Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
597s -
max time network
606s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 15:28
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
General
-
Target
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 10 IoCs
Processes:
resource yara_rule behavioral13/memory/2984-1-0x00000000009B0000-0x0000000000A1C000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral13/memory/2532-12-0x0000000000930000-0x000000000099C000-memory.dmp family_quasar behavioral13/memory/2044-29-0x0000000001050000-0x00000000010BC000-memory.dmp family_quasar behavioral13/memory/2160-41-0x0000000001050000-0x00000000010BC000-memory.dmp family_quasar behavioral13/memory/2692-64-0x00000000003C0000-0x000000000042C000-memory.dmp family_quasar behavioral13/memory/1008-76-0x0000000000070000-0x00000000000DC000-memory.dmp family_quasar behavioral13/memory/1800-88-0x0000000000CB0000-0x0000000000D1C000-memory.dmp family_quasar behavioral13/memory/2508-100-0x0000000000CB0000-0x0000000000D1C000-memory.dmp family_quasar behavioral13/memory/1308-112-0x0000000000090000-0x00000000000FC000-memory.dmp family_quasar -
Executes dropped EXE 9 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2532 Client.exe 2044 Client.exe 2160 Client.exe 2880 Client.exe 2692 Client.exe 1008 Client.exe 1800 Client.exe 2508 Client.exe 1308 Client.exe -
Loads dropped DLL 9 IoCs
Processes:
Uni - Copy (12) - Copy - Copy - Copy.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exepid process 2984 Uni - Copy (12) - Copy - Copy - Copy.exe 2076 cmd.exe 748 cmd.exe 2568 cmd.exe 1364 cmd.exe 948 cmd.exe 2940 cmd.exe 3064 cmd.exe 1100 cmd.exe -
Looks up external IP address via web service 20 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com 6 api.ipify.org 39 ip-api.com 47 api.ipify.org 51 ip-api.com 21 ip-api.com 23 api.ipify.org 27 ip-api.com 29 api.ipify.org 33 ip-api.com 45 ip-api.com 8 ip-api.com 35 api.ipify.org 41 api.ipify.org 53 api.ipify.org 59 api.ipify.org 11 api.ipify.org 15 ip-api.com 17 api.ipify.org 57 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exepid process 2508 schtasks.exe 2648 schtasks.exe 1952 schtasks.exe 1068 schtasks.exe 1780 schtasks.exe 2636 schtasks.exe 2484 SCHTASKS.exe 2076 schtasks.exe 1536 schtasks.exe 2680 schtasks.exe -
Runs ping.exe 1 TTPs 8 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 2608 PING.EXE 1852 PING.EXE 1948 PING.EXE 2540 PING.EXE 1768 PING.EXE 1868 PING.EXE 2788 PING.EXE 2672 PING.EXE -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
Uni - Copy (12) - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 2984 Uni - Copy (12) - Copy - Copy - Copy.exe Token: SeDebugPrivilege 2532 Client.exe Token: SeDebugPrivilege 2044 Client.exe Token: SeDebugPrivilege 2160 Client.exe Token: SeDebugPrivilege 2880 Client.exe Token: SeDebugPrivilege 2692 Client.exe Token: SeDebugPrivilege 1008 Client.exe Token: SeDebugPrivilege 1800 Client.exe Token: SeDebugPrivilege 2508 Client.exe Token: SeDebugPrivilege 1308 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (12) - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 2984 wrote to memory of 2636 2984 Uni - Copy (12) - Copy - Copy - Copy.exe schtasks.exe PID 2984 wrote to memory of 2636 2984 Uni - Copy (12) - Copy - Copy - Copy.exe schtasks.exe PID 2984 wrote to memory of 2636 2984 Uni - Copy (12) - Copy - Copy - Copy.exe schtasks.exe PID 2984 wrote to memory of 2636 2984 Uni - Copy (12) - Copy - Copy - Copy.exe schtasks.exe PID 2984 wrote to memory of 2532 2984 Uni - Copy (12) - Copy - Copy - Copy.exe Client.exe PID 2984 wrote to memory of 2532 2984 Uni - Copy (12) - Copy - Copy - Copy.exe Client.exe PID 2984 wrote to memory of 2532 2984 Uni - Copy (12) - Copy - Copy - Copy.exe Client.exe PID 2984 wrote to memory of 2532 2984 Uni - Copy (12) - Copy - Copy - Copy.exe Client.exe PID 2984 wrote to memory of 2532 2984 Uni - Copy (12) - Copy - Copy - Copy.exe Client.exe PID 2984 wrote to memory of 2532 2984 Uni - Copy (12) - Copy - Copy - Copy.exe Client.exe PID 2984 wrote to memory of 2532 2984 Uni - Copy (12) - Copy - Copy - Copy.exe Client.exe PID 2984 wrote to memory of 2484 2984 Uni - Copy (12) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2984 wrote to memory of 2484 2984 Uni - Copy (12) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2984 wrote to memory of 2484 2984 Uni - Copy (12) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2984 wrote to memory of 2484 2984 Uni - Copy (12) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2532 wrote to memory of 2508 2532 Client.exe schtasks.exe PID 2532 wrote to memory of 2508 2532 Client.exe schtasks.exe PID 2532 wrote to memory of 2508 2532 Client.exe schtasks.exe PID 2532 wrote to memory of 2508 2532 Client.exe schtasks.exe PID 2532 wrote to memory of 2076 2532 Client.exe cmd.exe PID 2532 wrote to memory of 2076 2532 Client.exe cmd.exe PID 2532 wrote to memory of 2076 2532 Client.exe cmd.exe PID 2532 wrote to memory of 2076 2532 Client.exe cmd.exe PID 2076 wrote to memory of 1912 2076 cmd.exe chcp.com PID 2076 wrote to memory of 1912 2076 cmd.exe chcp.com PID 2076 wrote to memory of 1912 2076 cmd.exe chcp.com PID 2076 wrote to memory of 1912 2076 cmd.exe chcp.com PID 2076 wrote to memory of 1852 2076 cmd.exe PING.EXE PID 2076 wrote to memory of 1852 2076 cmd.exe PING.EXE PID 2076 wrote to memory of 1852 2076 cmd.exe PING.EXE PID 2076 wrote to memory of 1852 2076 cmd.exe PING.EXE PID 2076 wrote to memory of 2044 2076 cmd.exe Client.exe PID 2076 wrote to memory of 2044 2076 cmd.exe Client.exe PID 2076 wrote to memory of 2044 2076 cmd.exe Client.exe PID 2076 wrote to memory of 2044 2076 cmd.exe Client.exe PID 2076 wrote to memory of 2044 2076 cmd.exe Client.exe PID 2076 wrote to memory of 2044 2076 cmd.exe Client.exe PID 2076 wrote to memory of 2044 2076 cmd.exe Client.exe PID 2044 wrote to memory of 1536 2044 Client.exe schtasks.exe PID 2044 wrote to memory of 1536 2044 Client.exe schtasks.exe PID 2044 wrote to memory of 1536 2044 Client.exe schtasks.exe PID 2044 wrote to memory of 1536 2044 Client.exe schtasks.exe PID 2044 wrote to memory of 748 2044 Client.exe cmd.exe PID 2044 wrote to memory of 748 2044 Client.exe cmd.exe PID 2044 wrote to memory of 748 2044 Client.exe cmd.exe PID 2044 wrote to memory of 748 2044 Client.exe cmd.exe PID 748 wrote to memory of 296 748 cmd.exe chcp.com PID 748 wrote to memory of 296 748 cmd.exe chcp.com PID 748 wrote to memory of 296 748 cmd.exe chcp.com PID 748 wrote to memory of 296 748 cmd.exe chcp.com PID 748 wrote to memory of 1948 748 cmd.exe PING.EXE PID 748 wrote to memory of 1948 748 cmd.exe PING.EXE PID 748 wrote to memory of 1948 748 cmd.exe PING.EXE PID 748 wrote to memory of 1948 748 cmd.exe PING.EXE PID 748 wrote to memory of 2160 748 cmd.exe Client.exe PID 748 wrote to memory of 2160 748 cmd.exe Client.exe PID 748 wrote to memory of 2160 748 cmd.exe Client.exe PID 748 wrote to memory of 2160 748 cmd.exe Client.exe PID 748 wrote to memory of 2160 748 cmd.exe Client.exe PID 748 wrote to memory of 2160 748 cmd.exe Client.exe PID 748 wrote to memory of 2160 748 cmd.exe Client.exe PID 2160 wrote to memory of 2648 2160 Client.exe schtasks.exe PID 2160 wrote to memory of 2648 2160 Client.exe schtasks.exe PID 2160 wrote to memory of 2648 2160 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ABb84DOYnXso.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\5mxgQoIo3Fmp.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CSyqmV4c8OW2.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\mtotvgM5D2RX.bat" "9⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Ci79qxL5ADQk.bat" "11⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\AKIQzIPfvj1f.bat" "13⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\uJ8B701R2yzN.bat" "15⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\51y4FSyZdvQU.bat" "17⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (12) - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\51y4FSyZdvQU.batFilesize
207B
MD5c928175b68f6998e28a2ede8a0112de9
SHA111b1514d03abeb4007e9526ab535ec5450b93ef2
SHA256e4712745fd3a27d3a3aae163febe632b8f890f0add58ece8c3b96baef0c79992
SHA5123c81b63e80a447fb09621fd8040bcdcbe90fc88228374b1cbf860c6d7cceb88c89e0cdd4defed5aa5c5c90362105a88986a2e4cf70d5107f745b3ddf32673b9d
-
C:\Users\Admin\AppData\Local\Temp\5mxgQoIo3Fmp.batFilesize
207B
MD596f66fd1962f14a7a9a7e96b27350424
SHA13032f892e23da188f307ce9c45a691c8428944b9
SHA25660e1f38c1f2d05aac360fa11305afcd51f9da20000b47589a4526cdb359fa5d3
SHA512d6e45b8a9aae7621f00801214f1de4381d42533164508dbbcd0ebb7b6bd864a21c54ce5678169d5ec9fee4d4bcb901c19a28b5893c63fd381df7b660161b42b4
-
C:\Users\Admin\AppData\Local\Temp\ABb84DOYnXso.batFilesize
207B
MD5d0890a2f0428af375715a5686715e46c
SHA1cf5266dc2642040558daf1edea5a7e98aecfb5e1
SHA256bc64e12863350ea14d30e848293b0c4aa3effd35783c57002e7525bed7404702
SHA5124b7c5f1ffb7cc43dc5397acc157e8cc31cc34d7be781da89f5163f132580ecacca689df77a1a2003858d80b8ee112455204913048111a1fa4f3ec3a93dc01fbb
-
C:\Users\Admin\AppData\Local\Temp\AKIQzIPfvj1f.batFilesize
207B
MD550bb7cfbd38988d8cbcea48a0764d1ca
SHA14b354d2ca3babd86fbec39f0ecd3abcb424d6052
SHA256e4de3015903eec1a7ce09359d32b4401e79d259e4dff359b37788f40716390d3
SHA5126848e45bac948266315a7b8c7f8742a0a3c05b9970ffa021e9ea8601e806af335dcc376af832af8ac2fe34cea4bfff5b580cf26e7d6dfe5185508979df305663
-
C:\Users\Admin\AppData\Local\Temp\CSyqmV4c8OW2.batFilesize
207B
MD575d36ae74ba5b6dd83c43c3dbc458c0e
SHA1ec68c38e5d191be56ec84e6aed2dcde73ced7dbd
SHA256dace719784c5a04d25d469139860e766e89c0642ec29d232fad316ebfa09b7d0
SHA512685978ab0dbeced334a16c57536c045ca94a8b381b74a6b10016d62097c84e48ff6b8f44669d30998f028e1d6f9863ed62bf8d39dff4ee71147d69cc73ac0d92
-
C:\Users\Admin\AppData\Local\Temp\Ci79qxL5ADQk.batFilesize
207B
MD5e369989587ed36c38774b9bfa06b2ed3
SHA1ab979d4a0680bcbe2006fa07f73a8cfb8cb198c8
SHA2563218e81c77544742098cc2cea013a4f522599165306b21d96163dab450aacd4e
SHA51232f7b5b026043cad8224ce36d6b95dedc0c212bfe397ec11fe45ac18aa9b1a3081cb0a89219475a93f22b5092676dce7a066a8a2ca53c4855b4ad507f8d313f7
-
C:\Users\Admin\AppData\Local\Temp\mtotvgM5D2RX.batFilesize
207B
MD5c21bc67654e0fc33e8b48ca87e1a3f9d
SHA13658903873e34f66759a580864abf8277e2689f6
SHA25611ee2a7dc4309bb457a8c0528717ed7f49a37447cd26155648b7bb123a6013c8
SHA512f7b4471e1e4836ae7b3bfdf3654f14f4a48ac8f638b5415bbabe71791bdffebdfa3e864f653abedf8b7f8bf95558a68e5a0e79eb469063b2202307344aa09853
-
C:\Users\Admin\AppData\Local\Temp\uJ8B701R2yzN.batFilesize
207B
MD5faae5ddbf1d1aa56bdbf8aec42be9969
SHA18fa36fc36319a45e7b847739295a153ee2392a44
SHA2561b08f51c758c4f12b58f4789c41c22f84a622d7260b58b596d5541b3f32e4416
SHA5120bded1b0e2af0a151c58e702b80a415a9235355725fe7b987d5a2f947926f7bace2f775ab94aedb3c6043050fe5a339ad24fc07ca4c9f6f2b3880204f85bb0fb
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/1008-76-0x0000000000070000-0x00000000000DC000-memory.dmpFilesize
432KB
-
memory/1308-112-0x0000000000090000-0x00000000000FC000-memory.dmpFilesize
432KB
-
memory/1800-88-0x0000000000CB0000-0x0000000000D1C000-memory.dmpFilesize
432KB
-
memory/2044-29-0x0000000001050000-0x00000000010BC000-memory.dmpFilesize
432KB
-
memory/2160-41-0x0000000001050000-0x00000000010BC000-memory.dmpFilesize
432KB
-
memory/2508-100-0x0000000000CB0000-0x0000000000D1C000-memory.dmpFilesize
432KB
-
memory/2532-26-0x0000000074190000-0x000000007487E000-memory.dmpFilesize
6.9MB
-
memory/2532-16-0x0000000074190000-0x000000007487E000-memory.dmpFilesize
6.9MB
-
memory/2532-14-0x0000000074190000-0x000000007487E000-memory.dmpFilesize
6.9MB
-
memory/2532-12-0x0000000000930000-0x000000000099C000-memory.dmpFilesize
432KB
-
memory/2532-13-0x0000000074190000-0x000000007487E000-memory.dmpFilesize
6.9MB
-
memory/2692-64-0x00000000003C0000-0x000000000042C000-memory.dmpFilesize
432KB
-
memory/2984-0-0x000000007419E000-0x000000007419F000-memory.dmpFilesize
4KB
-
memory/2984-15-0x0000000074190000-0x000000007487E000-memory.dmpFilesize
6.9MB
-
memory/2984-4-0x0000000074190000-0x000000007487E000-memory.dmpFilesize
6.9MB
-
memory/2984-3-0x000000007419E000-0x000000007419F000-memory.dmpFilesize
4KB
-
memory/2984-2-0x0000000074190000-0x000000007487E000-memory.dmpFilesize
6.9MB
-
memory/2984-1-0x00000000009B0000-0x0000000000A1C000-memory.dmpFilesize
432KB