Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
296s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 17:13
Behavioral task
behavioral1
Sample
$sxr-Uni.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
$sxr-Uni.exe
Resource
win10v2004-20240508-en
General
-
Target
$sxr-Uni.exe
-
Size
349KB
-
MD5
1ec86aa544089409730a3777da35c70a
-
SHA1
b592008ecc06d47bd7170f0ad3799e114139df0f
-
SHA256
5d533976a3ac74eede22a42c2776ce3a392596b98c5ef0e6bed98b6395fb0c48
-
SHA512
fbd7a000b74f0488039aa9213d56cf464b55629c9c649bde2835216f699f51f921d417d090e7e2e0d6e7c10a07c4b767ada82a8ac45fcfc10c950163f2df9715
-
SSDEEP
6144:ErL3HRsM+OFZHBcFU4EljaWbrqXMxxz5A8XklSoj:6VP+MXuCJayqXMr5mlSoj
Malware Config
Extracted
quasar
3.0.0
Slave
runderscore00-63294.portmap.host:63294
QSR_MUTEX_zImH6b2ccpa3QdeboZ
-
encryption_key
Ep14qTjvhc0fuqxF9hv4
-
install_name
$sxr-powershell.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
3000
-
startup_key
Powershell
-
subdirectory
$sxr-seroxen2
Signatures
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/1328-1-0x0000000000B10000-0x0000000000B6E000-memory.dmp family_quasar behavioral2/files/0x0008000000022f51-12.dat family_quasar -
Checks computer location settings 2 TTPs 14 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation $sxr-powershell.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation $sxr-powershell.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation $sxr-powershell.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation $sxr-powershell.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation $sxr-powershell.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation $sxr-powershell.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation $sxr-powershell.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation $sxr-powershell.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation $sxr-powershell.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation $sxr-powershell.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation $sxr-powershell.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation $sxr-powershell.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation $sxr-powershell.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation $sxr-powershell.exe -
Executes dropped EXE 14 IoCs
pid Process 1760 $sxr-powershell.exe 1708 $sxr-powershell.exe 3668 $sxr-powershell.exe 3176 $sxr-powershell.exe 4016 $sxr-powershell.exe 4044 $sxr-powershell.exe 4952 $sxr-powershell.exe 2324 $sxr-powershell.exe 4464 $sxr-powershell.exe 4288 $sxr-powershell.exe 3996 $sxr-powershell.exe 5012 $sxr-powershell.exe 5008 $sxr-powershell.exe 1824 $sxr-powershell.exe -
Looks up external IP address via web service 14 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 ip-api.com 30 ip-api.com 34 ip-api.com 9 api.ipify.org 14 ip-api.com 18 ip-api.com 20 ip-api.com 22 ip-api.com 28 ip-api.com 2 ip-api.com 16 ip-api.com 24 ip-api.com 26 ip-api.com 32 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 14 IoCs
pid pid_target Process procid_target 3808 1760 WerFault.exe 89 1936 1708 WerFault.exe 100 4652 3668 WerFault.exe 112 3772 3176 WerFault.exe 123 2772 4016 WerFault.exe 132 4640 4044 WerFault.exe 141 4888 4952 WerFault.exe 150 1500 2324 WerFault.exe 159 1180 4464 WerFault.exe 168 4884 4288 WerFault.exe 177 2708 3996 WerFault.exe 186 4528 5012 WerFault.exe 195 1532 5008 WerFault.exe 206 4384 1824 WerFault.exe 215 -
Creates scheduled task(s) 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2188 schtasks.exe 1392 schtasks.exe 2012 schtasks.exe 3800 schtasks.exe 4160 schtasks.exe 1380 schtasks.exe 2732 schtasks.exe 4100 schtasks.exe 4532 schtasks.exe 4032 schtasks.exe 224 schtasks.exe 5052 schtasks.exe 2832 schtasks.exe 2672 schtasks.exe 4436 schtasks.exe -
Runs ping.exe 1 TTPs 14 IoCs
pid Process 2044 PING.EXE 2152 PING.EXE 1748 PING.EXE 4932 PING.EXE 940 PING.EXE 3816 PING.EXE 4328 PING.EXE 3516 PING.EXE 2340 PING.EXE 1976 PING.EXE 5004 PING.EXE 552 PING.EXE 3548 PING.EXE 1560 PING.EXE -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 1328 $sxr-Uni.exe Token: SeDebugPrivilege 1760 $sxr-powershell.exe Token: SeDebugPrivilege 1708 $sxr-powershell.exe Token: SeDebugPrivilege 3668 $sxr-powershell.exe Token: SeDebugPrivilege 3176 $sxr-powershell.exe Token: SeDebugPrivilege 4016 $sxr-powershell.exe Token: SeDebugPrivilege 4044 $sxr-powershell.exe Token: SeDebugPrivilege 4952 $sxr-powershell.exe Token: SeDebugPrivilege 2324 $sxr-powershell.exe Token: SeDebugPrivilege 4464 $sxr-powershell.exe Token: SeDebugPrivilege 4288 $sxr-powershell.exe Token: SeDebugPrivilege 3996 $sxr-powershell.exe Token: SeDebugPrivilege 5012 $sxr-powershell.exe Token: SeDebugPrivilege 5008 $sxr-powershell.exe Token: SeDebugPrivilege 1824 $sxr-powershell.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1760 $sxr-powershell.exe 1708 $sxr-powershell.exe 3668 $sxr-powershell.exe 3176 $sxr-powershell.exe 4016 $sxr-powershell.exe 4044 $sxr-powershell.exe 4952 $sxr-powershell.exe 2324 $sxr-powershell.exe 4464 $sxr-powershell.exe 4288 $sxr-powershell.exe 3996 $sxr-powershell.exe 5012 $sxr-powershell.exe 5008 $sxr-powershell.exe 1824 $sxr-powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1328 wrote to memory of 2188 1328 $sxr-Uni.exe 87 PID 1328 wrote to memory of 2188 1328 $sxr-Uni.exe 87 PID 1328 wrote to memory of 2188 1328 $sxr-Uni.exe 87 PID 1328 wrote to memory of 1760 1328 $sxr-Uni.exe 89 PID 1328 wrote to memory of 1760 1328 $sxr-Uni.exe 89 PID 1328 wrote to memory of 1760 1328 $sxr-Uni.exe 89 PID 1760 wrote to memory of 4100 1760 $sxr-powershell.exe 90 PID 1760 wrote to memory of 4100 1760 $sxr-powershell.exe 90 PID 1760 wrote to memory of 4100 1760 $sxr-powershell.exe 90 PID 1760 wrote to memory of 1776 1760 $sxr-powershell.exe 92 PID 1760 wrote to memory of 1776 1760 $sxr-powershell.exe 92 PID 1760 wrote to memory of 1776 1760 $sxr-powershell.exe 92 PID 1776 wrote to memory of 812 1776 cmd.exe 95 PID 1776 wrote to memory of 812 1776 cmd.exe 95 PID 1776 wrote to memory of 812 1776 cmd.exe 95 PID 1776 wrote to memory of 1748 1776 cmd.exe 97 PID 1776 wrote to memory of 1748 1776 cmd.exe 97 PID 1776 wrote to memory of 1748 1776 cmd.exe 97 PID 1776 wrote to memory of 1708 1776 cmd.exe 100 PID 1776 wrote to memory of 1708 1776 cmd.exe 100 PID 1776 wrote to memory of 1708 1776 cmd.exe 100 PID 1708 wrote to memory of 3800 1708 $sxr-powershell.exe 101 PID 1708 wrote to memory of 3800 1708 $sxr-powershell.exe 101 PID 1708 wrote to memory of 3800 1708 $sxr-powershell.exe 101 PID 1708 wrote to memory of 3324 1708 $sxr-powershell.exe 103 PID 1708 wrote to memory of 3324 1708 $sxr-powershell.exe 103 PID 1708 wrote to memory of 3324 1708 $sxr-powershell.exe 103 PID 3324 wrote to memory of 4228 3324 cmd.exe 106 PID 3324 wrote to memory of 4228 3324 cmd.exe 106 PID 3324 wrote to memory of 4228 3324 cmd.exe 106 PID 3324 wrote to memory of 1976 3324 cmd.exe 108 PID 3324 wrote to memory of 1976 3324 cmd.exe 108 PID 3324 wrote to memory of 1976 3324 cmd.exe 108 PID 3324 wrote to memory of 3668 3324 cmd.exe 112 PID 3324 wrote to memory of 3668 3324 cmd.exe 112 PID 3324 wrote to memory of 3668 3324 cmd.exe 112 PID 3668 wrote to memory of 1392 3668 $sxr-powershell.exe 113 PID 3668 wrote to memory of 1392 3668 $sxr-powershell.exe 113 PID 3668 wrote to memory of 1392 3668 $sxr-powershell.exe 113 PID 3668 wrote to memory of 4440 3668 $sxr-powershell.exe 116 PID 3668 wrote to memory of 4440 3668 $sxr-powershell.exe 116 PID 3668 wrote to memory of 4440 3668 $sxr-powershell.exe 116 PID 4440 wrote to memory of 2104 4440 cmd.exe 119 PID 4440 wrote to memory of 2104 4440 cmd.exe 119 PID 4440 wrote to memory of 2104 4440 cmd.exe 119 PID 4440 wrote to memory of 5004 4440 cmd.exe 121 PID 4440 wrote to memory of 5004 4440 cmd.exe 121 PID 4440 wrote to memory of 5004 4440 cmd.exe 121 PID 4440 wrote to memory of 3176 4440 cmd.exe 123 PID 4440 wrote to memory of 3176 4440 cmd.exe 123 PID 4440 wrote to memory of 3176 4440 cmd.exe 123 PID 3176 wrote to memory of 4532 3176 $sxr-powershell.exe 124 PID 3176 wrote to memory of 4532 3176 $sxr-powershell.exe 124 PID 3176 wrote to memory of 4532 3176 $sxr-powershell.exe 124 PID 3176 wrote to memory of 796 3176 $sxr-powershell.exe 126 PID 3176 wrote to memory of 796 3176 $sxr-powershell.exe 126 PID 3176 wrote to memory of 796 3176 $sxr-powershell.exe 126 PID 796 wrote to memory of 1500 796 cmd.exe 130 PID 796 wrote to memory of 1500 796 cmd.exe 130 PID 796 wrote to memory of 1500 796 cmd.exe 130 PID 796 wrote to memory of 552 796 cmd.exe 131 PID 796 wrote to memory of 552 796 cmd.exe 131 PID 796 wrote to memory of 552 796 cmd.exe 131 PID 796 wrote to memory of 4016 796 cmd.exe 132
Processes
-
C:\Users\Admin\AppData\Local\Temp\$sxr-Uni.exe"C:\Users\Admin\AppData\Local\Temp\$sxr-Uni.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\$sxr-Uni.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:2188
-
-
C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:4100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iKgPWDyOj2SG.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:812
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
PID:1748
-
-
C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:3800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\z8Ow72fXvUIY.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\chcp.comchcp 650016⤵PID:4228
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
PID:1976
-
-
C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
PID:1392
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FrMxqg2uh3SH.bat" "7⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\chcp.comchcp 650018⤵PID:2104
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
PID:5004
-
-
C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
PID:4532
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GzjO3JFEVcGf.bat" "9⤵
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵PID:1500
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
PID:552
-
-
C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4016 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
PID:4160
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\puxrT0W78Whk.bat" "11⤵PID:3696
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵PID:4368
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
PID:3548
-
-
C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4044 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
PID:1380
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JJEmLl1dYeY0.bat" "13⤵PID:4564
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵PID:3444
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
PID:4932
-
-
C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4952 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
PID:2732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KRbDYOFwMDMN.bat" "15⤵PID:1096
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵PID:2768
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
PID:940
-
-
C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2324 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
PID:2012
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qL1wCLMXTJ6Y.bat" "17⤵PID:2268
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵PID:1672
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
PID:1560
-
-
C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4464 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
PID:4032
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rTPNPyZqHsuw.bat" "19⤵PID:4188
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵PID:1504
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
PID:2340
-
-
C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4288 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
PID:2672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QOdqqgrkumM0.bat" "21⤵PID:4744
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵PID:2252
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
PID:3816
-
-
C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3996 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
PID:224
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\b7W4HCLXrp7g.bat" "23⤵PID:4036
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵PID:924
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
PID:4328
-
-
C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5012 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
PID:5052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oLZ7UuSPVplG.bat" "25⤵PID:3112
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵PID:4144
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
PID:2044
-
-
C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5008 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
PID:2832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\s2qtLwdZRF88.bat" "27⤵PID:3256
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵PID:3596
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
PID:3516
-
-
C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1824 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe" /rl HIGHEST /f29⤵
- Creates scheduled task(s)
PID:4436
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ALRBDbFX1w8B.bat" "29⤵PID:2524
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵PID:452
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
PID:2152
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 109229⤵
- Program crash
PID:4384
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 222827⤵
- Program crash
PID:1532
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 94025⤵
- Program crash
PID:4528
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 109223⤵
- Program crash
PID:2708
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4288 -s 109621⤵
- Program crash
PID:4884
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 93219⤵
- Program crash
PID:1180
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 93217⤵
- Program crash
PID:1500
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 220015⤵
- Program crash
PID:4888
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4044 -s 109213⤵
- Program crash
PID:4640
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 222411⤵
- Program crash
PID:2772
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 21409⤵
- Program crash
PID:3772
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3668 -s 16327⤵
- Program crash
PID:4652
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 21725⤵
- Program crash
PID:1936
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 21243⤵
- Program crash
PID:3808
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1760 -ip 17601⤵PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1708 -ip 17081⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3668 -ip 36681⤵PID:2768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3176 -ip 31761⤵PID:4056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4016 -ip 40161⤵PID:4700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4044 -ip 40441⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4952 -ip 49521⤵PID:4752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2324 -ip 23241⤵PID:4588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4464 -ip 44641⤵PID:1676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4288 -ip 42881⤵PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3996 -ip 39961⤵PID:4948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 5012 -ip 50121⤵PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 5008 -ip 50081⤵PID:3104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1824 -ip 18241⤵PID:5116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223B
MD5b34fd498f5d8eff45c68760666a63b77
SHA1dd277ace2c5fa5db1c54256fc780e4723ec553cc
SHA2565cd6ab748ec535bf45336686dfeefa98e768f40698a6bc0833f908681777cbdb
SHA512c0c51c701f6435dc2a95ee7c85a1f80e9cb9fce0de4a06baea291fe71dc13f9d5d21a4e6489b6a93b327e1e012bb4cc10f666a952388bd290e60265a3a0125e2
-
Filesize
223B
MD5c8352559e8354a7bf1072eeba68665dd
SHA165f5593a8c19d7048a6fc35194ab92fea7771d2e
SHA256450109d2d2ba286cf92e8378cd75582d622ba849f415c2c311a0b3da3e34b5f3
SHA5129e5710a158f803cd92e84dcf02b8c1fdfdbd3006a96214b3e364cfce289e2c00c5bfae962998ebc74c5cdad27b3c197c35261adcccda3837ed593a64a42c29b5
-
Filesize
223B
MD55fdb483e61f1187d4981eb57842b50c4
SHA1bdb0d6b61ee0fdfa0d73a0455fad32ee92e59c50
SHA25612872401aeebeaf4d827e93fe051d1197dcda2bf323ceccec746cec096f8a17c
SHA5124e9c8166ef4cc2b9f23ebe28f8133bbff28e637742d7715318929872c208e4699e1c1f152a45e0cb1fb1fb5760debc37a5f7926758078b0aa4cdb244a81abe15
-
Filesize
223B
MD50309ce612f4d8325cec881106e90544d
SHA131a74ae709ca573718de2f196044b633706b5373
SHA2560e455f2678335a73531de11a5ce8e26288d7ec734b23833f457b7ecba0eae0c8
SHA512118d79eb4ef4bde18268e05a5e5cebae4b7182fe0fde42a547350b2fb26224ff096b636d6cff58dbe7bdd9cb53dbd98a132f538681e6148204f4664114132b53
-
Filesize
223B
MD5b1cbf0e842aea59685d5d7e1699c3154
SHA10f8a38c5c516b39d64373a0d0c839d15ef2ad187
SHA25693fc7d436017a9900c5ca3dd140a1ee90ab183d2a4f4c716e7d67b33f0c22b9b
SHA512e0dc3e41f7c7a07ccda98aff8ee69c9b792b8bdbb44b5c79a832a42048b2260627b93815274bfa55872a995d4d02333938b7bed228fcd7dd3a1308817bc0b96f
-
Filesize
223B
MD5fc6c22ed86e41a76d5aad3621b868203
SHA17928ec064ee8d72c6e507a8ecc0bf4e0f589647d
SHA2564e8d5f89a70e83bb3841431d9679250cc136d97c03f46de50e456a67fc5a1941
SHA5124480ec9e49039d9ee25f0d436d7662275c99bdeb7d291deb35c2f6eea5cfc7be2d0bd3e5ce66ab8dd46a8b00dbdb84f0991b8f1554dea64d3f37ba3997b0d3ec
-
Filesize
223B
MD5d834374033729b1c8a8f6427433f0121
SHA1e7a2ebfab58b28949d145540899899cd8636efaf
SHA2560a0b7d7bc5dfe135cdee7221061019916472c1eedfe208aa85afa403214fe61d
SHA5120211e5c954e39aa75ee087814195000f39468e5e8dd33459b4484a694ccc43d960e4bef9ecf636cb98d25b06155f2a204c9bbffc10064327aab3e152ee7c4f38
-
Filesize
223B
MD5b7f93ff597e87af6cb994851805aad7f
SHA12fde0b8ccbdb65f3f0847fc67bc976b739c9f25b
SHA2560dfc1ced8475ae24f1279779d14751e13a0d04f3009fc4021b4418b03e7f402c
SHA512ae93b3bbf4eb5d2f091d3a652a76d899ea4947999fabb33ce10049fe6183c798a8d1c11f0d22e6717142f909a9891db4d0974313355a27774b9856c5c77ac470
-
Filesize
223B
MD59ecaef9f4fd2340e68b3ec47865c7305
SHA13d46c59d710dbaf183639c7e8fddffa249677c58
SHA256eb6f60d41284e203bb0f063eec5157271fd0e736d56c58c39b1eace68adf4bdc
SHA5127eed327958ec0b37afa3f678810b18fe8af7f85ebe58150b349752dff2cb3170aa74ed61c930bda73f7fe610acc945a447b517c2a3818538de61e14306b70bf8
-
Filesize
223B
MD5e372e7120b7c2a8db301102dc4169004
SHA12fe0017d99e91db29f73c1a3900d7a37fb7d0698
SHA2565689026a4d0d94ff1eeec47d60d98fbd6c6e66c92ae5bf603d6b63a435bef1f4
SHA512b39dfd82ded24001622a7b1083be2bbb1a9a37d5cda3fc67e5fb9303c2a38bf9a1c5856f3e187f1631b24aad88a90a2dfe0a49ef5dc17aee80d30156a2fc9227
-
Filesize
223B
MD5c504ea0fdd18fbd3c915ba47bff64a8a
SHA1cd3424db2a7cd4664625fa7b300b828e486001cc
SHA256d1b4ea33b344ad3b2294efa43599366e827d45436c0b48520acacbd054cbd21e
SHA512cdd3dace92b7110a9d392bc5360c70f19c5e3b5a95163ee2a2a2f828a3eff015b2afc951db4930abe9db47591c7b877239f26867389ab82af14aee2670b7c190
-
Filesize
223B
MD5ab68f9660e97d462d1cfa8b677437d7c
SHA10a09575f791b9f8f8203c7b2054a702b4b22f07b
SHA256aa141510df65aab8c4b62fc5f35d73dfbdb824d6bcd820c332de0fbc324395f1
SHA512d971ff5e915db65ba0a6db79db29e0baffba514890d86172a69c231f191af3ddbcff3c74ccc1b9af267b37a07b630b7219c1f64e24ab5898ae2b63d6143dff99
-
Filesize
223B
MD594b2fdf1802f6e53c7c7ea3cd18ef087
SHA19be4c3cbb3a534cef00b3a36714ccbb8f33f92ce
SHA25685d14513bf0869a6fc0bfc553b7e1eab09277a95a626b5c4da3baa1398eb0d2e
SHA512d6561f4ad9ca6ddb79ce22faa2cf43cb118304837a0ce18d1abf7a35792c6b406359823be02cafbe74bb3bac7e988f23fbdda1284011a8b5cc012a01f1693f72
-
Filesize
223B
MD5cfacdd2f48c7cb7644be47876f237ba4
SHA15cb82161a14a100ab12c84425ec7368bbb0a7d65
SHA25680bc2bd7a211504c896d58297b754d8219732dd06cbc160680b04f4d95fc5fc6
SHA5120215bdbcb384e49dba718184d51c77631ca87497271c270789b4189fd87f2cf278e133f7d30364f77f1e78be0e1a544f782db1f68012e8a59d58d79294583db0
-
Filesize
224B
MD55d6d2012844d0b4fbf0788cea3c58be1
SHA17cf362355522c1898e2adbaa4c3c03d51cb2c7eb
SHA256cad2af09bad740a380278fca5f5af5a841b361d06b3a0655ac3754cacc98a1d9
SHA51292144286878e5dc84556af6c2eeaaa7e3f5f8afd2c9ca7dd41508772600243196c8738aae428ca605712100004561a0b90c4ac56993a996827e8d57daf94eb31
-
Filesize
224B
MD5cac5ef81f2115e2f54acbda0b1c11f4e
SHA1fe57978906f50fec19d1ba6d6d634e234eabbabf
SHA256791f4f7d77e7061f495ae3270888ab5a098e1f78ad46d99f020bfb122ca5fbd6
SHA5123630fbd03bd404c5d0e8276c93bdd44e508725996cb8d44e5880ee8606433bbf8f553ada867af4c779affd778d6f0298f9ebfeb47618a27bd856f8a33bbe461c
-
Filesize
224B
MD5dca05ff9581feec28c6840c81a0da44a
SHA10c83850e346430270e4993fd146a16d5b3b7b92c
SHA25603ac9cd06d0cdc9bd223ece7f730211118163965a6fa5bf45aa6c2701774f3e3
SHA512789c1c52a024de48002b38f63c1900dcc91581bcb6b85b99c2e98c4efba1f700f0f0e70a2b7af79aeb09f9218ce27c45327957ea937b5cf1d370cb9aa0da346b
-
Filesize
224B
MD5075c118059b5f856e4f994df14cd7b1d
SHA1e0c6d7c3400c271b18ba19fb6308502d494a1136
SHA256c5f8036717ecc9768dff59000dd742edf3b217e86657264366f29a48e652e4f4
SHA5122ab06821108e10683013d7d336622c7272ba0d7526dad9c564f905b546ab82e93810303a6b58e180b0648f88a0cc61ee4ed6501d7e18d6984e10c268fb2b98fe
-
Filesize
224B
MD5533b1cac4fb24c73b551961a633a306a
SHA11d80984c90304618fb5d8c3d7df586dfba503a6a
SHA256ab4e4b563850fff4705a2b96ad5f3261ca6b1c5800e73c5be7cfa86729b3e6dd
SHA512a2103bba25eeac18af5d25f8b8f2b22c23d4dcd03522d36272239afeeb5bd6c93996f82290ebbf42a4e483fe74f98eb800894ca214835fc6f401c8c8a17ee754
-
Filesize
224B
MD5631dc9da6e27d62aed35ab21485b975b
SHA10d995a222b8d8027d3731cff644471e7a0aa9ea7
SHA256a9d54fdbccd167e6945301be0d509226b35d118e653dbd9c22c7fead9508548c
SHA512b65e08bd342020e64294ebeebab3c7f3f562fff504709abff22373f3445f57effb68502040fe65d7de64c1c3ad52358d263ae7fd63b042c6c5b1616eded004cd
-
Filesize
224B
MD5e080a3a3c8f4e6aa71e929cb633abf5b
SHA1e4f62e253210859f4559a8a60d626593a94b0b41
SHA256b0addb81caa2bdf8a7a13a7b3ecb28659b7ffcc1ba79b93d285d26b8651ab502
SHA512cfeb75ea3f7ed2fd21c6f42fab2511e98b619c5dd874cf9285abd3127cac58de0c91563354415602870bcf613794faa4be43efd5c443625abf196ef96925e7a2
-
Filesize
224B
MD54b3b6cc557f0ab4138672749d9316a3e
SHA125e9511f256db947eb3b25b4913a224b4c4d9d12
SHA2566ab9d59d783095087b1629c7bad89302057ef0cce72cd8a7f4a476d60efa52ea
SHA512c296a58dec0b626e8c03a845c7ffe4b6b108864ed7d8464ca9029af9cc3aaf7f81d7773a654acdeb597194e3e223912df3494d401254424686071a67104aa9cd
-
Filesize
224B
MD5e1188c9ad3bff0b9142d8c4538332c6e
SHA131fc634d1830783a2e38ae81e0dddcc9d49b7653
SHA2565eb51cf4c84d87b7884babd06495924a6fc4f5eb4e15da848ee2c449d02dec63
SHA512fedcb446f8ca8bbc000778dab56b786dd40e676afcd05a515cfe476f5bb0cd926a9695976ca1e1275fe9a91d187bb70a6c147b0d392c87fd51d25d69470aee23
-
Filesize
224B
MD57a51d829c5547a776a89ca71fd868c4c
SHA144bf718881ae44006e755af7d6f43570659f85ac
SHA256b1b301450193480824fd1ffb468ad4dc6b0190b1f941198260d5a8ab8e713e8b
SHA512cda06b4cb9957768d2a6c520d6841cd3a26a860739445c045d9da7424ef35889e3fefc7194c8d620dd8fc708934dc9538b070274fb400a6f8f7ec58809c4155a
-
Filesize
224B
MD533043f375224f96fb87c229cefc198a2
SHA1e5056194a8f82a3cf25693208ef334fdd78a048f
SHA25643aab969fbbe796db4391affe3c5b1047c609fcd36450107b993b3e78efebec8
SHA5120cb95c30f25109c7f6b458e855ae91480b3cbfaf35924b33eb8cf3bba7c23e998f26c5e9a650b73aeba579256a29be25e40a33b563b587f71b52ca3176860047
-
Filesize
224B
MD5f6bde53fe1586f64097414c51a46a3c8
SHA1fdb744c8054d71c3545a547bdf3374fbb4a1146c
SHA256346b7236f4f1dd1016e60d44d8b7c451c0866876ef92aec52eb8418558f56848
SHA51210d56f1a77f9ffa4ba61e27715f4376c5964dda9e0397a498cf1e45a04c90e797677a02b410a5033d1d4582b7376b61109092e098b03e546ad3bd744962e8476
-
Filesize
224B
MD511ad563027075389e695e819f7063b12
SHA15a92a4aa705fa9cdb05afd2eed3953903a2d9bc2
SHA256353ea527a189e5aa1dc78349b984d4ae6105d45d5149d4e2cd98f0776f06e102
SHA5126c540f20eb7bb586f1a838323aa756fa64127d8c49b47e7977f933aaf9dde4744b0ea9f2f3ee163b5a1f29ae9bef323e54c44134d09c3d7166f21b1d4295a886
-
Filesize
349KB
MD51ec86aa544089409730a3777da35c70a
SHA1b592008ecc06d47bd7170f0ad3799e114139df0f
SHA2565d533976a3ac74eede22a42c2776ce3a392596b98c5ef0e6bed98b6395fb0c48
SHA512fbd7a000b74f0488039aa9213d56cf464b55629c9c649bde2835216f699f51f921d417d090e7e2e0d6e7c10a07c4b767ada82a8ac45fcfc10c950163f2df9715