Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
596s -
max time network
601s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 15:28
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
General
-
Target
uni/Uni - Copy (14) - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 11 IoCs
Processes:
resource yara_rule behavioral27/memory/2220-1-0x0000000000FD0000-0x000000000103C000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral27/memory/1532-12-0x00000000009E0000-0x0000000000A4C000-memory.dmp family_quasar behavioral27/memory/2936-29-0x00000000000D0000-0x000000000013C000-memory.dmp family_quasar behavioral27/memory/2128-41-0x0000000001030000-0x000000000109C000-memory.dmp family_quasar behavioral27/memory/3048-53-0x0000000000110000-0x000000000017C000-memory.dmp family_quasar behavioral27/memory/2872-65-0x0000000000370000-0x00000000003DC000-memory.dmp family_quasar behavioral27/memory/1540-77-0x0000000000E20000-0x0000000000E8C000-memory.dmp family_quasar behavioral27/memory/2248-89-0x0000000000200000-0x000000000026C000-memory.dmp family_quasar behavioral27/memory/2836-101-0x0000000000A80000-0x0000000000AEC000-memory.dmp family_quasar behavioral27/memory/2228-113-0x0000000000FE0000-0x000000000104C000-memory.dmp family_quasar -
Executes dropped EXE 9 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 1532 Client.exe 2936 Client.exe 2128 Client.exe 3048 Client.exe 2872 Client.exe 1540 Client.exe 2248 Client.exe 2836 Client.exe 2228 Client.exe -
Loads dropped DLL 9 IoCs
Processes:
Uni - Copy (14) - Copy - Copy.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exepid process 2220 Uni - Copy (14) - Copy - Copy.exe 1624 cmd.exe 1932 cmd.exe 2884 cmd.exe 2076 cmd.exe 1368 cmd.exe 2644 cmd.exe 2812 cmd.exe 1780 cmd.exe -
Looks up external IP address via web service 20 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com 17 api.ipify.org 33 ip-api.com 35 api.ipify.org 51 ip-api.com 57 ip-api.com 8 ip-api.com 29 api.ipify.org 53 api.ipify.org 15 ip-api.com 23 api.ipify.org 27 ip-api.com 41 api.ipify.org 47 api.ipify.org 6 api.ipify.org 11 api.ipify.org 21 ip-api.com 39 ip-api.com 45 ip-api.com 59 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exepid process 1524 schtasks.exe 1852 schtasks.exe 2268 schtasks.exe 3020 schtasks.exe 2832 schtasks.exe 2748 schtasks.exe 1684 schtasks.exe 2648 schtasks.exe 2092 schtasks.exe 1968 SCHTASKS.exe -
Runs ping.exe 1 TTPs 8 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 300 PING.EXE 1528 PING.EXE 2908 PING.EXE 2816 PING.EXE 828 PING.EXE 1192 PING.EXE 696 PING.EXE 1436 PING.EXE -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
Uni - Copy (14) - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 2220 Uni - Copy (14) - Copy - Copy.exe Token: SeDebugPrivilege 1532 Client.exe Token: SeDebugPrivilege 2936 Client.exe Token: SeDebugPrivilege 2128 Client.exe Token: SeDebugPrivilege 3048 Client.exe Token: SeDebugPrivilege 2872 Client.exe Token: SeDebugPrivilege 1540 Client.exe Token: SeDebugPrivilege 2248 Client.exe Token: SeDebugPrivilege 2836 Client.exe Token: SeDebugPrivilege 2228 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (14) - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 2220 wrote to memory of 3020 2220 Uni - Copy (14) - Copy - Copy.exe schtasks.exe PID 2220 wrote to memory of 3020 2220 Uni - Copy (14) - Copy - Copy.exe schtasks.exe PID 2220 wrote to memory of 3020 2220 Uni - Copy (14) - Copy - Copy.exe schtasks.exe PID 2220 wrote to memory of 3020 2220 Uni - Copy (14) - Copy - Copy.exe schtasks.exe PID 2220 wrote to memory of 1532 2220 Uni - Copy (14) - Copy - Copy.exe Client.exe PID 2220 wrote to memory of 1532 2220 Uni - Copy (14) - Copy - Copy.exe Client.exe PID 2220 wrote to memory of 1532 2220 Uni - Copy (14) - Copy - Copy.exe Client.exe PID 2220 wrote to memory of 1532 2220 Uni - Copy (14) - Copy - Copy.exe Client.exe PID 2220 wrote to memory of 1532 2220 Uni - Copy (14) - Copy - Copy.exe Client.exe PID 2220 wrote to memory of 1532 2220 Uni - Copy (14) - Copy - Copy.exe Client.exe PID 2220 wrote to memory of 1532 2220 Uni - Copy (14) - Copy - Copy.exe Client.exe PID 2220 wrote to memory of 1968 2220 Uni - Copy (14) - Copy - Copy.exe SCHTASKS.exe PID 2220 wrote to memory of 1968 2220 Uni - Copy (14) - Copy - Copy.exe SCHTASKS.exe PID 2220 wrote to memory of 1968 2220 Uni - Copy (14) - Copy - Copy.exe SCHTASKS.exe PID 2220 wrote to memory of 1968 2220 Uni - Copy (14) - Copy - Copy.exe SCHTASKS.exe PID 1532 wrote to memory of 2832 1532 Client.exe schtasks.exe PID 1532 wrote to memory of 2832 1532 Client.exe schtasks.exe PID 1532 wrote to memory of 2832 1532 Client.exe schtasks.exe PID 1532 wrote to memory of 2832 1532 Client.exe schtasks.exe PID 1532 wrote to memory of 1624 1532 Client.exe cmd.exe PID 1532 wrote to memory of 1624 1532 Client.exe cmd.exe PID 1532 wrote to memory of 1624 1532 Client.exe cmd.exe PID 1532 wrote to memory of 1624 1532 Client.exe cmd.exe PID 1624 wrote to memory of 1620 1624 cmd.exe chcp.com PID 1624 wrote to memory of 1620 1624 cmd.exe chcp.com PID 1624 wrote to memory of 1620 1624 cmd.exe chcp.com PID 1624 wrote to memory of 1620 1624 cmd.exe chcp.com PID 1624 wrote to memory of 1192 1624 cmd.exe PING.EXE PID 1624 wrote to memory of 1192 1624 cmd.exe PING.EXE PID 1624 wrote to memory of 1192 1624 cmd.exe PING.EXE PID 1624 wrote to memory of 1192 1624 cmd.exe PING.EXE PID 1624 wrote to memory of 2936 1624 cmd.exe Client.exe PID 1624 wrote to memory of 2936 1624 cmd.exe Client.exe PID 1624 wrote to memory of 2936 1624 cmd.exe Client.exe PID 1624 wrote to memory of 2936 1624 cmd.exe Client.exe PID 1624 wrote to memory of 2936 1624 cmd.exe Client.exe PID 1624 wrote to memory of 2936 1624 cmd.exe Client.exe PID 1624 wrote to memory of 2936 1624 cmd.exe Client.exe PID 2936 wrote to memory of 1524 2936 Client.exe schtasks.exe PID 2936 wrote to memory of 1524 2936 Client.exe schtasks.exe PID 2936 wrote to memory of 1524 2936 Client.exe schtasks.exe PID 2936 wrote to memory of 1524 2936 Client.exe schtasks.exe PID 2936 wrote to memory of 1932 2936 Client.exe cmd.exe PID 2936 wrote to memory of 1932 2936 Client.exe cmd.exe PID 2936 wrote to memory of 1932 2936 Client.exe cmd.exe PID 2936 wrote to memory of 1932 2936 Client.exe cmd.exe PID 1932 wrote to memory of 2152 1932 cmd.exe chcp.com PID 1932 wrote to memory of 2152 1932 cmd.exe chcp.com PID 1932 wrote to memory of 2152 1932 cmd.exe chcp.com PID 1932 wrote to memory of 2152 1932 cmd.exe chcp.com PID 1932 wrote to memory of 696 1932 cmd.exe PING.EXE PID 1932 wrote to memory of 696 1932 cmd.exe PING.EXE PID 1932 wrote to memory of 696 1932 cmd.exe PING.EXE PID 1932 wrote to memory of 696 1932 cmd.exe PING.EXE PID 1932 wrote to memory of 2128 1932 cmd.exe Client.exe PID 1932 wrote to memory of 2128 1932 cmd.exe Client.exe PID 1932 wrote to memory of 2128 1932 cmd.exe Client.exe PID 1932 wrote to memory of 2128 1932 cmd.exe Client.exe PID 1932 wrote to memory of 2128 1932 cmd.exe Client.exe PID 1932 wrote to memory of 2128 1932 cmd.exe Client.exe PID 1932 wrote to memory of 2128 1932 cmd.exe Client.exe PID 2128 wrote to memory of 2748 2128 Client.exe schtasks.exe PID 2128 wrote to memory of 2748 2128 Client.exe schtasks.exe PID 2128 wrote to memory of 2748 2128 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (14) - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (14) - Copy - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (14) - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\TJtDdnbjfa6p.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Rv3Vm9fJQ5hj.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CvtFurH6WKfS.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\AX4X3CLfIqGM.bat" "9⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\VqPEQXZG2Gel.bat" "11⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ufjULoZGzSdy.bat" "13⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\jgNyFGLMbUIa.bat" "15⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\VCsdOWVOWa3I.bat" "17⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (14) - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (14) - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\AX4X3CLfIqGM.batFilesize
207B
MD576b8f74f4d673ff1a6fff17d1953b8a4
SHA104d978eefa78b71ea8949b25c3da6ca5d4dc6bfb
SHA256349fb1075c822e9b5f3ffe58602245ecdd518a30e96e76ba6e0765a8dc40a57a
SHA51252bd3b680beaa33c15a84bdd8d365029fead4f41729253819ca3f63a63f7b91a3ae0f1abbbbef03afbd9998b2d38b0e7227e5cd6979ec2737c6eb8a1ba7ef177
-
C:\Users\Admin\AppData\Local\Temp\CvtFurH6WKfS.batFilesize
207B
MD54dd5e64d09c6e76e4067db83f56ca86c
SHA17ddfd15f52564a4a7bff62e8a07f700a0cf79649
SHA256051d704b172e438277eba4fb3568b61d6e2ec0a1224bc28e0a1ed95ad30a5775
SHA51216ed73e1d8c1382733f1ec83c5314817f8e972ca669820545d2b3e1b0a4f85a057670e055fc10f8afff7fcaae1eb30e65d67ebed860ad9bda85bba2c667dd14d
-
C:\Users\Admin\AppData\Local\Temp\Rv3Vm9fJQ5hj.batFilesize
207B
MD5c5b8212478157f8b6e7a6abb96342240
SHA19dce1c635b8da437046386463cdfff1b9cb3a4b9
SHA256d2ac9ab0dea321ab1de373163bc0befca4b00398cc0be46324735febcdc10e7b
SHA5124f3926e207cc78d7dac65c5fe8e0c963516a1820f290fad5acb38aa2c8c894c0a3006ff8751597ccc4f42f09e25f1d8ade67e04ce95b63d307c0a30623ed1b59
-
C:\Users\Admin\AppData\Local\Temp\TJtDdnbjfa6p.batFilesize
207B
MD5ef9e820d1bc931139e884fc3e9bb99eb
SHA1a4d8acd318bf2ec50e142676fc26375b91b6cc6f
SHA256079c168288b92524db99a431cd98b77a30decb0ecdf30302f4d6242dc5e0f4ec
SHA5122d5e958f25b7386f5cbd8497a45ab0f0898d30f62ae4dbdfdd675940b24c5b97b123c6f0987ecf1ff0a2eda945ed7d035ee8000810d32e4681a20ecf03ca258d
-
C:\Users\Admin\AppData\Local\Temp\VCsdOWVOWa3I.batFilesize
207B
MD56e0d73c9f529fad93e1df12dfc5360d8
SHA1c0acc18ff5ce0c0d3c14bed6ad18a03d387bb772
SHA256d3b4d40e56674f21a03b37d2e780007fdf232e4ad5d5e82fb0546c724d71b038
SHA5127b6859e936bdc1f7c2385cc452b2d965c1f5198335f34250ce208b642fd0b2eeee82ca40830d6b5ce5dea7cd49560e833dda831e6bd4e4bc5c8f5f1645731e32
-
C:\Users\Admin\AppData\Local\Temp\VqPEQXZG2Gel.batFilesize
207B
MD538937764122e6edf78304a231448e6eb
SHA1e8250db8994990fb9371c391007302b982b35b14
SHA256b2dd94bd8592f4d991198dae3cc1653a79a34c294e1b216e1875a98c703f77b2
SHA5124ef16220fc8e2d75aa54680b145d4acc07c466596f7acecc94ea74334766fa2d22b9659ffcd609ed493c10e8ff7a29e5e55909d1ca444cc0c7b5a476b5ff5360
-
C:\Users\Admin\AppData\Local\Temp\jgNyFGLMbUIa.batFilesize
207B
MD5baa2c18f8c919e93a3e701f264f071ea
SHA151410f8f2d52c59c613c17c506da516165f270d9
SHA2565f37aab55e19dd5f734b42b73cd354ab3e81ed73dab96315eb608483722cb5e1
SHA5121d09c17bfdda20396e4a19ae913fdd565e14fe7b02d608e7800ae1f3658ab1bf10943dadb1cf29c62c0b9f19bb9ad2f8ab200fb741a1fe7a22ab6c5d564c66bf
-
C:\Users\Admin\AppData\Local\Temp\ufjULoZGzSdy.batFilesize
207B
MD5d05aababc7c13a0459415c3745e2bb63
SHA11b64a937383160825dc3f87b1a6e981913fcb4f9
SHA256121f17422d4251ef4cb6259a8648bac591645a5570b6c4380a415530a6f87b1f
SHA512e8b7187d3c07a510e64a2cbca98cb1f81991f5768fbfc4514240a766180df097d64886bcfa9a069f5a6e6479abe5d85e8778847696afe969ca22784f6c88eccc
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/1532-13-0x0000000074560000-0x0000000074C4E000-memory.dmpFilesize
6.9MB
-
memory/1532-12-0x00000000009E0000-0x0000000000A4C000-memory.dmpFilesize
432KB
-
memory/1532-16-0x0000000074560000-0x0000000074C4E000-memory.dmpFilesize
6.9MB
-
memory/1532-25-0x0000000074560000-0x0000000074C4E000-memory.dmpFilesize
6.9MB
-
memory/1532-14-0x0000000074560000-0x0000000074C4E000-memory.dmpFilesize
6.9MB
-
memory/1540-77-0x0000000000E20000-0x0000000000E8C000-memory.dmpFilesize
432KB
-
memory/2128-41-0x0000000001030000-0x000000000109C000-memory.dmpFilesize
432KB
-
memory/2220-2-0x0000000074560000-0x0000000074C4E000-memory.dmpFilesize
6.9MB
-
memory/2220-0-0x000000007456E000-0x000000007456F000-memory.dmpFilesize
4KB
-
memory/2220-15-0x0000000074560000-0x0000000074C4E000-memory.dmpFilesize
6.9MB
-
memory/2220-1-0x0000000000FD0000-0x000000000103C000-memory.dmpFilesize
432KB
-
memory/2220-4-0x0000000074560000-0x0000000074C4E000-memory.dmpFilesize
6.9MB
-
memory/2220-3-0x000000007456E000-0x000000007456F000-memory.dmpFilesize
4KB
-
memory/2228-113-0x0000000000FE0000-0x000000000104C000-memory.dmpFilesize
432KB
-
memory/2248-89-0x0000000000200000-0x000000000026C000-memory.dmpFilesize
432KB
-
memory/2836-101-0x0000000000A80000-0x0000000000AEC000-memory.dmpFilesize
432KB
-
memory/2872-65-0x0000000000370000-0x00000000003DC000-memory.dmpFilesize
432KB
-
memory/2936-29-0x00000000000D0000-0x000000000013C000-memory.dmpFilesize
432KB
-
memory/3048-53-0x0000000000110000-0x000000000017C000-memory.dmpFilesize
432KB