Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...2).exe
windows7-x64
10uni/Uni - ...2).exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
298s -
max time network
289s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 06:22
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (15) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (15) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (16) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (16) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (17) - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (17) - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (18) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (18) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (19) - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (19) - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (2) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (2) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (2).exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (2).exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (20) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (20) - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (21) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (21) - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (22) - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (22) - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (23) - Copy.exe
Resource
win7-20240220-en
General
-
Target
uni/Uni - Copy (16) - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 3 IoCs
Processes:
resource yara_rule behavioral13/memory/2004-1-0x0000000000D10000-0x0000000000D7C000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral13/memory/2760-10-0x0000000000920000-0x000000000098C000-memory.dmp family_quasar -
Executes dropped EXE 2 IoCs
Processes:
Client.exePZRfCY8jUAvx.exepid process 2760 Client.exe 2188 PZRfCY8jUAvx.exe -
Loads dropped DLL 2 IoCs
Processes:
Uni - Copy (16) - Copy.exeClient.exepid process 2004 Uni - Copy (16) - Copy.exe 2760 Client.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
SCHTASKS.exeschtasks.exeschtasks.exeSCHTASKS.exepid process 348 SCHTASKS.exe 2736 schtasks.exe 2140 schtasks.exe 2464 SCHTASKS.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423471410" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000caed17d716ba64b8b99860df8904bdc0000000002000000000010660000000100002000000052c799c8657996e84075e7fbb7e53bf521ec529cfd31e382e7d9a78fdeda7eee000000000e800000000200002000000030fdca16865500d7414c066a28d0cf4d7f7540d78bf51e535146445829129ec3200000001135583ccf47bf2792a8dd6c0e5970bf5e02262e91ee80184dabb1eebcb847f940000000460e9b24277e8c7c7d0cb7b9a98dd052bdafcaa5238db8cdbfa1d5e1e2c745b86c356592df57b8244acdc85cc7612bd586315ea560f4f6b98b4b94b99667b3fa iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60b746c4b5b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF7CE121-20A8-11EF-AB07-4AE872E97954} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000caed17d716ba64b8b99860df8904bdc000000000200000000001066000000010000200000005165e689cb7b30553d865dbaceb20ea6a752f9f5cdb0d0a18e7f31eb2737c11b000000000e8000000002000020000000cf53a1e24b8b7e8686e6dccdeec84e7a6753763622bc9d0fb49749d08097ba6490000000dafb2107d8f896596dd3e488432c37b822c505c12278297b48737d6507e5e1271822c3ea209af7cec9eac3ac2b9a197ce37feb6968796a5b695476d7755ab85d637b456a62a2e9e014e875792d715a5cfcc2b626253e7873d880f619f26a74cfdda9edef3c3d51e3e7f7016cfaa856dc1d7ba35590f2f2841f1214d811e2366b9a9bc94d01847a94fb533481e80d651f40000000c378f5de15f552e8c187b16a538cdfdb13f4eb198788ae9b36bd9a4b8e57cfe0da76836447d3cb054687eb83e917a53bd020cbcda9895cb5060aa4be11c6ad9f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 1524 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 1524 vlc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
Uni - Copy (16) - Copy.exeClient.exeAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 2004 Uni - Copy (16) - Copy.exe Token: SeDebugPrivilege 2760 Client.exe Token: 33 1088 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1088 AUDIODG.EXE Token: 33 1088 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1088 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
vlc.exeiexplore.exepid process 1524 vlc.exe 1524 vlc.exe 1524 vlc.exe 1524 vlc.exe 1524 vlc.exe 1524 vlc.exe 1404 iexplore.exe 1404 iexplore.exe -
Suspicious use of SendNotifyMessage 5 IoCs
Processes:
vlc.exepid process 1524 vlc.exe 1524 vlc.exe 1524 vlc.exe 1524 vlc.exe 1524 vlc.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
Client.exePZRfCY8jUAvx.exevlc.exeiexplore.exeIEXPLORE.EXEpid process 2760 Client.exe 2188 PZRfCY8jUAvx.exe 1524 vlc.exe 1404 iexplore.exe 1404 iexplore.exe 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
Uni - Copy (16) - Copy.exeClient.exeiexplore.exedescription pid process target process PID 2004 wrote to memory of 2736 2004 Uni - Copy (16) - Copy.exe schtasks.exe PID 2004 wrote to memory of 2736 2004 Uni - Copy (16) - Copy.exe schtasks.exe PID 2004 wrote to memory of 2736 2004 Uni - Copy (16) - Copy.exe schtasks.exe PID 2004 wrote to memory of 2736 2004 Uni - Copy (16) - Copy.exe schtasks.exe PID 2004 wrote to memory of 2760 2004 Uni - Copy (16) - Copy.exe Client.exe PID 2004 wrote to memory of 2760 2004 Uni - Copy (16) - Copy.exe Client.exe PID 2004 wrote to memory of 2760 2004 Uni - Copy (16) - Copy.exe Client.exe PID 2004 wrote to memory of 2760 2004 Uni - Copy (16) - Copy.exe Client.exe PID 2004 wrote to memory of 2760 2004 Uni - Copy (16) - Copy.exe Client.exe PID 2004 wrote to memory of 2760 2004 Uni - Copy (16) - Copy.exe Client.exe PID 2004 wrote to memory of 2760 2004 Uni - Copy (16) - Copy.exe Client.exe PID 2760 wrote to memory of 2140 2760 Client.exe schtasks.exe PID 2760 wrote to memory of 2140 2760 Client.exe schtasks.exe PID 2760 wrote to memory of 2140 2760 Client.exe schtasks.exe PID 2760 wrote to memory of 2140 2760 Client.exe schtasks.exe PID 2004 wrote to memory of 2464 2004 Uni - Copy (16) - Copy.exe SCHTASKS.exe PID 2004 wrote to memory of 2464 2004 Uni - Copy (16) - Copy.exe SCHTASKS.exe PID 2004 wrote to memory of 2464 2004 Uni - Copy (16) - Copy.exe SCHTASKS.exe PID 2004 wrote to memory of 2464 2004 Uni - Copy (16) - Copy.exe SCHTASKS.exe PID 2760 wrote to memory of 2188 2760 Client.exe PZRfCY8jUAvx.exe PID 2760 wrote to memory of 2188 2760 Client.exe PZRfCY8jUAvx.exe PID 2760 wrote to memory of 2188 2760 Client.exe PZRfCY8jUAvx.exe PID 2760 wrote to memory of 2188 2760 Client.exe PZRfCY8jUAvx.exe PID 1404 wrote to memory of 2272 1404 iexplore.exe IEXPLORE.EXE PID 1404 wrote to memory of 2272 1404 iexplore.exe IEXPLORE.EXE PID 1404 wrote to memory of 2272 1404 iexplore.exe IEXPLORE.EXE PID 1404 wrote to memory of 2272 1404 iexplore.exe IEXPLORE.EXE PID 2760 wrote to memory of 348 2760 Client.exe SCHTASKS.exe PID 2760 wrote to memory of 348 2760 Client.exe SCHTASKS.exe PID 2760 wrote to memory of 348 2760 Client.exe SCHTASKS.exe PID 2760 wrote to memory of 348 2760 Client.exe SCHTASKS.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (16) - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (16) - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (16) - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\PZRfCY8jUAvx.exe"C:\Users\Admin\AppData\Local\Temp\PZRfCY8jUAvx.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Client.exe" /tr "'C:\Users\Admin\AppData\Roaming\SubDir\Client.exe'" /sc onlogon /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (16) - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (16) - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x48c1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\WatchRedo.aif"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\WatchRedo.aif"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\InstallMount.mht1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1404 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD57268667255797d113cdf359a77162314
SHA19756f47415082683d8b2c3c98ce2435704f0a99f
SHA25652a0b6fa91dce8fc874dc0344ca1a335bd312a5a5b969d4f1eec8e4dc9599752
SHA5129aad323f4f9e6e20023d608a31ce0cc6c48d44dca4e6f8d31f313be00b925d420cba43e31376fd366d22904ca053ef7349815d3c9e221f8f38458e9aea88ddb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD507ce9730ccf1bd1e63e05d3ff4b02fa2
SHA12584c81634c50092f2e2b71a70bc5a1c7b351eca
SHA2562c6c3b97ba2478b1165f6c63b9826fc6270a8a7ce8779146cc423fa231196a81
SHA5125264bbf7510976ade6acb206d557ac836f7c23baa5dfa8f9c756c450e711ddb3102063e739363219616dd5ded6e1ab6c6f7d290b9a84109dc4fb7a7eb2daf4a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5f123e0d4eaab269eb0ddc82117be70ac
SHA1fc499ffaaf1ec2f0e75e9702fd6eb736d63e1b15
SHA2560199f93b6a3bdbbbef0b2a1a3d686c1d20801089f876cb8d9099f1b1542f83eb
SHA51245d589c5478a9d5c371297e9c122cfc4c7b833840d8b264f37a01213890d8aaca4b10d66cd2ba038c555061823cd45f1fceb5ea826cb63051b9ef95a18fd3b3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ecded4e40c179d6814aced7b41ae3a32
SHA1ba8f84c2dfe24845bbe21831e1f06113829a48d5
SHA256ced1236e646ad23401ddc8697fedb719ff1e0c41177ac2a4653432bb4913d577
SHA5120de57c4a1d0c8eb0ca7d23374fc6029baae3b5786d1287ff1d21d2c53fc686187cfd63a3271802bd2be7d6cbeda40a314865e699411d61c2d83d10c4d68b6938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD560d7d96d0bee1ce0d4074a1fa63db9bb
SHA1cbbc89c5de19abeedc730134500ecea0734764f6
SHA256e2b0924fd608cadbf6d0abef4d4a4c1d2c2c802c9812db79d1377cd589c10327
SHA512e4467039d9d2d74167e261d0282c4b6a8b538116d125d222f4b20c5cd27f9d19a498035dfd15f177076a09975b9449427f6f7c82f4121341a727d44ebeed1c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a157696cf543ad4fff6334d175666f82
SHA1a4beea931496d5828e34a997e760f2ff85ad3cef
SHA2568e4386d6d8a5d50b3a35b17a279efeb82048aeb431381613b2419d4ad8f28c81
SHA5123f43ecf4d317e4314213d0caf7dfcab1c8249ff6bc274ed543959801bead7a10e7f5c9509f7c969096f88590faef5d4b1fb2341dfefc55a64a6525e04e594099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD503b611cd5caf59c6c20aef69b279c3d7
SHA16c0721090798e0b8cf4159466ae04ec7012ac38c
SHA2562939fd9f1bc52e8900060073d5033338cd297d715ba6da7467f08f70af4b113b
SHA5124857cd7f3da4dc3ef0804be585baba116901888119369b2c078d972ac7afe5d95e38e7ff4022ba5f0d893ac8d4482b8ef719513107d009acfefd74dfa4d43e0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5f9b9dba797c75efaa5ebb3115f28ef1c
SHA12442434054de092dbfdd7bf86231ab3564171b65
SHA25613b08c90e66d71c5206475ea066a3c9276d55b69798008b7465ce4882c3f49df
SHA51292388fe3430d78a20694005b5327277f69b0a90339d96d968a67e4a721a4df4d18e3118e53bac0f9aff1858d6f3117e61f353f13ad57f35774f7cb51c733a23b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5992aa0d253e9ac33eed411a05f7ddde3
SHA10cb5ea9e1abf8402fc8512f2589caf7543c36606
SHA256626f0ee2cef24bd7ffd9aa5450f32e5581420bf4252a5309904486a0a0e802fb
SHA51237cd82baf0db85678b42e736913e98dedaa472cb7910b33e65962d0e3ad7fdd11a46c1fca2824560176bf6a0f46b1f26306246039e0a40e1d18e928d5011c0b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD57b52caca84011207c880be8abbd21879
SHA194eed223a18b4fc16e68ddbbb49aa7315abf54e3
SHA256052e3b5b3a4229729095f6f673c25a502dbd1048ea46d7f10b6d142449005e87
SHA5129de3058684e6f03b2b638a9b9bcbafed5656da66303a30677a7fc70c6710ae9d926c5ece4f58805ff5e70f21656de0a7d0ac01995eee979c5e347cb1a96648e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5c08dec0b0d5aa58ab49edadae7e989d2
SHA1d4d04d7cf762355eca06359422d531ce5b42c5fd
SHA256423c9dad43c84fae3ed49f19252f16565e43f7ac1c852d8cfca644dc9da243d7
SHA512df83be23a0d89cb73974376713e68fa0e8cea3a0e2244685da4edcd9a3e4b0de0cf33c353dcb2fcd83eeb53e99220059c8ab8eab89dd5d6234880d9056884786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD506ecf8978d9fde6f7c3686fa9e4e52f5
SHA13182521daebe79dfbafe807c3cfabd69cb8935cf
SHA256adb2df7e2426d4c5d66ea3c1d3353053c5a962fe7b960ac5ddb783ae543c0474
SHA512b456e0c588ff775baef74fe71aa51a13472df7eabc33f8cfb35839834286525d9102b3068fe9ca17de81613d097a3f2ae2862967e9dc44c9a0de6e86f2aa085f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD54744ae33e33f58a31a45bf3241a11a49
SHA16c21406aa81920a22970206e7f47a777b3698359
SHA2565373b1de5228499e73f8f9c049df312606398c9c55b9361b7786f86d298b1455
SHA512d92b4880fb9cfe2dfe89e25f2d15f3bd5f48def7b69311df96619f0139aaed0812349b44c3ae9e4c835c04825bea25138dcdd5f35fc917531cc015728310113c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD57ac4734fb0751bbbfbb5040edf512da7
SHA134958eceaa7fe93b5b1ddf57ed027bdd146d328e
SHA256e313e54a91570881b6a0025e9966852b76bf149401e20f1360467c71483300e3
SHA512f8c764f8a0e49ffc4c44d92149ceb72bad66ab17017521f565e0337dbcbae38a0a43313750b144b6eb6ccd84bb736266c95ef7a4aff89b9801d309660883ad72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e09fe1bda44e3c983edca4cf159ece1b
SHA157acfa8f43142489b241e38bba2d6b9a2b2a6da0
SHA256ed3611e5fd98bfa575722648076a1fbaac07917fcac23d61ab2333385f5aaa62
SHA512a99f5c793bf7249233fb0023337cfbf89ce1a6495004ff7059800e80176d185b550a9591ef8c5528479e4b6e343d2e77306f62a73621a5703f089d2a94259a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD543f2b65a2b7c85b338aa1995946b8f33
SHA1295b6f49d27f988c0ee082b394e500be745bad52
SHA2564296fb27734759317f8ff33c1a846511aea0507dcc42a5de276425ae85243869
SHA512d5f4fed999d9db4e68465875afbfbf7608ed2079d4b1fa9f4eca8b309df1310eb455e906e16c53ca3f60fc8e2f4770888c065d9ca0ed8f719923a9722cd5969a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD558451100278ae86dd5548789956513d5
SHA122a688fd8220fb97e4f6e794f7f81f861a1c84fc
SHA2566cd12818b81ad0f758bec020b64d215519b9ea6df3ab01850b4c4a08c7a59904
SHA512bfc443cafff358e37572667b14994d3b255afd2c1bc38372c9bbd2497d343ac8f94d2af84926aa0ce8714946b208c90aa0b2529f7b7d589ee79ade111dc9533d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56cf665ac0a4d227b2ef0492b36a79a8a
SHA16d530f2c075f423b52dfca48279ce489316563cb
SHA2560e3be2267b298b60faf2a54ae1a5578cd17105c46a768890e6244f01d9cc7bb4
SHA512efafa8bfee6d7b67bc037ce32e4159266281773ae31bf953f22660e5f443dc9f6d35ad9d4d67df2d06ba5146d8347dc82f30fdb0bb502c0639044c9a969f8505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b759dcf82d51b6bece065c97608499c7
SHA10b0ef0e790435ba629b963c6db26d830cea9f9dd
SHA2566eb806b00d00b6f2e5833ef8fd2286bec97f8b2895a05a107ff39927bc5298a9
SHA51298e853dceca2171b3407c6d33e4cf072ae98eae30f90780e954c52cfbeef3e0a72a2eadeceb40f7d6c1bf948d4ed3ea9d60d7888de3ab06ef42480a3b761ac4c
-
C:\Users\Admin\AppData\Local\Temp\Cab90ED.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Cab91D9.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\PZRfCY8jUAvx.exeFilesize
277KB
MD5dac0c5b2380cbdd93b46763427c9f8df
SHA1038089e1a0ac8375be797fc3ce7ae719abc72834
SHA256d02538788fb57f568ece292f5fc20e9775c86d504de67f57e22534f84adc73c6
SHA51205cc1f6bf25a6545a06c735ae7a4a7fc25489bdb9fbc8d5797be623982662c4a93cba2d20bfe14313ef1548eaaa691e55fabdd8e3d3e45de9ab42dc62f9a7023
-
C:\Users\Admin\AppData\Local\Temp\Tar91ED.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/888-27-0x000007FEF7690000-0x000007FEF76C4000-memory.dmpFilesize
208KB
-
memory/888-30-0x000007FEF6AA0000-0x000007FEF6AB7000-memory.dmpFilesize
92KB
-
memory/888-26-0x000000013F330000-0x000000013F428000-memory.dmpFilesize
992KB
-
memory/888-28-0x000007FEF5E20000-0x000007FEF60D4000-memory.dmpFilesize
2.7MB
-
memory/888-29-0x000007FEF77C0000-0x000007FEF77D8000-memory.dmpFilesize
96KB
-
memory/888-36-0x000007FEF6710000-0x000007FEF6721000-memory.dmpFilesize
68KB
-
memory/1524-46-0x000007FEF66B0000-0x000007FEF66CD000-memory.dmpFilesize
116KB
-
memory/1524-64-0x000007FEF4860000-0x000007FEF4888000-memory.dmpFilesize
160KB
-
memory/1524-61-0x000007FEF4910000-0x000007FEF497F000-memory.dmpFilesize
444KB
-
memory/1524-60-0x000007FEF4980000-0x000007FEF49E7000-memory.dmpFilesize
412KB
-
memory/1524-59-0x000007FEF49F0000-0x000007FEF4A20000-memory.dmpFilesize
192KB
-
memory/1524-58-0x000007FEF4A20000-0x000007FEF4A38000-memory.dmpFilesize
96KB
-
memory/1524-57-0x000007FEF6450000-0x000007FEF6461000-memory.dmpFilesize
68KB
-
memory/1524-56-0x000007FEF6470000-0x000007FEF648B000-memory.dmpFilesize
108KB
-
memory/1524-55-0x000007FEF6490000-0x000007FEF64A1000-memory.dmpFilesize
68KB
-
memory/1524-54-0x000007FEF64B0000-0x000007FEF64C1000-memory.dmpFilesize
68KB
-
memory/1524-53-0x000007FEF64D0000-0x000007FEF64E1000-memory.dmpFilesize
68KB
-
memory/1524-52-0x000007FEF65D0000-0x000007FEF65E8000-memory.dmpFilesize
96KB
-
memory/1524-51-0x000007FEF64F0000-0x000007FEF6511000-memory.dmpFilesize
132KB
-
memory/1524-50-0x000007FEF6520000-0x000007FEF655F000-memory.dmpFilesize
252KB
-
memory/1524-49-0x000007FEF4A40000-0x000007FEF5AEB000-memory.dmpFilesize
16.7MB
-
memory/1524-42-0x000007FEF6AA0000-0x000007FEF6AB7000-memory.dmpFilesize
92KB
-
memory/1524-41-0x000007FEF77C0000-0x000007FEF77D8000-memory.dmpFilesize
96KB
-
memory/1524-40-0x000007FEF5E20000-0x000007FEF60D4000-memory.dmpFilesize
2.7MB
-
memory/1524-39-0x000007FEF7690000-0x000007FEF76C4000-memory.dmpFilesize
208KB
-
memory/1524-38-0x000000013F330000-0x000000013F428000-memory.dmpFilesize
992KB
-
memory/1524-63-0x000007FEF4890000-0x000007FEF48E6000-memory.dmpFilesize
344KB
-
memory/1524-62-0x000007FEF48F0000-0x000007FEF4901000-memory.dmpFilesize
68KB
-
memory/1524-65-0x000007FEF4830000-0x000007FEF4854000-memory.dmpFilesize
144KB
-
memory/1524-66-0x000007FEF4810000-0x000007FEF4827000-memory.dmpFilesize
92KB
-
memory/1524-67-0x000007FEF47E0000-0x000007FEF4803000-memory.dmpFilesize
140KB
-
memory/1524-68-0x000007FEF47C0000-0x000007FEF47D1000-memory.dmpFilesize
68KB
-
memory/1524-70-0x000007FEF3560000-0x000007FEF36D8000-memory.dmpFilesize
1.5MB
-
memory/1524-69-0x000007FEF47A0000-0x000007FEF47B2000-memory.dmpFilesize
72KB
-
memory/1524-43-0x000007FEF6710000-0x000007FEF6721000-memory.dmpFilesize
68KB
-
memory/1524-44-0x000007FEF66F0000-0x000007FEF6707000-memory.dmpFilesize
92KB
-
memory/1524-45-0x000007FEF66D0000-0x000007FEF66E1000-memory.dmpFilesize
68KB
-
memory/1524-47-0x000007FEF6690000-0x000007FEF66A1000-memory.dmpFilesize
68KB
-
memory/1524-556-0x000007FEF4A40000-0x000007FEF5AEB000-memory.dmpFilesize
16.7MB
-
memory/1524-48-0x000007FEF5AF0000-0x000007FEF5CF0000-memory.dmpFilesize
2.0MB
-
memory/2004-0-0x00000000745AE000-0x00000000745AF000-memory.dmpFilesize
4KB
-
memory/2004-14-0x00000000745A0000-0x0000000074C8E000-memory.dmpFilesize
6.9MB
-
memory/2004-2-0x00000000745A0000-0x0000000074C8E000-memory.dmpFilesize
6.9MB
-
memory/2004-1-0x0000000000D10000-0x0000000000D7C000-memory.dmpFilesize
432KB
-
memory/2760-16-0x00000000745A0000-0x0000000074C8E000-memory.dmpFilesize
6.9MB
-
memory/2760-15-0x00000000745A0000-0x0000000074C8E000-memory.dmpFilesize
6.9MB
-
memory/2760-11-0x00000000745A0000-0x0000000074C8E000-memory.dmpFilesize
6.9MB
-
memory/2760-12-0x00000000745A0000-0x0000000074C8E000-memory.dmpFilesize
6.9MB
-
memory/2760-10-0x0000000000920000-0x000000000098C000-memory.dmpFilesize
432KB
-
memory/2760-1257-0x00000000745A0000-0x0000000074C8E000-memory.dmpFilesize
6.9MB