Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
596s -
max time network
603s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 15:28
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
General
-
Target
uni/Uni - Copy (12) - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 11 IoCs
Processes:
resource yara_rule behavioral15/memory/2176-1-0x0000000000B80000-0x0000000000BEC000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral15/memory/1924-12-0x0000000000CD0000-0x0000000000D3C000-memory.dmp family_quasar behavioral15/memory/772-29-0x0000000000CD0000-0x0000000000D3C000-memory.dmp family_quasar behavioral15/memory/572-41-0x0000000000E50000-0x0000000000EBC000-memory.dmp family_quasar behavioral15/memory/1916-53-0x0000000000390000-0x00000000003FC000-memory.dmp family_quasar behavioral15/memory/2448-65-0x0000000000AF0000-0x0000000000B5C000-memory.dmp family_quasar behavioral15/memory/1048-77-0x00000000003A0000-0x000000000040C000-memory.dmp family_quasar behavioral15/memory/2988-89-0x00000000011A0000-0x000000000120C000-memory.dmp family_quasar behavioral15/memory/2492-101-0x0000000000360000-0x00000000003CC000-memory.dmp family_quasar behavioral15/memory/1312-113-0x00000000009B0000-0x0000000000A1C000-memory.dmp family_quasar -
Executes dropped EXE 9 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 1924 Client.exe 772 Client.exe 572 Client.exe 1916 Client.exe 2448 Client.exe 1048 Client.exe 2988 Client.exe 2492 Client.exe 1312 Client.exe -
Loads dropped DLL 9 IoCs
Processes:
Uni - Copy (12) - Copy - Copy.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exepid process 2176 Uni - Copy (12) - Copy - Copy.exe 3040 cmd.exe 916 cmd.exe 2516 cmd.exe 1616 cmd.exe 1232 cmd.exe 2604 cmd.exe 1672 cmd.exe 1620 cmd.exe -
Looks up external IP address via web service 20 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 53 api.ipify.org 59 api.ipify.org 2 ip-api.com 29 api.ipify.org 39 ip-api.com 41 api.ipify.org 21 ip-api.com 45 ip-api.com 6 api.ipify.org 8 ip-api.com 15 ip-api.com 17 api.ipify.org 33 ip-api.com 47 api.ipify.org 57 ip-api.com 51 ip-api.com 11 api.ipify.org 23 api.ipify.org 27 ip-api.com 35 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1620 schtasks.exe 2716 schtasks.exe 1624 schtasks.exe 2040 schtasks.exe 2304 schtasks.exe 1956 SCHTASKS.exe 1560 schtasks.exe 2440 schtasks.exe 2604 schtasks.exe 340 schtasks.exe -
Runs ping.exe 1 TTPs 8 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 184 PING.EXE 1716 PING.EXE 2984 PING.EXE 872 PING.EXE 2236 PING.EXE 1836 PING.EXE 2584 PING.EXE 1008 PING.EXE -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
Uni - Copy (12) - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 2176 Uni - Copy (12) - Copy - Copy.exe Token: SeDebugPrivilege 1924 Client.exe Token: SeDebugPrivilege 772 Client.exe Token: SeDebugPrivilege 572 Client.exe Token: SeDebugPrivilege 1916 Client.exe Token: SeDebugPrivilege 2448 Client.exe Token: SeDebugPrivilege 1048 Client.exe Token: SeDebugPrivilege 2988 Client.exe Token: SeDebugPrivilege 2492 Client.exe Token: SeDebugPrivilege 1312 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (12) - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 2176 wrote to memory of 2304 2176 Uni - Copy (12) - Copy - Copy.exe schtasks.exe PID 2176 wrote to memory of 2304 2176 Uni - Copy (12) - Copy - Copy.exe schtasks.exe PID 2176 wrote to memory of 2304 2176 Uni - Copy (12) - Copy - Copy.exe schtasks.exe PID 2176 wrote to memory of 2304 2176 Uni - Copy (12) - Copy - Copy.exe schtasks.exe PID 2176 wrote to memory of 1924 2176 Uni - Copy (12) - Copy - Copy.exe Client.exe PID 2176 wrote to memory of 1924 2176 Uni - Copy (12) - Copy - Copy.exe Client.exe PID 2176 wrote to memory of 1924 2176 Uni - Copy (12) - Copy - Copy.exe Client.exe PID 2176 wrote to memory of 1924 2176 Uni - Copy (12) - Copy - Copy.exe Client.exe PID 2176 wrote to memory of 1924 2176 Uni - Copy (12) - Copy - Copy.exe Client.exe PID 2176 wrote to memory of 1924 2176 Uni - Copy (12) - Copy - Copy.exe Client.exe PID 2176 wrote to memory of 1924 2176 Uni - Copy (12) - Copy - Copy.exe Client.exe PID 2176 wrote to memory of 1956 2176 Uni - Copy (12) - Copy - Copy.exe SCHTASKS.exe PID 2176 wrote to memory of 1956 2176 Uni - Copy (12) - Copy - Copy.exe SCHTASKS.exe PID 2176 wrote to memory of 1956 2176 Uni - Copy (12) - Copy - Copy.exe SCHTASKS.exe PID 2176 wrote to memory of 1956 2176 Uni - Copy (12) - Copy - Copy.exe SCHTASKS.exe PID 1924 wrote to memory of 1560 1924 Client.exe schtasks.exe PID 1924 wrote to memory of 1560 1924 Client.exe schtasks.exe PID 1924 wrote to memory of 1560 1924 Client.exe schtasks.exe PID 1924 wrote to memory of 1560 1924 Client.exe schtasks.exe PID 1924 wrote to memory of 3040 1924 Client.exe cmd.exe PID 1924 wrote to memory of 3040 1924 Client.exe cmd.exe PID 1924 wrote to memory of 3040 1924 Client.exe cmd.exe PID 1924 wrote to memory of 3040 1924 Client.exe cmd.exe PID 3040 wrote to memory of 852 3040 cmd.exe chcp.com PID 3040 wrote to memory of 852 3040 cmd.exe chcp.com PID 3040 wrote to memory of 852 3040 cmd.exe chcp.com PID 3040 wrote to memory of 852 3040 cmd.exe chcp.com PID 3040 wrote to memory of 1716 3040 cmd.exe PING.EXE PID 3040 wrote to memory of 1716 3040 cmd.exe PING.EXE PID 3040 wrote to memory of 1716 3040 cmd.exe PING.EXE PID 3040 wrote to memory of 1716 3040 cmd.exe PING.EXE PID 3040 wrote to memory of 772 3040 cmd.exe Client.exe PID 3040 wrote to memory of 772 3040 cmd.exe Client.exe PID 3040 wrote to memory of 772 3040 cmd.exe Client.exe PID 3040 wrote to memory of 772 3040 cmd.exe Client.exe PID 3040 wrote to memory of 772 3040 cmd.exe Client.exe PID 3040 wrote to memory of 772 3040 cmd.exe Client.exe PID 3040 wrote to memory of 772 3040 cmd.exe Client.exe PID 772 wrote to memory of 2440 772 Client.exe schtasks.exe PID 772 wrote to memory of 2440 772 Client.exe schtasks.exe PID 772 wrote to memory of 2440 772 Client.exe schtasks.exe PID 772 wrote to memory of 2440 772 Client.exe schtasks.exe PID 772 wrote to memory of 916 772 Client.exe cmd.exe PID 772 wrote to memory of 916 772 Client.exe cmd.exe PID 772 wrote to memory of 916 772 Client.exe cmd.exe PID 772 wrote to memory of 916 772 Client.exe cmd.exe PID 916 wrote to memory of 2292 916 cmd.exe chcp.com PID 916 wrote to memory of 2292 916 cmd.exe chcp.com PID 916 wrote to memory of 2292 916 cmd.exe chcp.com PID 916 wrote to memory of 2292 916 cmd.exe chcp.com PID 916 wrote to memory of 2984 916 cmd.exe PING.EXE PID 916 wrote to memory of 2984 916 cmd.exe PING.EXE PID 916 wrote to memory of 2984 916 cmd.exe PING.EXE PID 916 wrote to memory of 2984 916 cmd.exe PING.EXE PID 916 wrote to memory of 572 916 cmd.exe Client.exe PID 916 wrote to memory of 572 916 cmd.exe Client.exe PID 916 wrote to memory of 572 916 cmd.exe Client.exe PID 916 wrote to memory of 572 916 cmd.exe Client.exe PID 916 wrote to memory of 572 916 cmd.exe Client.exe PID 916 wrote to memory of 572 916 cmd.exe Client.exe PID 916 wrote to memory of 572 916 cmd.exe Client.exe PID 572 wrote to memory of 2604 572 Client.exe schtasks.exe PID 572 wrote to memory of 2604 572 Client.exe schtasks.exe PID 572 wrote to memory of 2604 572 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Tlodm8oD4WFF.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\t8CTZ4bjcl52.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\bdtPvacR129q.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\vsVaPiUHLZsf.bat" "9⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\VIKdYslkRDnA.bat" "11⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\lW85FGUGEvp6.bat" "13⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\EuKfpwR6IyMn.bat" "15⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\5wntW8NWRpiK.bat" "17⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (12) - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5wntW8NWRpiK.batFilesize
207B
MD5a18cbd45cfceb1a9e89ce77de8dcb85a
SHA16d24160e78b9f16e3faf24f0d9146cca3778ee01
SHA256cf867794d4905ca3ba20b0335e664cd9392cbc7ad59a919555bfe2650ea174a6
SHA512c605a8c894c030d324de791549fb4d3b281fb59fbbb19886f9d330381005e4aba052f9803965e2fb8711229216e814e7a4abd4ae31e166c41faa4240bcfa2c53
-
C:\Users\Admin\AppData\Local\Temp\EuKfpwR6IyMn.batFilesize
207B
MD51aa4fa8f7c6cb9021918adec612c1d9d
SHA10ca7522dccc64dde19dab0690f38ccb943b518e7
SHA256883e1d3ecb3e0415153b073f165e8cfa388d5f52d947f58269ee07478ee5eba3
SHA5122bfab48f3c0af188ce62a3974a6cddab32cf00717ea3f54b409ce31c6f46bb0a842b62a3d66a007eee9d00457c49fed5bd06dad67f85600181b8a7c8d7a150a9
-
C:\Users\Admin\AppData\Local\Temp\Tlodm8oD4WFF.batFilesize
207B
MD5d9080f5c918352614624326aab2b1926
SHA1c9cb3e8228ade3639ac7c68aeb67c6ba31177add
SHA256eefc8c17d5ae85031d0185f3d62b5a7444871add0e581a56fa3ac37906711213
SHA512aa4936bb99841be813d35a398c71e45643df8ce5ce1f9e8fca726334346ed1ac39e44b3d7f3c605cb53a760f3f643b24153e1948dd55ae23c92c03298b741118
-
C:\Users\Admin\AppData\Local\Temp\VIKdYslkRDnA.batFilesize
207B
MD538a32403c9bf99b08db2102cc74ebf5b
SHA1c1e63010becb0fa867da21bfbbf172fcce8f4be0
SHA256929272bf902500e6c57bbbc2492f868005336a9b43de323ebdcdc8829598e8d8
SHA51282c8a495f122c3c0724245feb20a1fb969e3613d423b420a5626269d500694fe75f33f9358a0f24319ce6fbf53c09abde5ee4d3079534c5a1147e98cebee7263
-
C:\Users\Admin\AppData\Local\Temp\bdtPvacR129q.batFilesize
207B
MD54747c8197d918eb4920d51fadbfd19cd
SHA1c855443bed2148b095dfb0a920ff333c781bfb79
SHA2560bcdd1ea050f4114fb9e52d4e158476d796c055fc9ab28b97e85a604e0674da3
SHA51229587217c613b6c3e4b8868331b7d35c557af0e69be121e3c0919b9f4e756729860a97b4ae7f621c1aec383482d51ae3e6886363d75eeb92fa571179de1b9c16
-
C:\Users\Admin\AppData\Local\Temp\lW85FGUGEvp6.batFilesize
207B
MD5ee8957cd92595862f6baf04ce4e8f1d8
SHA1840447c1a23af0ce7d6f9dc6da52a3dbc258ecb5
SHA25687f3c4ce288c394a59c3ed0b512cf457ca45a3a456d734cd17e213b59e1a1202
SHA512aaee8681b020c654bb330e25c7dfe9506fb1b199e552205eb0fb1259b28e3189ae8fcc4c286ef62ff544b9747ebc10b9fdf61ea63b6e941314db35a28eebdb0b
-
C:\Users\Admin\AppData\Local\Temp\t8CTZ4bjcl52.batFilesize
207B
MD58684f15775bf60c2f7b50a6c1c8884e0
SHA1290a2b23edacb492d9e4aeb41b7deefa4a176d4e
SHA25681e79aebfbd7120088f9d071471ef47176655f14b82aafda1700b41da5179230
SHA5126b8ba1d21019e63676f61c3a28a99ff0ee52814d6ebe64d5cc08b0a1dd585520c42ef240b797bd10e0667daf71a4118a7d2aaf65bd2147f89c5ba0d62e98dc3a
-
C:\Users\Admin\AppData\Local\Temp\vsVaPiUHLZsf.batFilesize
207B
MD5ba35e57a6b594eaf7f9037d0849842ac
SHA14fbacbbc48ecc96ce000b97e99e9584b46ff2070
SHA256fcea27e18a346a3ed645a54b8e09471667a2ba9797c18e60bea54933f8d29d7d
SHA512e402646e88ce42ee8c6a8104af768cb89525a929ffed08137db3cc29c7bd0851995cc9d04b04ec733c2338bb4d166a342b19851ed9c603f84d2bd073082d880e
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/572-41-0x0000000000E50000-0x0000000000EBC000-memory.dmpFilesize
432KB
-
memory/772-29-0x0000000000CD0000-0x0000000000D3C000-memory.dmpFilesize
432KB
-
memory/1048-77-0x00000000003A0000-0x000000000040C000-memory.dmpFilesize
432KB
-
memory/1312-113-0x00000000009B0000-0x0000000000A1C000-memory.dmpFilesize
432KB
-
memory/1916-53-0x0000000000390000-0x00000000003FC000-memory.dmpFilesize
432KB
-
memory/1924-25-0x00000000742A0000-0x000000007498E000-memory.dmpFilesize
6.9MB
-
memory/1924-16-0x00000000742A0000-0x000000007498E000-memory.dmpFilesize
6.9MB
-
memory/1924-13-0x00000000742A0000-0x000000007498E000-memory.dmpFilesize
6.9MB
-
memory/1924-14-0x00000000742A0000-0x000000007498E000-memory.dmpFilesize
6.9MB
-
memory/1924-12-0x0000000000CD0000-0x0000000000D3C000-memory.dmpFilesize
432KB
-
memory/2176-4-0x00000000742A0000-0x000000007498E000-memory.dmpFilesize
6.9MB
-
memory/2176-0-0x00000000742AE000-0x00000000742AF000-memory.dmpFilesize
4KB
-
memory/2176-3-0x00000000742AE000-0x00000000742AF000-memory.dmpFilesize
4KB
-
memory/2176-2-0x00000000742A0000-0x000000007498E000-memory.dmpFilesize
6.9MB
-
memory/2176-1-0x0000000000B80000-0x0000000000BEC000-memory.dmpFilesize
432KB
-
memory/2176-15-0x00000000742A0000-0x000000007498E000-memory.dmpFilesize
6.9MB
-
memory/2448-65-0x0000000000AF0000-0x0000000000B5C000-memory.dmpFilesize
432KB
-
memory/2492-101-0x0000000000360000-0x00000000003CC000-memory.dmpFilesize
432KB
-
memory/2988-89-0x00000000011A0000-0x000000000120C000-memory.dmpFilesize
432KB