Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
596s -
max time network
606s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 07:35
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 11 IoCs
Processes:
resource yara_rule behavioral1/memory/2036-1-0x0000000001170000-0x00000000011DC000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral1/memory/1472-12-0x0000000000C60000-0x0000000000CCC000-memory.dmp family_quasar behavioral1/memory/1400-29-0x00000000003F0000-0x000000000045C000-memory.dmp family_quasar behavioral1/memory/604-41-0x0000000000CC0000-0x0000000000D2C000-memory.dmp family_quasar behavioral1/memory/1968-53-0x0000000001000000-0x000000000106C000-memory.dmp family_quasar behavioral1/memory/2800-65-0x00000000010C0000-0x000000000112C000-memory.dmp family_quasar behavioral1/memory/900-77-0x00000000010C0000-0x000000000112C000-memory.dmp family_quasar behavioral1/memory/1528-89-0x00000000010C0000-0x000000000112C000-memory.dmp family_quasar behavioral1/memory/2192-101-0x00000000012C0000-0x000000000132C000-memory.dmp family_quasar behavioral1/memory/2768-113-0x0000000000130000-0x000000000019C000-memory.dmp family_quasar -
Executes dropped EXE 9 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 1472 Client.exe 1400 Client.exe 604 Client.exe 1968 Client.exe 2800 Client.exe 900 Client.exe 1528 Client.exe 2192 Client.exe 2768 Client.exe -
Loads dropped DLL 9 IoCs
Processes:
Uni - Copy (10) - Copy - Copy - Copy - Copy.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exepid process 2036 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe 988 cmd.exe 556 cmd.exe 2376 cmd.exe 1684 cmd.exe 1300 cmd.exe 2520 cmd.exe 668 cmd.exe 2988 cmd.exe -
Looks up external IP address via web service 20 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 39 ip-api.com 41 api.ipify.org 51 ip-api.com 2 ip-api.com 27 ip-api.com 29 api.ipify.org 33 ip-api.com 57 ip-api.com 59 api.ipify.org 6 api.ipify.org 8 ip-api.com 15 ip-api.com 17 api.ipify.org 45 ip-api.com 35 api.ipify.org 47 api.ipify.org 53 api.ipify.org 11 api.ipify.org 21 ip-api.com 23 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1600 schtasks.exe 1884 SCHTASKS.exe 1300 schtasks.exe 2668 schtasks.exe 1616 schtasks.exe 1180 schtasks.exe 1884 schtasks.exe 2860 schtasks.exe 1452 schtasks.exe 296 schtasks.exe -
Runs ping.exe 1 TTPs 8 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 1440 PING.EXE 1848 PING.EXE 2460 PING.EXE 2216 PING.EXE 1748 PING.EXE 2268 PING.EXE 896 PING.EXE 2792 PING.EXE -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
Uni - Copy (10) - Copy - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 2036 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe Token: SeDebugPrivilege 1472 Client.exe Token: SeDebugPrivilege 1400 Client.exe Token: SeDebugPrivilege 604 Client.exe Token: SeDebugPrivilege 1968 Client.exe Token: SeDebugPrivilege 2800 Client.exe Token: SeDebugPrivilege 900 Client.exe Token: SeDebugPrivilege 1528 Client.exe Token: SeDebugPrivilege 2192 Client.exe Token: SeDebugPrivilege 2768 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (10) - Copy - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 2036 wrote to memory of 1600 2036 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe schtasks.exe PID 2036 wrote to memory of 1600 2036 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe schtasks.exe PID 2036 wrote to memory of 1600 2036 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe schtasks.exe PID 2036 wrote to memory of 1600 2036 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe schtasks.exe PID 2036 wrote to memory of 1472 2036 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe Client.exe PID 2036 wrote to memory of 1472 2036 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe Client.exe PID 2036 wrote to memory of 1472 2036 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe Client.exe PID 2036 wrote to memory of 1472 2036 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe Client.exe PID 2036 wrote to memory of 1472 2036 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe Client.exe PID 2036 wrote to memory of 1472 2036 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe Client.exe PID 2036 wrote to memory of 1472 2036 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe Client.exe PID 2036 wrote to memory of 1884 2036 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe SCHTASKS.exe PID 2036 wrote to memory of 1884 2036 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe SCHTASKS.exe PID 2036 wrote to memory of 1884 2036 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe SCHTASKS.exe PID 2036 wrote to memory of 1884 2036 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe SCHTASKS.exe PID 1472 wrote to memory of 1452 1472 Client.exe schtasks.exe PID 1472 wrote to memory of 1452 1472 Client.exe schtasks.exe PID 1472 wrote to memory of 1452 1472 Client.exe schtasks.exe PID 1472 wrote to memory of 1452 1472 Client.exe schtasks.exe PID 1472 wrote to memory of 988 1472 Client.exe cmd.exe PID 1472 wrote to memory of 988 1472 Client.exe cmd.exe PID 1472 wrote to memory of 988 1472 Client.exe cmd.exe PID 1472 wrote to memory of 988 1472 Client.exe cmd.exe PID 988 wrote to memory of 2248 988 cmd.exe chcp.com PID 988 wrote to memory of 2248 988 cmd.exe chcp.com PID 988 wrote to memory of 2248 988 cmd.exe chcp.com PID 988 wrote to memory of 2248 988 cmd.exe chcp.com PID 988 wrote to memory of 2460 988 cmd.exe PING.EXE PID 988 wrote to memory of 2460 988 cmd.exe PING.EXE PID 988 wrote to memory of 2460 988 cmd.exe PING.EXE PID 988 wrote to memory of 2460 988 cmd.exe PING.EXE PID 988 wrote to memory of 1400 988 cmd.exe Client.exe PID 988 wrote to memory of 1400 988 cmd.exe Client.exe PID 988 wrote to memory of 1400 988 cmd.exe Client.exe PID 988 wrote to memory of 1400 988 cmd.exe Client.exe PID 988 wrote to memory of 1400 988 cmd.exe Client.exe PID 988 wrote to memory of 1400 988 cmd.exe Client.exe PID 988 wrote to memory of 1400 988 cmd.exe Client.exe PID 1400 wrote to memory of 1300 1400 Client.exe schtasks.exe PID 1400 wrote to memory of 1300 1400 Client.exe schtasks.exe PID 1400 wrote to memory of 1300 1400 Client.exe schtasks.exe PID 1400 wrote to memory of 1300 1400 Client.exe schtasks.exe PID 1400 wrote to memory of 556 1400 Client.exe cmd.exe PID 1400 wrote to memory of 556 1400 Client.exe cmd.exe PID 1400 wrote to memory of 556 1400 Client.exe cmd.exe PID 1400 wrote to memory of 556 1400 Client.exe cmd.exe PID 556 wrote to memory of 1724 556 cmd.exe chcp.com PID 556 wrote to memory of 1724 556 cmd.exe chcp.com PID 556 wrote to memory of 1724 556 cmd.exe chcp.com PID 556 wrote to memory of 1724 556 cmd.exe chcp.com PID 556 wrote to memory of 2216 556 cmd.exe PING.EXE PID 556 wrote to memory of 2216 556 cmd.exe PING.EXE PID 556 wrote to memory of 2216 556 cmd.exe PING.EXE PID 556 wrote to memory of 2216 556 cmd.exe PING.EXE PID 556 wrote to memory of 604 556 cmd.exe Client.exe PID 556 wrote to memory of 604 556 cmd.exe Client.exe PID 556 wrote to memory of 604 556 cmd.exe Client.exe PID 556 wrote to memory of 604 556 cmd.exe Client.exe PID 556 wrote to memory of 604 556 cmd.exe Client.exe PID 556 wrote to memory of 604 556 cmd.exe Client.exe PID 556 wrote to memory of 604 556 cmd.exe Client.exe PID 604 wrote to memory of 2668 604 Client.exe schtasks.exe PID 604 wrote to memory of 2668 604 Client.exe schtasks.exe PID 604 wrote to memory of 2668 604 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RXtPsbPilh9s.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\rMCeosPiis86.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\dshKx8Zjextn.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\FngBrVSHQZiD.bat" "9⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\iBtlRAP7UcFv.bat" "11⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\QcqBuU43T0e9.bat" "13⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OE0T3p8dFWF3.bat" "15⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\r48SlqIwhVvB.bat" "17⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (10) - Copy - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\FngBrVSHQZiD.batFilesize
207B
MD557e5a3afb668b5e55ed7cf7245a5869c
SHA1c27243461e36321fdff6e167dc4aea877fe9f1d9
SHA2560cb07d87f4aa416a479908d4be5150f74d9765060bb22183351eef2729672c97
SHA512c10eac870855ed90c87f81b6fe761a2435df3a89111c1f1502fef27729a5f3bde86871b1b522f385c2aadcaf9143f5eb5b0b639cb7069173065f60f2f60b88cc
-
C:\Users\Admin\AppData\Local\Temp\OE0T3p8dFWF3.batFilesize
207B
MD53d88c76e7cda9a76abbdb116d414a3b0
SHA1ee2243d2062f01c99b65550229ad7008c3a62558
SHA2569250da996d8824c34dcf5e97701c8bcd1608740470fd1a15136f7e0b69debdab
SHA512b36ae36a24c937e8da751c6519bd0d5f75be3c8f62b848bd1d122cd68bacf0b676d299932fc624ac017dfdbf7d2f758c2c8a41eaa26e52e2aa8b18f8ce566b8b
-
C:\Users\Admin\AppData\Local\Temp\QcqBuU43T0e9.batFilesize
207B
MD52214599556c8cac2e91e50c84cba8aae
SHA178c4fbea1110ccecfafe82fdd335ac97949c6a9b
SHA256fd28ab5fcd797ad970bc9131ad5d8190c3f1c2bd29f314437eae8a52a4e753ca
SHA51216bcf21c4e3532f3473d787f2de6c75d4b6d4f59f1e0934075c7e7fbc9639c8e8990c2f4ee1f7c012fa955badb1d859cf1ce8433b73c34fa660cbb0834a96c00
-
C:\Users\Admin\AppData\Local\Temp\RXtPsbPilh9s.batFilesize
207B
MD53e33e64e95922c6ec5f3ac7cd40116de
SHA1ba9649896266f34df6778fe1627d7024545c3177
SHA256e7eb70fec0b356731e05c2edb42c3cd3b69c10f87cb7c23e79dadcc4dd7d7f6b
SHA512b693935f26207faa89930ac874bd13293712ce97c526d3c22e0538da0261776e892cfc859d4a157ec6c690101b52f8e1bfae8867348a7832c95b78b9f21c928e
-
C:\Users\Admin\AppData\Local\Temp\dshKx8Zjextn.batFilesize
207B
MD57777c6947d22b90ba2e315317392eac0
SHA1cc598d46437c2eae37ecd887a5cf9975658dd8d4
SHA256ea5a6c8e648837b3c32054a8e840b979ad5372311de748a0fdf245b01a7dd09f
SHA512265751536a0fd9be1a6eb62784660856ecb7fd1f5173a54d0f5cf5de2112014fc8f8f7393328e2204a2a431a7dc30eb212c9123c906de79ce5fd7a8bacb03586
-
C:\Users\Admin\AppData\Local\Temp\iBtlRAP7UcFv.batFilesize
207B
MD55d0f55b33595f4a9f801a0fab497264e
SHA125371ad8bcba3a3c3e4a024f1704cf47b4939a65
SHA256d71fc8eed9d7ac6cc057100deea8266995ceeaa62029543b68820836b6a92217
SHA512654bb2769a24f2049125acdaad8868ff4ce3c24607d45b46cc479f0c17ff8b71bc6e0a86ece5589384697d36af20d10501dc34d7afcccee904405a08aabe5f6b
-
C:\Users\Admin\AppData\Local\Temp\r48SlqIwhVvB.batFilesize
207B
MD5df8602e44c9d0b24472e59b472af30cd
SHA1bb17cdf08d347ce9ed8e78bf3ec3737909c0c695
SHA2564a3cd8c1ecb3f6c4fa053c156d31135dd0bfd60dd93e46c12d22004aa352080b
SHA512e5559d5be8e3dec0adb01fa64e7ae8ce38ebf6f7c673959a61159311a3bb3709ba979744bfe3c9156a1018b9649e36b1fc9d64d2e193ffb827fd12578e793aa9
-
C:\Users\Admin\AppData\Local\Temp\rMCeosPiis86.batFilesize
207B
MD520154a4fac181fbe86dc94fa39873dda
SHA11c764c718f93eb3426396d6a99e79af37e73cec7
SHA256c2925d5266f325ccbcb8499e349ce427d5ad12b562a925d3290b5cb8eba9f4ae
SHA512c26b17d67b37d1fed933fa443c1ca9bef93ac5033767a3a48ed710984ce6f4316274eb45e75c11f03763a4c27046e6ed7344cee9c203fabb2296e11b7e7c1c30
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/604-41-0x0000000000CC0000-0x0000000000D2C000-memory.dmpFilesize
432KB
-
memory/900-77-0x00000000010C0000-0x000000000112C000-memory.dmpFilesize
432KB
-
memory/1400-29-0x00000000003F0000-0x000000000045C000-memory.dmpFilesize
432KB
-
memory/1472-12-0x0000000000C60000-0x0000000000CCC000-memory.dmpFilesize
432KB
-
memory/1472-25-0x00000000746F0000-0x0000000074DDE000-memory.dmpFilesize
6.9MB
-
memory/1472-16-0x00000000746F0000-0x0000000074DDE000-memory.dmpFilesize
6.9MB
-
memory/1472-14-0x00000000746F0000-0x0000000074DDE000-memory.dmpFilesize
6.9MB
-
memory/1472-13-0x00000000746F0000-0x0000000074DDE000-memory.dmpFilesize
6.9MB
-
memory/1528-89-0x00000000010C0000-0x000000000112C000-memory.dmpFilesize
432KB
-
memory/1968-53-0x0000000001000000-0x000000000106C000-memory.dmpFilesize
432KB
-
memory/2036-4-0x00000000746F0000-0x0000000074DDE000-memory.dmpFilesize
6.9MB
-
memory/2036-0-0x00000000746FE000-0x00000000746FF000-memory.dmpFilesize
4KB
-
memory/2036-3-0x00000000746FE000-0x00000000746FF000-memory.dmpFilesize
4KB
-
memory/2036-15-0x00000000746F0000-0x0000000074DDE000-memory.dmpFilesize
6.9MB
-
memory/2036-2-0x00000000746F0000-0x0000000074DDE000-memory.dmpFilesize
6.9MB
-
memory/2036-1-0x0000000001170000-0x00000000011DC000-memory.dmpFilesize
432KB
-
memory/2192-101-0x00000000012C0000-0x000000000132C000-memory.dmpFilesize
432KB
-
memory/2768-113-0x0000000000130000-0x000000000019C000-memory.dmpFilesize
432KB
-
memory/2800-65-0x00000000010C0000-0x000000000112C000-memory.dmpFilesize
432KB