Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
596s -
max time network
600s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 15:28
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
General
-
Target
uni/Uni - Copy (13) - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 11 IoCs
Processes:
resource yara_rule behavioral21/memory/1640-1-0x00000000008B0000-0x000000000091C000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral21/memory/2988-12-0x0000000000E90000-0x0000000000EFC000-memory.dmp family_quasar behavioral21/memory/784-29-0x0000000000090000-0x00000000000FC000-memory.dmp family_quasar behavioral21/memory/2324-41-0x0000000000810000-0x000000000087C000-memory.dmp family_quasar behavioral21/memory/808-53-0x0000000000160000-0x00000000001CC000-memory.dmp family_quasar behavioral21/memory/1448-65-0x0000000000990000-0x00000000009FC000-memory.dmp family_quasar behavioral21/memory/1412-77-0x0000000000FC0000-0x000000000102C000-memory.dmp family_quasar behavioral21/memory/1668-89-0x0000000000380000-0x00000000003EC000-memory.dmp family_quasar behavioral21/memory/2712-101-0x00000000002B0000-0x000000000031C000-memory.dmp family_quasar behavioral21/memory/1292-113-0x0000000000E90000-0x0000000000EFC000-memory.dmp family_quasar -
Executes dropped EXE 9 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2988 Client.exe 784 Client.exe 2324 Client.exe 808 Client.exe 1448 Client.exe 1412 Client.exe 1668 Client.exe 2712 Client.exe 1292 Client.exe -
Loads dropped DLL 9 IoCs
Processes:
Uni - Copy (13) - Copy - Copy.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exepid process 1640 Uni - Copy (13) - Copy - Copy.exe 868 cmd.exe 1044 cmd.exe 2328 cmd.exe 3016 cmd.exe 1544 cmd.exe 1488 cmd.exe 280 cmd.exe 2100 cmd.exe -
Looks up external IP address via web service 20 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 47 api.ipify.org 2 ip-api.com 21 ip-api.com 29 api.ipify.org 35 api.ipify.org 41 api.ipify.org 45 ip-api.com 6 api.ipify.org 15 ip-api.com 17 api.ipify.org 39 ip-api.com 59 api.ipify.org 8 ip-api.com 11 api.ipify.org 23 api.ipify.org 27 ip-api.com 33 ip-api.com 51 ip-api.com 53 api.ipify.org 57 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 804 schtasks.exe 2532 schtasks.exe 704 SCHTASKS.exe 1572 schtasks.exe 2100 schtasks.exe 1624 schtasks.exe 2056 schtasks.exe 1452 schtasks.exe 1488 schtasks.exe 2476 schtasks.exe -
Runs ping.exe 1 TTPs 8 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 1120 PING.EXE 2784 PING.EXE 1648 PING.EXE 2756 PING.EXE 1912 PING.EXE 2012 PING.EXE 2776 PING.EXE 3004 PING.EXE -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
Uni - Copy (13) - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 1640 Uni - Copy (13) - Copy - Copy.exe Token: SeDebugPrivilege 2988 Client.exe Token: SeDebugPrivilege 784 Client.exe Token: SeDebugPrivilege 2324 Client.exe Token: SeDebugPrivilege 808 Client.exe Token: SeDebugPrivilege 1448 Client.exe Token: SeDebugPrivilege 1412 Client.exe Token: SeDebugPrivilege 1668 Client.exe Token: SeDebugPrivilege 2712 Client.exe Token: SeDebugPrivilege 1292 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (13) - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 1640 wrote to memory of 2532 1640 Uni - Copy (13) - Copy - Copy.exe schtasks.exe PID 1640 wrote to memory of 2532 1640 Uni - Copy (13) - Copy - Copy.exe schtasks.exe PID 1640 wrote to memory of 2532 1640 Uni - Copy (13) - Copy - Copy.exe schtasks.exe PID 1640 wrote to memory of 2532 1640 Uni - Copy (13) - Copy - Copy.exe schtasks.exe PID 1640 wrote to memory of 2988 1640 Uni - Copy (13) - Copy - Copy.exe Client.exe PID 1640 wrote to memory of 2988 1640 Uni - Copy (13) - Copy - Copy.exe Client.exe PID 1640 wrote to memory of 2988 1640 Uni - Copy (13) - Copy - Copy.exe Client.exe PID 1640 wrote to memory of 2988 1640 Uni - Copy (13) - Copy - Copy.exe Client.exe PID 1640 wrote to memory of 2988 1640 Uni - Copy (13) - Copy - Copy.exe Client.exe PID 1640 wrote to memory of 2988 1640 Uni - Copy (13) - Copy - Copy.exe Client.exe PID 1640 wrote to memory of 2988 1640 Uni - Copy (13) - Copy - Copy.exe Client.exe PID 1640 wrote to memory of 704 1640 Uni - Copy (13) - Copy - Copy.exe SCHTASKS.exe PID 1640 wrote to memory of 704 1640 Uni - Copy (13) - Copy - Copy.exe SCHTASKS.exe PID 1640 wrote to memory of 704 1640 Uni - Copy (13) - Copy - Copy.exe SCHTASKS.exe PID 1640 wrote to memory of 704 1640 Uni - Copy (13) - Copy - Copy.exe SCHTASKS.exe PID 2988 wrote to memory of 1452 2988 Client.exe schtasks.exe PID 2988 wrote to memory of 1452 2988 Client.exe schtasks.exe PID 2988 wrote to memory of 1452 2988 Client.exe schtasks.exe PID 2988 wrote to memory of 1452 2988 Client.exe schtasks.exe PID 2988 wrote to memory of 868 2988 Client.exe cmd.exe PID 2988 wrote to memory of 868 2988 Client.exe cmd.exe PID 2988 wrote to memory of 868 2988 Client.exe cmd.exe PID 2988 wrote to memory of 868 2988 Client.exe cmd.exe PID 868 wrote to memory of 2472 868 cmd.exe chcp.com PID 868 wrote to memory of 2472 868 cmd.exe chcp.com PID 868 wrote to memory of 2472 868 cmd.exe chcp.com PID 868 wrote to memory of 2472 868 cmd.exe chcp.com PID 868 wrote to memory of 2784 868 cmd.exe PING.EXE PID 868 wrote to memory of 2784 868 cmd.exe PING.EXE PID 868 wrote to memory of 2784 868 cmd.exe PING.EXE PID 868 wrote to memory of 2784 868 cmd.exe PING.EXE PID 868 wrote to memory of 784 868 cmd.exe Client.exe PID 868 wrote to memory of 784 868 cmd.exe Client.exe PID 868 wrote to memory of 784 868 cmd.exe Client.exe PID 868 wrote to memory of 784 868 cmd.exe Client.exe PID 868 wrote to memory of 784 868 cmd.exe Client.exe PID 868 wrote to memory of 784 868 cmd.exe Client.exe PID 868 wrote to memory of 784 868 cmd.exe Client.exe PID 784 wrote to memory of 1572 784 Client.exe schtasks.exe PID 784 wrote to memory of 1572 784 Client.exe schtasks.exe PID 784 wrote to memory of 1572 784 Client.exe schtasks.exe PID 784 wrote to memory of 1572 784 Client.exe schtasks.exe PID 784 wrote to memory of 1044 784 Client.exe cmd.exe PID 784 wrote to memory of 1044 784 Client.exe cmd.exe PID 784 wrote to memory of 1044 784 Client.exe cmd.exe PID 784 wrote to memory of 1044 784 Client.exe cmd.exe PID 1044 wrote to memory of 2004 1044 cmd.exe chcp.com PID 1044 wrote to memory of 2004 1044 cmd.exe chcp.com PID 1044 wrote to memory of 2004 1044 cmd.exe chcp.com PID 1044 wrote to memory of 2004 1044 cmd.exe chcp.com PID 1044 wrote to memory of 1648 1044 cmd.exe PING.EXE PID 1044 wrote to memory of 1648 1044 cmd.exe PING.EXE PID 1044 wrote to memory of 1648 1044 cmd.exe PING.EXE PID 1044 wrote to memory of 1648 1044 cmd.exe PING.EXE PID 1044 wrote to memory of 2324 1044 cmd.exe Client.exe PID 1044 wrote to memory of 2324 1044 cmd.exe Client.exe PID 1044 wrote to memory of 2324 1044 cmd.exe Client.exe PID 1044 wrote to memory of 2324 1044 cmd.exe Client.exe PID 1044 wrote to memory of 2324 1044 cmd.exe Client.exe PID 1044 wrote to memory of 2324 1044 cmd.exe Client.exe PID 1044 wrote to memory of 2324 1044 cmd.exe Client.exe PID 2324 wrote to memory of 1488 2324 Client.exe schtasks.exe PID 2324 wrote to memory of 1488 2324 Client.exe schtasks.exe PID 2324 wrote to memory of 1488 2324 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (13) - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (13) - Copy - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (13) - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\9bmGvbiv57rv.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\o5eTUMYJzbEp.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2oI6PYfl6LMp.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OcocY5VRXje9.bat" "9⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\EhCbLjcJZfyL.bat" "11⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CJMtU5gsLBZF.bat" "13⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\oELlPSZQ7nOf.bat" "15⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7TxwtZRGRK6U.bat" "17⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (13) - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (13) - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2oI6PYfl6LMp.batFilesize
207B
MD510b5a30b8ee854b200860e065c86c11c
SHA13afeebd557ecc71d52e77375f2355a7c8499f284
SHA25677701521ef6ae9bfb392063d4d75e63596e3d10f1a572ba20d5eda90c55f2f3b
SHA51211bc1386534844fc4d9a191a35f62457546a2a11774a0a13f46271bd4503624bc7674a61d2b00181c8562b288dc821eb1d6c41a344b0740e36f8cf36eb0f3429
-
C:\Users\Admin\AppData\Local\Temp\7TxwtZRGRK6U.batFilesize
207B
MD50c2c12071a39228e6501f98d0a493876
SHA177ea5a770bd31f18494bae9c7363bb7a2653c294
SHA2564266d649958633aec6d9c9ef0680adfccef6d0d975ca1625031977ca206512ae
SHA512834450371880f8aa34495a22a01f90bab4d9c626077e6b65a179a644d9e6d67e0fb76d5e0d151474bdaecc07d874a0ea6ec362867cd20d62caa511d54e05b6a1
-
C:\Users\Admin\AppData\Local\Temp\9bmGvbiv57rv.batFilesize
207B
MD5d2c32e674528be7209781e371753a434
SHA1dec5ba87ca936d395f47d0e94a15ab7aeca12c16
SHA256c9d057a09fb570e5337379588c781807231a46d95d82af49633f0806964a63a8
SHA51244211be5685dac539974c8bc13b6d7f73a7e087f48b6601fd4ba3007eb961ccb03a08edfd194f40fab0c5b403e2a8a2da7a65cc39bc8febf3852bce3604bf7d2
-
C:\Users\Admin\AppData\Local\Temp\CJMtU5gsLBZF.batFilesize
207B
MD54bbf21633cc5679d57cf9c6379fc0061
SHA1903a9da103cea8b9bbd56c46223a38bba8fe37f5
SHA2562d44178924b4322ea521f99a10cb91b365a3f354e75d555c74e67ad896a4216c
SHA5121d4d56618a456b31772498e79efaf953984c68170d26471baaa248a0a8a68c5facc123fa4f98dd72db2ac762b7401a53432079a4a0039ea0d00c87c73d789547
-
C:\Users\Admin\AppData\Local\Temp\EhCbLjcJZfyL.batFilesize
207B
MD53f8bc7fd1c38b214c3691cb6947dc5b1
SHA14d2c3634dc1dd5e107e35e319760b6def783370e
SHA256bff539898562579f73e482ee9291cab60a867d1716c9239de5e8a5cf8d92e359
SHA512e02c2deea032123710b81ba8cc858f54ab0190abe4af74ff63c6bb5f14417d609997ea2d61dfe84b387c704fbfae0567dc4061b72194b18d7e72ec4f7dda4dd5
-
C:\Users\Admin\AppData\Local\Temp\OcocY5VRXje9.batFilesize
207B
MD56579066628fcede0ca87ccaf0f6d3c37
SHA1483cc5a5970005466dd3d6dff250fdc0ee0807ea
SHA256a27b6d81477bd9f5930f0e869b4df25c0f3b6c04d4c16eb1831b214f2a663b61
SHA5123e98c85158c16ea09f0c94f94b4f8707741787fb5a91ebcde7bd0a766c0013aa7f469105a1b588c6526f1f8431faa87424ea7822574004967059fee5ac217020
-
C:\Users\Admin\AppData\Local\Temp\o5eTUMYJzbEp.batFilesize
207B
MD5e454be5118e9797e73c01f4b86599cf8
SHA14384e96df681aee2e96385dba511657bc3796482
SHA256bc2d1beca9fec4c4daf043782a18143490ba7afdbc428407e69cb55dc3cb595b
SHA512cf0456d4aaa881f019d411f91b03627c75358613ff303e23155814383f6dee3754bb016ec7eccebe3ef4361e09e4d13cad749ba7f0806bd2111b135d64d70d1c
-
C:\Users\Admin\AppData\Local\Temp\oELlPSZQ7nOf.batFilesize
207B
MD51e0ea9a2d4c0159b37e4728126f734a3
SHA161c790a6cf96360c0e13c48bbdd644fcb0857fe3
SHA2562b0d9493abfa9ac8abc06e95a0e998d361451161179643b1da9785e8fe1e37a2
SHA512e7f320969acb98d3b958e23e122470fd37e0daf71ed64c7294d2782bc8f928dc52dde92b7102722c30fa0ef922237869ddadcfe9dd3776ce24f901d35f162ae1
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/784-29-0x0000000000090000-0x00000000000FC000-memory.dmpFilesize
432KB
-
memory/808-53-0x0000000000160000-0x00000000001CC000-memory.dmpFilesize
432KB
-
memory/1292-113-0x0000000000E90000-0x0000000000EFC000-memory.dmpFilesize
432KB
-
memory/1412-77-0x0000000000FC0000-0x000000000102C000-memory.dmpFilesize
432KB
-
memory/1448-65-0x0000000000990000-0x00000000009FC000-memory.dmpFilesize
432KB
-
memory/1640-15-0x00000000745D0000-0x0000000074CBE000-memory.dmpFilesize
6.9MB
-
memory/1640-3-0x00000000745DE000-0x00000000745DF000-memory.dmpFilesize
4KB
-
memory/1640-1-0x00000000008B0000-0x000000000091C000-memory.dmpFilesize
432KB
-
memory/1640-2-0x00000000745D0000-0x0000000074CBE000-memory.dmpFilesize
6.9MB
-
memory/1640-4-0x00000000745D0000-0x0000000074CBE000-memory.dmpFilesize
6.9MB
-
memory/1640-0-0x00000000745DE000-0x00000000745DF000-memory.dmpFilesize
4KB
-
memory/1668-89-0x0000000000380000-0x00000000003EC000-memory.dmpFilesize
432KB
-
memory/2324-41-0x0000000000810000-0x000000000087C000-memory.dmpFilesize
432KB
-
memory/2712-101-0x00000000002B0000-0x000000000031C000-memory.dmpFilesize
432KB
-
memory/2988-12-0x0000000000E90000-0x0000000000EFC000-memory.dmpFilesize
432KB
-
memory/2988-16-0x00000000745D0000-0x0000000074CBE000-memory.dmpFilesize
6.9MB
-
memory/2988-13-0x00000000745D0000-0x0000000074CBE000-memory.dmpFilesize
6.9MB
-
memory/2988-14-0x00000000745D0000-0x0000000074CBE000-memory.dmpFilesize
6.9MB
-
memory/2988-25-0x00000000745D0000-0x0000000074CBE000-memory.dmpFilesize
6.9MB