Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
596s -
max time network
600s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 15:28
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
General
-
Target
uni/Uni - Copy (13) - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 11 IoCs
Processes:
resource yara_rule behavioral23/memory/3000-1-0x0000000000350000-0x00000000003BC000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral23/memory/2524-12-0x0000000000D00000-0x0000000000D6C000-memory.dmp family_quasar behavioral23/memory/536-29-0x0000000000DB0000-0x0000000000E1C000-memory.dmp family_quasar behavioral23/memory/1116-41-0x00000000013A0000-0x000000000140C000-memory.dmp family_quasar behavioral23/memory/1852-53-0x00000000013A0000-0x000000000140C000-memory.dmp family_quasar behavioral23/memory/2632-65-0x0000000000080000-0x00000000000EC000-memory.dmp family_quasar behavioral23/memory/1004-77-0x0000000001210000-0x000000000127C000-memory.dmp family_quasar behavioral23/memory/2732-89-0x0000000001210000-0x000000000127C000-memory.dmp family_quasar behavioral23/memory/2116-101-0x0000000000380000-0x00000000003EC000-memory.dmp family_quasar behavioral23/memory/872-113-0x00000000012C0000-0x000000000132C000-memory.dmp family_quasar -
Executes dropped EXE 9 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2524 Client.exe 536 Client.exe 1116 Client.exe 1852 Client.exe 2632 Client.exe 1004 Client.exe 2732 Client.exe 2116 Client.exe 872 Client.exe -
Loads dropped DLL 9 IoCs
Processes:
Uni - Copy (13) - Copy.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exepid process 3000 Uni - Copy (13) - Copy.exe 2884 cmd.exe 848 cmd.exe 2576 cmd.exe 2788 cmd.exe 580 cmd.exe 2976 cmd.exe 1836 cmd.exe 2524 cmd.exe -
Looks up external IP address via web service 20 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com 27 ip-api.com 33 ip-api.com 45 ip-api.com 11 api.ipify.org 17 api.ipify.org 21 ip-api.com 23 api.ipify.org 29 api.ipify.org 6 api.ipify.org 15 ip-api.com 35 api.ipify.org 41 api.ipify.org 47 api.ipify.org 59 api.ipify.org 8 ip-api.com 39 ip-api.com 51 ip-api.com 53 api.ipify.org 57 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
SCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2420 SCHTASKS.exe 1920 schtasks.exe 1872 schtasks.exe 2704 schtasks.exe 2460 schtasks.exe 1452 schtasks.exe 1980 schtasks.exe 2844 schtasks.exe 1944 schtasks.exe 2376 schtasks.exe -
Runs ping.exe 1 TTPs 8 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 2540 PING.EXE 1524 PING.EXE 1848 PING.EXE 2784 PING.EXE 1924 PING.EXE 2276 PING.EXE 2224 PING.EXE 2040 PING.EXE -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
Uni - Copy (13) - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 3000 Uni - Copy (13) - Copy.exe Token: SeDebugPrivilege 2524 Client.exe Token: SeDebugPrivilege 536 Client.exe Token: SeDebugPrivilege 1116 Client.exe Token: SeDebugPrivilege 1852 Client.exe Token: SeDebugPrivilege 2632 Client.exe Token: SeDebugPrivilege 1004 Client.exe Token: SeDebugPrivilege 2732 Client.exe Token: SeDebugPrivilege 2116 Client.exe Token: SeDebugPrivilege 872 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (13) - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 3000 wrote to memory of 2460 3000 Uni - Copy (13) - Copy.exe schtasks.exe PID 3000 wrote to memory of 2460 3000 Uni - Copy (13) - Copy.exe schtasks.exe PID 3000 wrote to memory of 2460 3000 Uni - Copy (13) - Copy.exe schtasks.exe PID 3000 wrote to memory of 2460 3000 Uni - Copy (13) - Copy.exe schtasks.exe PID 3000 wrote to memory of 2524 3000 Uni - Copy (13) - Copy.exe Client.exe PID 3000 wrote to memory of 2524 3000 Uni - Copy (13) - Copy.exe Client.exe PID 3000 wrote to memory of 2524 3000 Uni - Copy (13) - Copy.exe Client.exe PID 3000 wrote to memory of 2524 3000 Uni - Copy (13) - Copy.exe Client.exe PID 3000 wrote to memory of 2524 3000 Uni - Copy (13) - Copy.exe Client.exe PID 3000 wrote to memory of 2524 3000 Uni - Copy (13) - Copy.exe Client.exe PID 3000 wrote to memory of 2524 3000 Uni - Copy (13) - Copy.exe Client.exe PID 3000 wrote to memory of 2420 3000 Uni - Copy (13) - Copy.exe SCHTASKS.exe PID 3000 wrote to memory of 2420 3000 Uni - Copy (13) - Copy.exe SCHTASKS.exe PID 3000 wrote to memory of 2420 3000 Uni - Copy (13) - Copy.exe SCHTASKS.exe PID 3000 wrote to memory of 2420 3000 Uni - Copy (13) - Copy.exe SCHTASKS.exe PID 2524 wrote to memory of 1920 2524 Client.exe schtasks.exe PID 2524 wrote to memory of 1920 2524 Client.exe schtasks.exe PID 2524 wrote to memory of 1920 2524 Client.exe schtasks.exe PID 2524 wrote to memory of 1920 2524 Client.exe schtasks.exe PID 2524 wrote to memory of 2884 2524 Client.exe cmd.exe PID 2524 wrote to memory of 2884 2524 Client.exe cmd.exe PID 2524 wrote to memory of 2884 2524 Client.exe cmd.exe PID 2524 wrote to memory of 2884 2524 Client.exe cmd.exe PID 2884 wrote to memory of 2200 2884 cmd.exe chcp.com PID 2884 wrote to memory of 2200 2884 cmd.exe chcp.com PID 2884 wrote to memory of 2200 2884 cmd.exe chcp.com PID 2884 wrote to memory of 2200 2884 cmd.exe chcp.com PID 2884 wrote to memory of 2224 2884 cmd.exe PING.EXE PID 2884 wrote to memory of 2224 2884 cmd.exe PING.EXE PID 2884 wrote to memory of 2224 2884 cmd.exe PING.EXE PID 2884 wrote to memory of 2224 2884 cmd.exe PING.EXE PID 2884 wrote to memory of 536 2884 cmd.exe Client.exe PID 2884 wrote to memory of 536 2884 cmd.exe Client.exe PID 2884 wrote to memory of 536 2884 cmd.exe Client.exe PID 2884 wrote to memory of 536 2884 cmd.exe Client.exe PID 2884 wrote to memory of 536 2884 cmd.exe Client.exe PID 2884 wrote to memory of 536 2884 cmd.exe Client.exe PID 2884 wrote to memory of 536 2884 cmd.exe Client.exe PID 536 wrote to memory of 1452 536 Client.exe schtasks.exe PID 536 wrote to memory of 1452 536 Client.exe schtasks.exe PID 536 wrote to memory of 1452 536 Client.exe schtasks.exe PID 536 wrote to memory of 1452 536 Client.exe schtasks.exe PID 536 wrote to memory of 848 536 Client.exe cmd.exe PID 536 wrote to memory of 848 536 Client.exe cmd.exe PID 536 wrote to memory of 848 536 Client.exe cmd.exe PID 536 wrote to memory of 848 536 Client.exe cmd.exe PID 848 wrote to memory of 2008 848 cmd.exe chcp.com PID 848 wrote to memory of 2008 848 cmd.exe chcp.com PID 848 wrote to memory of 2008 848 cmd.exe chcp.com PID 848 wrote to memory of 2008 848 cmd.exe chcp.com PID 848 wrote to memory of 2040 848 cmd.exe PING.EXE PID 848 wrote to memory of 2040 848 cmd.exe PING.EXE PID 848 wrote to memory of 2040 848 cmd.exe PING.EXE PID 848 wrote to memory of 2040 848 cmd.exe PING.EXE PID 848 wrote to memory of 1116 848 cmd.exe Client.exe PID 848 wrote to memory of 1116 848 cmd.exe Client.exe PID 848 wrote to memory of 1116 848 cmd.exe Client.exe PID 848 wrote to memory of 1116 848 cmd.exe Client.exe PID 848 wrote to memory of 1116 848 cmd.exe Client.exe PID 848 wrote to memory of 1116 848 cmd.exe Client.exe PID 848 wrote to memory of 1116 848 cmd.exe Client.exe PID 1116 wrote to memory of 1980 1116 Client.exe schtasks.exe PID 1116 wrote to memory of 1980 1116 Client.exe schtasks.exe PID 1116 wrote to memory of 1980 1116 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (13) - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (13) - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (13) - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\FjZvDPccJqyt.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\T0I90FWa1dyU.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\5vH1vbP8oGmu.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\xxkFdoLXw68Q.bat" "9⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\EFHCDOPpAipv.bat" "11⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\5HkQuaMFJZBR.bat" "13⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\omQLG6MxiqFF.bat" "15⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\suYByOBvg8Ry.bat" "17⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (13) - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (13) - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5HkQuaMFJZBR.batFilesize
207B
MD5c5855466767ab5ac601551b8af8a784a
SHA1b40ce20d71cc098010800dec66cc87e0b1a7fc7b
SHA2567d53424621b6b13171b12cd0ca0e664117b841730e6fe9621a0d85b6f01039b6
SHA5126a0a79161815e8f5b37e78c8dcd3eb06ee57dac667e305046585fea1c95cfbcad83c044093eb663b7e05603bcad45dfe1c2ccc517b1ea24d2cc59fe0854e81bd
-
C:\Users\Admin\AppData\Local\Temp\5vH1vbP8oGmu.batFilesize
207B
MD5319543fa211ac48b58e38efb3272093d
SHA1a17e094e3fb3b0b4394adfc80e3d725fbf76c58b
SHA2565ea6d208b95244d096c3038a3f9f727282ad05046bf9e62aca4c2bce01219c15
SHA51288370cac984f44c16fd0ab328d0f384e268873a5a4a11243ff571667c5f333599633f138a6dfb1901405eced964536e2f8f364c414b8e9d986810722a2c32938
-
C:\Users\Admin\AppData\Local\Temp\EFHCDOPpAipv.batFilesize
207B
MD569bb06e6e16aea48e775ede97b9991d9
SHA1630adbc4747c83c731319c8884c911bdb910f42c
SHA256a8ca41ee05ee4581c9bc2446e08644e7b1e556a0507ba1a49a9d4ea074bd35c5
SHA5122b16acc35a7eb4663ee9b9c57190225ccb8045be05cdcc9de34f1828dde5d961da079188e5001da862c971fa14bde71f86137c0d61c7cdacc318b1e321895d53
-
C:\Users\Admin\AppData\Local\Temp\FjZvDPccJqyt.batFilesize
207B
MD53515152da4e3efb8745894323d2dd19e
SHA1a312fde3f4f1d243ac39c3759c116790312e8475
SHA256d1a488033a0e7c9c08cbc22492778e07dfaa32a0854823e6a5485b3fe2d93891
SHA512bc90a5678af1e3709651edaa02068b154a251f8738b6858a432e85cdadab1eb12377f8db2442090e7b24905d2fbcc4f90745875bf1b2595399dea0f26085dbc5
-
C:\Users\Admin\AppData\Local\Temp\T0I90FWa1dyU.batFilesize
207B
MD588f7e8d900741f7c2fba03c67cd00f98
SHA1748c0f78c49a20df7bfd65c7626a617a91641fde
SHA256edc7fc24522546c26fdd1213e87270d7e5630551b049454c5d1e626a8e9086a7
SHA5124c571fadfe0560527e69886cf40cce578d72f6747441e6b8583a9c5654380b6adc8d30c12110ce6135b3edfd8ac01eb6fdf2e5791a86b65483c3fec05af9ba86
-
C:\Users\Admin\AppData\Local\Temp\omQLG6MxiqFF.batFilesize
207B
MD5bb90f310bd5e166561fd253fef018d54
SHA1d48146484b0cb08fbf50bd3f41e9517d4a1ab6f1
SHA256a9c630b4a2addb4794f483807f819a4c6714c5fd353068e1ea03608efa0e3979
SHA5125217f76326a19c9ca67d33e9e1eb45e6fb901f285bd607ee022df4fbe90d1f7bbd1f386377a8f47af0bc16d2da85c827980336766724a2d2a5029c98c2eea8a9
-
C:\Users\Admin\AppData\Local\Temp\suYByOBvg8Ry.batFilesize
207B
MD5b210a75baa28a646da6278356b0d3eef
SHA138665432f946c5733800913c6310cc1d93f92477
SHA25645ca13d63109af6a146f790a223165e0fa998c354e336ada03034893c6bc365f
SHA512a382a866e3fc4776042e6baaad1197713a5ab3e399a3ff33b4be12874e30e67331ca9c0db0cf65bca116fb4551e34aeae27488b3564b710be7b8f2505db3c631
-
C:\Users\Admin\AppData\Local\Temp\xxkFdoLXw68Q.batFilesize
207B
MD5aefd8d6519cc69289df9605c974acaaa
SHA15e23541acb0dbc6f4bd09b4f4897773e4331f21f
SHA25699f4b6bb92490e643e87f75d66e0759e91c237874138bf4f7e56f348eb54ebfb
SHA5121fdd5e32bac1709ee3f12de2ac22ad195fd4774197e4a01b2544eca280a6b2c23d7c387bb96eb518aefe6adcaa2e9b62746b7783552bedfe79f79a4e4d8355a7
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/536-29-0x0000000000DB0000-0x0000000000E1C000-memory.dmpFilesize
432KB
-
memory/872-113-0x00000000012C0000-0x000000000132C000-memory.dmpFilesize
432KB
-
memory/1004-77-0x0000000001210000-0x000000000127C000-memory.dmpFilesize
432KB
-
memory/1116-41-0x00000000013A0000-0x000000000140C000-memory.dmpFilesize
432KB
-
memory/1852-53-0x00000000013A0000-0x000000000140C000-memory.dmpFilesize
432KB
-
memory/2116-101-0x0000000000380000-0x00000000003EC000-memory.dmpFilesize
432KB
-
memory/2524-13-0x0000000073F90000-0x000000007467E000-memory.dmpFilesize
6.9MB
-
memory/2524-14-0x0000000073F90000-0x000000007467E000-memory.dmpFilesize
6.9MB
-
memory/2524-12-0x0000000000D00000-0x0000000000D6C000-memory.dmpFilesize
432KB
-
memory/2524-26-0x0000000073F90000-0x000000007467E000-memory.dmpFilesize
6.9MB
-
memory/2524-16-0x0000000073F90000-0x000000007467E000-memory.dmpFilesize
6.9MB
-
memory/2632-65-0x0000000000080000-0x00000000000EC000-memory.dmpFilesize
432KB
-
memory/2732-89-0x0000000001210000-0x000000000127C000-memory.dmpFilesize
432KB
-
memory/3000-15-0x0000000073F90000-0x000000007467E000-memory.dmpFilesize
6.9MB
-
memory/3000-0-0x0000000073F9E000-0x0000000073F9F000-memory.dmpFilesize
4KB
-
memory/3000-4-0x0000000073F90000-0x000000007467E000-memory.dmpFilesize
6.9MB
-
memory/3000-3-0x0000000073F9E000-0x0000000073F9F000-memory.dmpFilesize
4KB
-
memory/3000-2-0x0000000073F90000-0x000000007467E000-memory.dmpFilesize
6.9MB
-
memory/3000-1-0x0000000000350000-0x00000000003BC000-memory.dmpFilesize
432KB