Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
596s -
max time network
600s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 15:28
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
General
-
Target
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 5 IoCs
Processes:
resource yara_rule behavioral19/memory/2264-1-0x0000000000E80000-0x0000000000EEC000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral19/memory/2516-12-0x0000000001090000-0x00000000010FC000-memory.dmp family_quasar behavioral19/memory/1880-29-0x0000000001090000-0x00000000010FC000-memory.dmp family_quasar behavioral19/memory/564-41-0x0000000001090000-0x00000000010FC000-memory.dmp family_quasar -
Executes dropped EXE 9 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2516 Client.exe 1880 Client.exe 564 Client.exe 2288 Client.exe 2996 Client.exe 348 Client.exe 2684 Client.exe 2044 Client.exe 1692 Client.exe -
Loads dropped DLL 9 IoCs
Processes:
Uni - Copy (13) - Copy - Copy - Copy.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exepid process 2264 Uni - Copy (13) - Copy - Copy - Copy.exe 2952 cmd.exe 804 cmd.exe 2604 cmd.exe 2152 cmd.exe 2916 cmd.exe 3032 cmd.exe 1988 cmd.exe 920 cmd.exe -
Looks up external IP address via web service 19 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 ip-api.com 17 api.ipify.org 33 ip-api.com 39 ip-api.com 51 ip-api.com 57 ip-api.com 6 api.ipify.org 41 api.ipify.org 53 api.ipify.org 2 ip-api.com 27 ip-api.com 35 api.ipify.org 45 ip-api.com 23 api.ipify.org 15 ip-api.com 21 ip-api.com 29 api.ipify.org 47 api.ipify.org 11 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
SCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1772 SCHTASKS.exe 908 schtasks.exe 2244 schtasks.exe 2900 schtasks.exe 1660 schtasks.exe 2720 schtasks.exe 2420 schtasks.exe 2520 schtasks.exe 1248 schtasks.exe 2664 schtasks.exe -
Runs ping.exe 1 TTPs 8 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 2880 PING.EXE 2656 PING.EXE 1932 PING.EXE 1604 PING.EXE 2464 PING.EXE 2020 PING.EXE 2924 PING.EXE 2652 PING.EXE -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
Uni - Copy (13) - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 2264 Uni - Copy (13) - Copy - Copy - Copy.exe Token: SeDebugPrivilege 2516 Client.exe Token: SeDebugPrivilege 1880 Client.exe Token: SeDebugPrivilege 564 Client.exe Token: SeDebugPrivilege 2288 Client.exe Token: SeDebugPrivilege 2996 Client.exe Token: SeDebugPrivilege 348 Client.exe Token: SeDebugPrivilege 2684 Client.exe Token: SeDebugPrivilege 2044 Client.exe Token: SeDebugPrivilege 1692 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (13) - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 2264 wrote to memory of 2520 2264 Uni - Copy (13) - Copy - Copy - Copy.exe schtasks.exe PID 2264 wrote to memory of 2520 2264 Uni - Copy (13) - Copy - Copy - Copy.exe schtasks.exe PID 2264 wrote to memory of 2520 2264 Uni - Copy (13) - Copy - Copy - Copy.exe schtasks.exe PID 2264 wrote to memory of 2520 2264 Uni - Copy (13) - Copy - Copy - Copy.exe schtasks.exe PID 2264 wrote to memory of 2516 2264 Uni - Copy (13) - Copy - Copy - Copy.exe Client.exe PID 2264 wrote to memory of 2516 2264 Uni - Copy (13) - Copy - Copy - Copy.exe Client.exe PID 2264 wrote to memory of 2516 2264 Uni - Copy (13) - Copy - Copy - Copy.exe Client.exe PID 2264 wrote to memory of 2516 2264 Uni - Copy (13) - Copy - Copy - Copy.exe Client.exe PID 2264 wrote to memory of 2516 2264 Uni - Copy (13) - Copy - Copy - Copy.exe Client.exe PID 2264 wrote to memory of 2516 2264 Uni - Copy (13) - Copy - Copy - Copy.exe Client.exe PID 2264 wrote to memory of 2516 2264 Uni - Copy (13) - Copy - Copy - Copy.exe Client.exe PID 2264 wrote to memory of 1772 2264 Uni - Copy (13) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2264 wrote to memory of 1772 2264 Uni - Copy (13) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2264 wrote to memory of 1772 2264 Uni - Copy (13) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2264 wrote to memory of 1772 2264 Uni - Copy (13) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2516 wrote to memory of 1248 2516 Client.exe schtasks.exe PID 2516 wrote to memory of 1248 2516 Client.exe schtasks.exe PID 2516 wrote to memory of 1248 2516 Client.exe schtasks.exe PID 2516 wrote to memory of 1248 2516 Client.exe schtasks.exe PID 2516 wrote to memory of 2952 2516 Client.exe cmd.exe PID 2516 wrote to memory of 2952 2516 Client.exe cmd.exe PID 2516 wrote to memory of 2952 2516 Client.exe cmd.exe PID 2516 wrote to memory of 2952 2516 Client.exe cmd.exe PID 2952 wrote to memory of 1996 2952 cmd.exe chcp.com PID 2952 wrote to memory of 1996 2952 cmd.exe chcp.com PID 2952 wrote to memory of 1996 2952 cmd.exe chcp.com PID 2952 wrote to memory of 1996 2952 cmd.exe chcp.com PID 2952 wrote to memory of 1932 2952 cmd.exe PING.EXE PID 2952 wrote to memory of 1932 2952 cmd.exe PING.EXE PID 2952 wrote to memory of 1932 2952 cmd.exe PING.EXE PID 2952 wrote to memory of 1932 2952 cmd.exe PING.EXE PID 2952 wrote to memory of 1880 2952 cmd.exe Client.exe PID 2952 wrote to memory of 1880 2952 cmd.exe Client.exe PID 2952 wrote to memory of 1880 2952 cmd.exe Client.exe PID 2952 wrote to memory of 1880 2952 cmd.exe Client.exe PID 2952 wrote to memory of 1880 2952 cmd.exe Client.exe PID 2952 wrote to memory of 1880 2952 cmd.exe Client.exe PID 2952 wrote to memory of 1880 2952 cmd.exe Client.exe PID 1880 wrote to memory of 2664 1880 Client.exe schtasks.exe PID 1880 wrote to memory of 2664 1880 Client.exe schtasks.exe PID 1880 wrote to memory of 2664 1880 Client.exe schtasks.exe PID 1880 wrote to memory of 2664 1880 Client.exe schtasks.exe PID 1880 wrote to memory of 804 1880 Client.exe cmd.exe PID 1880 wrote to memory of 804 1880 Client.exe cmd.exe PID 1880 wrote to memory of 804 1880 Client.exe cmd.exe PID 1880 wrote to memory of 804 1880 Client.exe cmd.exe PID 804 wrote to memory of 608 804 cmd.exe chcp.com PID 804 wrote to memory of 608 804 cmd.exe chcp.com PID 804 wrote to memory of 608 804 cmd.exe chcp.com PID 804 wrote to memory of 608 804 cmd.exe chcp.com PID 804 wrote to memory of 1604 804 cmd.exe PING.EXE PID 804 wrote to memory of 1604 804 cmd.exe PING.EXE PID 804 wrote to memory of 1604 804 cmd.exe PING.EXE PID 804 wrote to memory of 1604 804 cmd.exe PING.EXE PID 804 wrote to memory of 564 804 cmd.exe Client.exe PID 804 wrote to memory of 564 804 cmd.exe Client.exe PID 804 wrote to memory of 564 804 cmd.exe Client.exe PID 804 wrote to memory of 564 804 cmd.exe Client.exe PID 804 wrote to memory of 564 804 cmd.exe Client.exe PID 804 wrote to memory of 564 804 cmd.exe Client.exe PID 804 wrote to memory of 564 804 cmd.exe Client.exe PID 564 wrote to memory of 908 564 Client.exe schtasks.exe PID 564 wrote to memory of 908 564 Client.exe schtasks.exe PID 564 wrote to memory of 908 564 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (13) - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (13) - Copy - Copy - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (13) - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\zUB7QI5be8YJ.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\SKJ68JFu78EQ.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Bpz2UpFcXPIE.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\LXpvdGCk8MkL.bat" "9⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\lM9BYXCj5XiY.bat" "11⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\BBSQToCj1ihl.bat" "13⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\zC6uOGypelLO.bat" "15⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\P1QAJXypaxKb.bat" "17⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (13) - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (13) - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\BBSQToCj1ihl.batFilesize
207B
MD57cc5331921a047a169fa988da58fa95e
SHA12b16f982de5717c4876f2cc2fa81186596ca8fa6
SHA256dab2bbcbb9b23064c1fb6b7818e2a0ea37be2de64555fb0ba057670f258a9715
SHA51203ff5331bf8f7542cb130b8028bbc454d7de28d43963bc56cb01a8b812236219c6b483e87e9ab2d999e4dd5ba4aaa8c67aeca591fe9529d5d900aab90de12b8a
-
C:\Users\Admin\AppData\Local\Temp\Bpz2UpFcXPIE.batFilesize
207B
MD59866638cfa95911f6a88b03505b562a3
SHA19cc30fb85a733d6d7913cccd404f4151543e43fd
SHA256e87c49c95c603a4f02f58edaff13755564cb6603bbef7444b1fd64d36e2dbc7d
SHA5125efb933f6de767c599f5634b9db16367cec04d1ed84b9744c90c03ee06c6067144741d06008a19859147059ea9e6150e19583fcf95d9eca052913639fd3f37a6
-
C:\Users\Admin\AppData\Local\Temp\LXpvdGCk8MkL.batFilesize
207B
MD5aee5b8a35277c40f3657b7f0bdcb37a7
SHA125058749b626e730f156651062bf287a9deaf7b1
SHA256940a8e865b3875c1f40a748b97c6863dc5eed7978aa7f4ad889ac556722408c5
SHA5120ca74ca2c1897d35a0d54869e77790e91471ff15111e227a7c678f917ad221ddd51a800364fd1ba4517a7819ec65267ec24a099280010b6aa9f6a99e1a365109
-
C:\Users\Admin\AppData\Local\Temp\P1QAJXypaxKb.batFilesize
207B
MD58f16e4399b81ed069d00ec55a6ce45f1
SHA1280c40bdd5a9c14518799393149219a39e35bb90
SHA256ebdd14f509bdea51476596fefb47d9bf1678bb3f5badde3a88a3997a91837c20
SHA512cfe63b185b25a2e511157b022f7f24d7e58700cb19add7c006b6fccbe22ceadde7365d7a8e0f25a7436c566fed589e01ac6b3b87f1b73bd85897f7e84fed7fd6
-
C:\Users\Admin\AppData\Local\Temp\SKJ68JFu78EQ.batFilesize
207B
MD54ca66fa51686a61b27302e1366161451
SHA1169d1dc3a0211151715acb68fe9f8ca227ad22ea
SHA2568166e37e5a1a499e523f416dbf89adb93613794ac0e077537d3c38a2fab40252
SHA5124383042025f22e20036548ad813cffdc6615085e1dbb672fe731d2c5b633555b9421a8c644a5ca3662289a5281d414feb3f969684592ac754e533aa29d9c82ea
-
C:\Users\Admin\AppData\Local\Temp\lM9BYXCj5XiY.batFilesize
207B
MD5a7bd0c2593f010815ddc546bc79a17af
SHA163a9cb11429dd528ac21afe3f6676fba8c8266ec
SHA256c2d85cfb57a8dafe1370a6b880468375166843eaeb392d8f367e9e5414744e32
SHA51204ded3651ea73fde2c477f13a9ca5dfc41753896197e8830823de587d2fa8711b1aaa67952fdd4e2d78e9725b9274551c6ef40122ac5e74dd60cd14626201325
-
C:\Users\Admin\AppData\Local\Temp\zC6uOGypelLO.batFilesize
207B
MD5312acc68010cfaf6f4493716eeeb55d8
SHA1a6fbb0b3d096ee3a142fa3f05a977ca5898c4d8d
SHA256722f315b808d1fa78e7e4cbd0ef021aee674a34bc14162951ec42459a9f618e5
SHA51209e2c3b70d1bb1647420baa3e03fcbf36495198e614d058e5483f9c5a7faf1249812bb0bf52ec119db7562a9395b6862c69f08ab6822953fbcd5c193cb01c70e
-
C:\Users\Admin\AppData\Local\Temp\zUB7QI5be8YJ.batFilesize
207B
MD58b7917683467a7174e955f387f1f4a35
SHA1568d6a36b0ce64a7eda4662960e0ef1ddfbd01a3
SHA256983eddba535e000a87565d48ba526a5683d59ef0644df306e886762117322bb9
SHA51248be55d8c78494e2dc377ad02c135a01c5d97c95ff676337d2fcaf06c6472016b9a0a512cd8c562208dcb823dcf2e42e7822f005e761ba79b4c88b35720971f1
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/564-41-0x0000000001090000-0x00000000010FC000-memory.dmpFilesize
432KB
-
memory/1880-29-0x0000000001090000-0x00000000010FC000-memory.dmpFilesize
432KB
-
memory/2264-15-0x0000000074140000-0x000000007482E000-memory.dmpFilesize
6.9MB
-
memory/2264-0-0x000000007414E000-0x000000007414F000-memory.dmpFilesize
4KB
-
memory/2264-4-0x0000000074140000-0x000000007482E000-memory.dmpFilesize
6.9MB
-
memory/2264-3-0x000000007414E000-0x000000007414F000-memory.dmpFilesize
4KB
-
memory/2264-2-0x0000000074140000-0x000000007482E000-memory.dmpFilesize
6.9MB
-
memory/2264-1-0x0000000000E80000-0x0000000000EEC000-memory.dmpFilesize
432KB
-
memory/2516-16-0x0000000074140000-0x000000007482E000-memory.dmpFilesize
6.9MB
-
memory/2516-25-0x0000000074140000-0x000000007482E000-memory.dmpFilesize
6.9MB
-
memory/2516-12-0x0000000001090000-0x00000000010FC000-memory.dmpFilesize
432KB
-
memory/2516-14-0x0000000074140000-0x000000007482E000-memory.dmpFilesize
6.9MB
-
memory/2516-13-0x0000000074140000-0x000000007482E000-memory.dmpFilesize
6.9MB