Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
596s -
max time network
601s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 15:28
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
General
-
Target
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 11 IoCs
Processes:
resource yara_rule behavioral31/memory/2108-1-0x0000000000BA0000-0x0000000000C0C000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral31/memory/2560-12-0x00000000010F0000-0x000000000115C000-memory.dmp family_quasar behavioral31/memory/2788-29-0x0000000001150000-0x00000000011BC000-memory.dmp family_quasar behavioral31/memory/2996-41-0x0000000000090000-0x00000000000FC000-memory.dmp family_quasar behavioral31/memory/2948-53-0x0000000000D20000-0x0000000000D8C000-memory.dmp family_quasar behavioral31/memory/1800-65-0x0000000000D80000-0x0000000000DEC000-memory.dmp family_quasar behavioral31/memory/668-77-0x0000000000D80000-0x0000000000DEC000-memory.dmp family_quasar behavioral31/memory/1348-89-0x0000000001140000-0x00000000011AC000-memory.dmp family_quasar behavioral31/memory/2656-101-0x0000000001140000-0x00000000011AC000-memory.dmp family_quasar behavioral31/memory/2000-113-0x0000000001140000-0x00000000011AC000-memory.dmp family_quasar -
Executes dropped EXE 9 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2560 Client.exe 2788 Client.exe 2996 Client.exe 2948 Client.exe 1800 Client.exe 668 Client.exe 1348 Client.exe 2656 Client.exe 2000 Client.exe -
Loads dropped DLL 9 IoCs
Processes:
Uni - Copy (15) - Copy - Copy - Copy.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exepid process 2108 Uni - Copy (15) - Copy - Copy - Copy.exe 1556 cmd.exe 2276 cmd.exe 1344 cmd.exe 288 cmd.exe 2976 cmd.exe 1256 cmd.exe 2212 cmd.exe 1952 cmd.exe -
Looks up external IP address via web service 20 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 51 ip-api.com 2 ip-api.com 6 api.ipify.org 27 ip-api.com 33 ip-api.com 39 ip-api.com 41 api.ipify.org 47 api.ipify.org 11 api.ipify.org 17 api.ipify.org 21 ip-api.com 29 api.ipify.org 53 api.ipify.org 8 ip-api.com 15 ip-api.com 23 api.ipify.org 57 ip-api.com 35 api.ipify.org 45 ip-api.com 59 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
SCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1824 SCHTASKS.exe 2092 schtasks.exe 1944 schtasks.exe 2732 schtasks.exe 2544 schtasks.exe 1812 schtasks.exe 1564 schtasks.exe 2336 schtasks.exe 2164 schtasks.exe 1492 schtasks.exe -
Runs ping.exe 1 TTPs 8 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 2940 PING.EXE 2720 PING.EXE 1036 PING.EXE 2504 PING.EXE 1368 PING.EXE 2696 PING.EXE 800 PING.EXE 844 PING.EXE -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
Uni - Copy (15) - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 2108 Uni - Copy (15) - Copy - Copy - Copy.exe Token: SeDebugPrivilege 2560 Client.exe Token: SeDebugPrivilege 2788 Client.exe Token: SeDebugPrivilege 2996 Client.exe Token: SeDebugPrivilege 2948 Client.exe Token: SeDebugPrivilege 1800 Client.exe Token: SeDebugPrivilege 668 Client.exe Token: SeDebugPrivilege 1348 Client.exe Token: SeDebugPrivilege 2656 Client.exe Token: SeDebugPrivilege 2000 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (15) - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 2108 wrote to memory of 2732 2108 Uni - Copy (15) - Copy - Copy - Copy.exe schtasks.exe PID 2108 wrote to memory of 2732 2108 Uni - Copy (15) - Copy - Copy - Copy.exe schtasks.exe PID 2108 wrote to memory of 2732 2108 Uni - Copy (15) - Copy - Copy - Copy.exe schtasks.exe PID 2108 wrote to memory of 2732 2108 Uni - Copy (15) - Copy - Copy - Copy.exe schtasks.exe PID 2108 wrote to memory of 2560 2108 Uni - Copy (15) - Copy - Copy - Copy.exe Client.exe PID 2108 wrote to memory of 2560 2108 Uni - Copy (15) - Copy - Copy - Copy.exe Client.exe PID 2108 wrote to memory of 2560 2108 Uni - Copy (15) - Copy - Copy - Copy.exe Client.exe PID 2108 wrote to memory of 2560 2108 Uni - Copy (15) - Copy - Copy - Copy.exe Client.exe PID 2108 wrote to memory of 2560 2108 Uni - Copy (15) - Copy - Copy - Copy.exe Client.exe PID 2108 wrote to memory of 2560 2108 Uni - Copy (15) - Copy - Copy - Copy.exe Client.exe PID 2108 wrote to memory of 2560 2108 Uni - Copy (15) - Copy - Copy - Copy.exe Client.exe PID 2108 wrote to memory of 1824 2108 Uni - Copy (15) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2108 wrote to memory of 1824 2108 Uni - Copy (15) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2108 wrote to memory of 1824 2108 Uni - Copy (15) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2108 wrote to memory of 1824 2108 Uni - Copy (15) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2560 wrote to memory of 2544 2560 Client.exe schtasks.exe PID 2560 wrote to memory of 2544 2560 Client.exe schtasks.exe PID 2560 wrote to memory of 2544 2560 Client.exe schtasks.exe PID 2560 wrote to memory of 2544 2560 Client.exe schtasks.exe PID 2560 wrote to memory of 1556 2560 Client.exe cmd.exe PID 2560 wrote to memory of 1556 2560 Client.exe cmd.exe PID 2560 wrote to memory of 1556 2560 Client.exe cmd.exe PID 2560 wrote to memory of 1556 2560 Client.exe cmd.exe PID 1556 wrote to memory of 1760 1556 cmd.exe chcp.com PID 1556 wrote to memory of 1760 1556 cmd.exe chcp.com PID 1556 wrote to memory of 1760 1556 cmd.exe chcp.com PID 1556 wrote to memory of 1760 1556 cmd.exe chcp.com PID 1556 wrote to memory of 2504 1556 cmd.exe PING.EXE PID 1556 wrote to memory of 2504 1556 cmd.exe PING.EXE PID 1556 wrote to memory of 2504 1556 cmd.exe PING.EXE PID 1556 wrote to memory of 2504 1556 cmd.exe PING.EXE PID 1556 wrote to memory of 2788 1556 cmd.exe Client.exe PID 1556 wrote to memory of 2788 1556 cmd.exe Client.exe PID 1556 wrote to memory of 2788 1556 cmd.exe Client.exe PID 1556 wrote to memory of 2788 1556 cmd.exe Client.exe PID 1556 wrote to memory of 2788 1556 cmd.exe Client.exe PID 1556 wrote to memory of 2788 1556 cmd.exe Client.exe PID 1556 wrote to memory of 2788 1556 cmd.exe Client.exe PID 2788 wrote to memory of 1812 2788 Client.exe schtasks.exe PID 2788 wrote to memory of 1812 2788 Client.exe schtasks.exe PID 2788 wrote to memory of 1812 2788 Client.exe schtasks.exe PID 2788 wrote to memory of 1812 2788 Client.exe schtasks.exe PID 2788 wrote to memory of 2276 2788 Client.exe cmd.exe PID 2788 wrote to memory of 2276 2788 Client.exe cmd.exe PID 2788 wrote to memory of 2276 2788 Client.exe cmd.exe PID 2788 wrote to memory of 2276 2788 Client.exe cmd.exe PID 2276 wrote to memory of 2300 2276 cmd.exe chcp.com PID 2276 wrote to memory of 2300 2276 cmd.exe chcp.com PID 2276 wrote to memory of 2300 2276 cmd.exe chcp.com PID 2276 wrote to memory of 2300 2276 cmd.exe chcp.com PID 2276 wrote to memory of 1368 2276 cmd.exe PING.EXE PID 2276 wrote to memory of 1368 2276 cmd.exe PING.EXE PID 2276 wrote to memory of 1368 2276 cmd.exe PING.EXE PID 2276 wrote to memory of 1368 2276 cmd.exe PING.EXE PID 2276 wrote to memory of 2996 2276 cmd.exe Client.exe PID 2276 wrote to memory of 2996 2276 cmd.exe Client.exe PID 2276 wrote to memory of 2996 2276 cmd.exe Client.exe PID 2276 wrote to memory of 2996 2276 cmd.exe Client.exe PID 2276 wrote to memory of 2996 2276 cmd.exe Client.exe PID 2276 wrote to memory of 2996 2276 cmd.exe Client.exe PID 2276 wrote to memory of 2996 2276 cmd.exe Client.exe PID 2996 wrote to memory of 1564 2996 Client.exe schtasks.exe PID 2996 wrote to memory of 1564 2996 Client.exe schtasks.exe PID 2996 wrote to memory of 1564 2996 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (15) - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (15) - Copy - Copy - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (15) - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\jgwb6Mhy1ZL1.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\eHI9SxaEGHF1.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\xWuKw5T4anyq.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\UvveJVaEAdCS.bat" "9⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\SX6vRrdnv9nM.bat" "11⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\pLbRaNTTMX5f.bat" "13⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\kOsO4KaD0C85.bat" "15⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\WuN4DakEvHtn.bat" "17⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (15) - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (15) - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\SX6vRrdnv9nM.batFilesize
207B
MD5d721790c36afc1e1f42006e9ba587d0e
SHA19bc7a6e081d475294ef3f6b8719d787304adc9f0
SHA2562f500e5dab9ab1ad149209611fb0654f6dcc209e41be05968338da9cc8cc8f6b
SHA512222cf9d3bc700bb01f5bdbc18fbb3a73c94031ef677a228e5e716a027a835901f88b4d2c0ba65ac0e224c3e72691728a2ba62ca5f0221940c6200f0e3c6db654
-
C:\Users\Admin\AppData\Local\Temp\UvveJVaEAdCS.batFilesize
207B
MD525d67cfaef845abf2b26e7e5c5494e55
SHA1ad9fe6cff6977f2e14fc173f24c84cf2c5bc9be9
SHA256842fa72dfff209814fbe57c1925b8dab100863e1f25087f90fb9eacb3514cf61
SHA5129e099393f0bb9bc97bdd16daeeaaeccb8299d3f50abd867aee34b0d6701479a686909c3ff294070cfbf94138a1d866a81b12adb71f6198d46eac986105051199
-
C:\Users\Admin\AppData\Local\Temp\WuN4DakEvHtn.batFilesize
207B
MD56727cec2521cb7f089659be0c4fed113
SHA10abd4dfec1ae70cb213bbb224e9a54be769eea62
SHA256a64dc9875a7c7f50f02e03fce806b6ba4d7e3a01f70c6be14df7b3bf7cfbc1d9
SHA512c2f0956a1d56641c1431e6155e98274616f1417a556154514cca88853c95306f043f2a7ac1fa595501a2cc625a53dad02013c72c8c7edbe67fe62de285ba8543
-
C:\Users\Admin\AppData\Local\Temp\eHI9SxaEGHF1.batFilesize
207B
MD5bbeaccb93dcf3b396b7e00b9eba0933b
SHA195f427ffe7b6c41f8abeb9b1b29ba85f982a47bc
SHA256535b06468318bb70571205f41c8981dade8827bf079d0ba77afe19086517aa0b
SHA512d3bcb8eb52c2f576c58f2964521783eaacd96cb2dbab237bf089091effeb9cfd894728f48674c676c8be8df6b9e4158c5c3e24df96524daaca41c0b1eba9cc0f
-
C:\Users\Admin\AppData\Local\Temp\jgwb6Mhy1ZL1.batFilesize
207B
MD5d94c5e30d10d16ef47de2644300e0254
SHA1a476907b39f89902478dddef7c7f5f25f635aa39
SHA256378b917e8ef43818143d5a533a1c37fbe45d1f80c28ea97872def8f5ac3b73e2
SHA51246c8183a789b007b9d9dbc2bfb88c4e549c5dfc7b6374df20ea48ff985fe75213f21d5faf9a4d83d25ea06e1a2605e26b1cb33171ce3a665fe1f1c713a639b78
-
C:\Users\Admin\AppData\Local\Temp\kOsO4KaD0C85.batFilesize
207B
MD5075d6b6dbe9f0cd398c09aafd538b098
SHA1970d68ba1f24ae55d6fde8296221367d801a0250
SHA25666140c86db565256cbbb96f2c541479c7d6a561ef373d9379c7365a0edbe2a43
SHA512ae12d64cab97d6c6a61028ce871127e642253f6031b39bd86b805c05bb7d7d2208dc3414696399fad21ca0b916f180e328dabbe7fb239c790aa3a2ea5aadf1c2
-
C:\Users\Admin\AppData\Local\Temp\pLbRaNTTMX5f.batFilesize
207B
MD5d2af4b267e83ad4f4544710f2aeaf04c
SHA1697bc18449a3963aeb251358cc9bb749092ad5bc
SHA25695fcd61f5fa6a7db10f69a51cfc2e37fa60e1da7b561e3ce5e8dba34dd8af3e0
SHA512790d4e9be11b0a2d1ac847f4ec34c250a15da4efb0e11c744f65ee583a394a500eb991e1a28acbbb40a61d167c899746c422138d215a37db7249d1cff0f92a43
-
C:\Users\Admin\AppData\Local\Temp\xWuKw5T4anyq.batFilesize
207B
MD51dc8f4448bd3bdbb42017cb61f55978c
SHA19385d697cf4fe8fe92c8da53c452366831cfde7e
SHA256d3e066180fd59d9f24417fa5a9f7b6dfa010ed3ac78ce95d6f8705a853e5428f
SHA512e631c426d65d4977aadb00a3c3760008a3fcc9affdaf1d6a60a1f66affb057f813e5d58bd355a33ef19cb63239b3b33d8f9299423688aa3d2aedf28478fdfa1e
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/668-77-0x0000000000D80000-0x0000000000DEC000-memory.dmpFilesize
432KB
-
memory/1348-89-0x0000000001140000-0x00000000011AC000-memory.dmpFilesize
432KB
-
memory/1800-65-0x0000000000D80000-0x0000000000DEC000-memory.dmpFilesize
432KB
-
memory/2000-113-0x0000000001140000-0x00000000011AC000-memory.dmpFilesize
432KB
-
memory/2108-15-0x0000000074B10000-0x00000000751FE000-memory.dmpFilesize
6.9MB
-
memory/2108-1-0x0000000000BA0000-0x0000000000C0C000-memory.dmpFilesize
432KB
-
memory/2108-2-0x0000000074B10000-0x00000000751FE000-memory.dmpFilesize
6.9MB
-
memory/2108-3-0x0000000074B1E000-0x0000000074B1F000-memory.dmpFilesize
4KB
-
memory/2108-0-0x0000000074B1E000-0x0000000074B1F000-memory.dmpFilesize
4KB
-
memory/2108-4-0x0000000074B10000-0x00000000751FE000-memory.dmpFilesize
6.9MB
-
memory/2560-14-0x0000000074B10000-0x00000000751FE000-memory.dmpFilesize
6.9MB
-
memory/2560-12-0x00000000010F0000-0x000000000115C000-memory.dmpFilesize
432KB
-
memory/2560-13-0x0000000074B10000-0x00000000751FE000-memory.dmpFilesize
6.9MB
-
memory/2560-16-0x0000000074B10000-0x00000000751FE000-memory.dmpFilesize
6.9MB
-
memory/2560-25-0x0000000074B10000-0x00000000751FE000-memory.dmpFilesize
6.9MB
-
memory/2656-101-0x0000000001140000-0x00000000011AC000-memory.dmpFilesize
432KB
-
memory/2788-29-0x0000000001150000-0x00000000011BC000-memory.dmpFilesize
432KB
-
memory/2948-53-0x0000000000D20000-0x0000000000D8C000-memory.dmpFilesize
432KB
-
memory/2996-41-0x0000000000090000-0x00000000000FC000-memory.dmpFilesize
432KB