extracted
babylonrat
serialordersservice.ddns.net
Signatures
-
Babylon RAT
Babylon RAT is remote access trojan written in C++.
-
Babylonrat family
-
Executes dropped EXE 2 IoCs
pid Process 4832 orderspromptservice.exe 5068 orderspromptservice.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\orderspromptservice = "C:\\ProgramData\\orderspromptservice\\orderspromptservice.exe" 0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44.exe Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\orderspromptservice = "C:\\ProgramData\\orderspromptservice\\orderspromptservice.exe" orderspromptservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\orderspromptservice = "C:\\ProgramData\\orderspromptservice\\orderspromptservice.exe" orderspromptservice.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1028 0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44.exe 4832 orderspromptservice.exe 5068 orderspromptservice.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language orderspromptservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language orderspromptservice.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1028 0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44.exe 1028 0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44.exe 4832 orderspromptservice.exe 4832 orderspromptservice.exe 5068 orderspromptservice.exe 5068 orderspromptservice.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4832 orderspromptservice.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeShutdownPrivilege 1028 0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44.exe Token: SeDebugPrivilege 1028 0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44.exe Token: SeTcbPrivilege 1028 0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44.exe Token: SeShutdownPrivilege 4832 orderspromptservice.exe Token: SeDebugPrivilege 4832 orderspromptservice.exe Token: SeTcbPrivilege 4832 orderspromptservice.exe Token: SeShutdownPrivilege 5068 orderspromptservice.exe Token: SeDebugPrivilege 5068 orderspromptservice.exe Token: SeTcbPrivilege 5068 orderspromptservice.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4832 orderspromptservice.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1028 wrote to memory of 4832 1028 0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44.exe 83 PID 1028 wrote to memory of 4832 1028 0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44.exe 83 PID 1028 wrote to memory of 4832 1028 0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44.exe 83 PID 4832 wrote to memory of 5068 4832 orderspromptservice.exe 86 PID 4832 wrote to memory of 5068 4832 orderspromptservice.exe 86 PID 4832 wrote to memory of 5068 4832 orderspromptservice.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44.exe"C:\Users\Admin\AppData\Local\Temp\0b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\ProgramData\orderspromptservice\orderspromptservice.exe"C:\ProgramData\orderspromptservice\orderspromptservice.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\ProgramData\orderspromptservice\orderspromptservice.exe"C:\ProgramData\orderspromptservice\orderspromptservice.exe" 48323⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
951KB
MD5aa82ab6c120ad91f064822494fe62efb
SHA1eb10220cfcad3f8e92d5bcbda0d49cf1866df9a0
SHA2560b3eb2c564e87b1aa8c853a6af7a08836ea402c7776f44650849abdc1d4c5d44
SHA5123edfd8f420f3a29477a006000ce6c809814f496edc30ae86278b6cda103641ac69fec086698d4171be8f3975cb373ef5502ab34266fd8d1338b51ff2fa020920