Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
597s -
max time network
607s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 07:35
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 11 IoCs
Processes:
resource yara_rule behavioral11/memory/2204-1-0x0000000001010000-0x000000000107C000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral11/memory/1156-13-0x00000000011B0000-0x000000000121C000-memory.dmp family_quasar behavioral11/memory/2132-29-0x0000000000220000-0x000000000028C000-memory.dmp family_quasar behavioral11/memory/1736-41-0x0000000000A60000-0x0000000000ACC000-memory.dmp family_quasar behavioral11/memory/2804-53-0x0000000000C60000-0x0000000000CCC000-memory.dmp family_quasar behavioral11/memory/2020-65-0x0000000000D30000-0x0000000000D9C000-memory.dmp family_quasar behavioral11/memory/544-77-0x0000000000100000-0x000000000016C000-memory.dmp family_quasar behavioral11/memory/2488-89-0x0000000000940000-0x00000000009AC000-memory.dmp family_quasar behavioral11/memory/752-101-0x0000000000FB0000-0x000000000101C000-memory.dmp family_quasar behavioral11/memory/2412-113-0x0000000000FB0000-0x000000000101C000-memory.dmp family_quasar -
Executes dropped EXE 9 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 1156 Client.exe 2132 Client.exe 1736 Client.exe 2804 Client.exe 2020 Client.exe 544 Client.exe 2488 Client.exe 752 Client.exe 2412 Client.exe -
Loads dropped DLL 9 IoCs
Processes:
Uni - Copy (100) - Copy - Copy - Copy.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exepid process 2204 Uni - Copy (100) - Copy - Copy - Copy.exe 2652 cmd.exe 1640 cmd.exe 2580 cmd.exe 2868 cmd.exe 1812 cmd.exe 2992 cmd.exe 2212 cmd.exe 2468 cmd.exe -
Looks up external IP address via web service 20 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 23 api.ipify.org 29 api.ipify.org 33 ip-api.com 45 ip-api.com 8 ip-api.com 15 ip-api.com 21 ip-api.com 35 api.ipify.org 47 api.ipify.org 6 api.ipify.org 17 api.ipify.org 39 ip-api.com 51 ip-api.com 53 api.ipify.org 57 ip-api.com 59 api.ipify.org 2 ip-api.com 11 api.ipify.org 27 ip-api.com 41 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2444 schtasks.exe 1088 SCHTASKS.exe 2868 schtasks.exe 1812 schtasks.exe 2180 schtasks.exe 2992 schtasks.exe 1076 schtasks.exe 2028 schtasks.exe 1904 schtasks.exe 1612 schtasks.exe -
Runs ping.exe 1 TTPs 8 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 1052 PING.EXE 824 PING.EXE 1936 PING.EXE 2300 PING.EXE 2604 PING.EXE 2648 PING.EXE 928 PING.EXE 996 PING.EXE -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
Uni - Copy (100) - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 2204 Uni - Copy (100) - Copy - Copy - Copy.exe Token: SeDebugPrivilege 1156 Client.exe Token: SeDebugPrivilege 2132 Client.exe Token: SeDebugPrivilege 1736 Client.exe Token: SeDebugPrivilege 2804 Client.exe Token: SeDebugPrivilege 2020 Client.exe Token: SeDebugPrivilege 544 Client.exe Token: SeDebugPrivilege 2488 Client.exe Token: SeDebugPrivilege 752 Client.exe Token: SeDebugPrivilege 2412 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (100) - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 2204 wrote to memory of 2444 2204 Uni - Copy (100) - Copy - Copy - Copy.exe schtasks.exe PID 2204 wrote to memory of 2444 2204 Uni - Copy (100) - Copy - Copy - Copy.exe schtasks.exe PID 2204 wrote to memory of 2444 2204 Uni - Copy (100) - Copy - Copy - Copy.exe schtasks.exe PID 2204 wrote to memory of 2444 2204 Uni - Copy (100) - Copy - Copy - Copy.exe schtasks.exe PID 2204 wrote to memory of 1156 2204 Uni - Copy (100) - Copy - Copy - Copy.exe Client.exe PID 2204 wrote to memory of 1156 2204 Uni - Copy (100) - Copy - Copy - Copy.exe Client.exe PID 2204 wrote to memory of 1156 2204 Uni - Copy (100) - Copy - Copy - Copy.exe Client.exe PID 2204 wrote to memory of 1156 2204 Uni - Copy (100) - Copy - Copy - Copy.exe Client.exe PID 2204 wrote to memory of 1156 2204 Uni - Copy (100) - Copy - Copy - Copy.exe Client.exe PID 2204 wrote to memory of 1156 2204 Uni - Copy (100) - Copy - Copy - Copy.exe Client.exe PID 2204 wrote to memory of 1156 2204 Uni - Copy (100) - Copy - Copy - Copy.exe Client.exe PID 2204 wrote to memory of 1088 2204 Uni - Copy (100) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2204 wrote to memory of 1088 2204 Uni - Copy (100) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2204 wrote to memory of 1088 2204 Uni - Copy (100) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2204 wrote to memory of 1088 2204 Uni - Copy (100) - Copy - Copy - Copy.exe SCHTASKS.exe PID 1156 wrote to memory of 2868 1156 Client.exe schtasks.exe PID 1156 wrote to memory of 2868 1156 Client.exe schtasks.exe PID 1156 wrote to memory of 2868 1156 Client.exe schtasks.exe PID 1156 wrote to memory of 2868 1156 Client.exe schtasks.exe PID 1156 wrote to memory of 2652 1156 Client.exe cmd.exe PID 1156 wrote to memory of 2652 1156 Client.exe cmd.exe PID 1156 wrote to memory of 2652 1156 Client.exe cmd.exe PID 1156 wrote to memory of 2652 1156 Client.exe cmd.exe PID 2652 wrote to memory of 1288 2652 cmd.exe chcp.com PID 2652 wrote to memory of 1288 2652 cmd.exe chcp.com PID 2652 wrote to memory of 1288 2652 cmd.exe chcp.com PID 2652 wrote to memory of 1288 2652 cmd.exe chcp.com PID 2652 wrote to memory of 1936 2652 cmd.exe PING.EXE PID 2652 wrote to memory of 1936 2652 cmd.exe PING.EXE PID 2652 wrote to memory of 1936 2652 cmd.exe PING.EXE PID 2652 wrote to memory of 1936 2652 cmd.exe PING.EXE PID 2652 wrote to memory of 2132 2652 cmd.exe Client.exe PID 2652 wrote to memory of 2132 2652 cmd.exe Client.exe PID 2652 wrote to memory of 2132 2652 cmd.exe Client.exe PID 2652 wrote to memory of 2132 2652 cmd.exe Client.exe PID 2652 wrote to memory of 2132 2652 cmd.exe Client.exe PID 2652 wrote to memory of 2132 2652 cmd.exe Client.exe PID 2652 wrote to memory of 2132 2652 cmd.exe Client.exe PID 2132 wrote to memory of 1812 2132 Client.exe schtasks.exe PID 2132 wrote to memory of 1812 2132 Client.exe schtasks.exe PID 2132 wrote to memory of 1812 2132 Client.exe schtasks.exe PID 2132 wrote to memory of 1812 2132 Client.exe schtasks.exe PID 2132 wrote to memory of 1640 2132 Client.exe cmd.exe PID 2132 wrote to memory of 1640 2132 Client.exe cmd.exe PID 2132 wrote to memory of 1640 2132 Client.exe cmd.exe PID 2132 wrote to memory of 1640 2132 Client.exe cmd.exe PID 1640 wrote to memory of 568 1640 cmd.exe chcp.com PID 1640 wrote to memory of 568 1640 cmd.exe chcp.com PID 1640 wrote to memory of 568 1640 cmd.exe chcp.com PID 1640 wrote to memory of 568 1640 cmd.exe chcp.com PID 1640 wrote to memory of 2300 1640 cmd.exe PING.EXE PID 1640 wrote to memory of 2300 1640 cmd.exe PING.EXE PID 1640 wrote to memory of 2300 1640 cmd.exe PING.EXE PID 1640 wrote to memory of 2300 1640 cmd.exe PING.EXE PID 1640 wrote to memory of 1736 1640 cmd.exe Client.exe PID 1640 wrote to memory of 1736 1640 cmd.exe Client.exe PID 1640 wrote to memory of 1736 1640 cmd.exe Client.exe PID 1640 wrote to memory of 1736 1640 cmd.exe Client.exe PID 1640 wrote to memory of 1736 1640 cmd.exe Client.exe PID 1640 wrote to memory of 1736 1640 cmd.exe Client.exe PID 1640 wrote to memory of 1736 1640 cmd.exe Client.exe PID 1736 wrote to memory of 2992 1736 Client.exe schtasks.exe PID 1736 wrote to memory of 2992 1736 Client.exe schtasks.exe PID 1736 wrote to memory of 2992 1736 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (100) - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (100) - Copy - Copy - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (100) - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ErOvjtpXDqIm.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\EWocV6IiHNeB.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Jigx5aTSfYVU.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\NqonnsIQdqhC.bat" "9⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2mbOUzLHwGDW.bat" "11⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\vsn85OdSU0Ec.bat" "13⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\vz7EzwI7wUiR.bat" "15⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CHfCZWMPA6Pw.bat" "17⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (100) - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (100) - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2mbOUzLHwGDW.batFilesize
207B
MD5ca57e341ac6dfb3c390e6338c5beddc7
SHA114dc97562760e5ed51ceb6c5731e70835d4f0fc4
SHA25634811e6c0be0a141d75cf982cf1fcd60ad5d86026e6a168554b054c371fa6af7
SHA51244f907511b2ddc531c224e6e706e5d67739c95f1187d2f8325bb3e7e7353f955dfcde101f6d7fc7ca16164a0a98e6869afdfc92d852c1d0c2ab956d91cd8876c
-
C:\Users\Admin\AppData\Local\Temp\CHfCZWMPA6Pw.batFilesize
207B
MD5f9a84f0631ca0d0ce77138b1c81ed1a0
SHA1670fa4710e84b332f135e922a5aaefa0eea80ded
SHA2563c5e0684afc2a87a8ed5ea539fe988d5c8402d08bfcca95f9648c3e85e6c75bf
SHA512695b1620d16b32fd7bc4f31c5dbcd147cc952693fff37dece6db22acfa51625e0e95e2906adc6dcc80c61a917883f502bfaaa89483be2cfaafe0c219060e5667
-
C:\Users\Admin\AppData\Local\Temp\EWocV6IiHNeB.batFilesize
207B
MD53570cb0b9d720908e808ff43f68b0653
SHA1e456fc4c21b1d28b779d77ee69f791bdb6fc37db
SHA256360fd3525acaa03022713725329983f7bdbe25d5936b12c745f9d84aec804f35
SHA512e1763deff63ac5f1f47771cc8c716962d24a8cf2850249f1c88d019c8d526bfe0058dec903fa3dc6985a6097df060b3845b372dd616271a054e8fff00b1d0974
-
C:\Users\Admin\AppData\Local\Temp\ErOvjtpXDqIm.batFilesize
207B
MD5da255af32ff6f2755fa8c493f703e129
SHA16aacd2cbbe53f447d0fa9926e7741d6297853f71
SHA256b6bb76e5a0fabaaf06972bb017890d7328ee6c472213e1f1cee69dc440239099
SHA512f1807ea482ad3ee74b1fa356acd8653bc00a9245246897bd4278b47ce2a541068a5ba649dd4d511377df9f8a694782328afe2742b9375e2650da3e5d8f263b92
-
C:\Users\Admin\AppData\Local\Temp\Jigx5aTSfYVU.batFilesize
207B
MD560baf18f8e86fa20850068616bfe389a
SHA14a505d0c36179a7bb226f0320ddd57b9dc6b784e
SHA256623ad67b1fbc6b652c0d554c8ec24bc50932df1fddf57065e523c1bc266701a9
SHA512dc73bf79665fc7323623b8861ee1160ac7a9fe05d47e07273678a38111716f70828157624e8f38f73b654374e59ad51174b5e390082829a2ba820d126f4b2776
-
C:\Users\Admin\AppData\Local\Temp\NqonnsIQdqhC.batFilesize
207B
MD5cd23c31300ea699f1feb36babcc281a0
SHA1b312632f769c3050dd85ca149479d4219247e7e8
SHA256f685df3da416e0a8f699389a893d6c0635dbf7de598200fb0252e1951a3d5e5c
SHA512f8ecdd7b3ee20cb2a0bb2d492cd3d62524893fa677523df8a454093c8205f7cb24f0ed3d4ad0afdc55d2184f1e85a145ec1bd81648a0c6b3ac37d1b2e5506674
-
C:\Users\Admin\AppData\Local\Temp\vsn85OdSU0Ec.batFilesize
207B
MD5ac3a76ae77f0a1f6ed4a630fa1f7cb07
SHA1dc29935eae838d3fe8692aa6616f9d927847f5e4
SHA256d1d67306bd96f14ac8e4704b3c1c21054b65c893c60cdf3f1c68cc337bde9fa2
SHA512e868f5300321affe68cc34bd70134c7d599f95f46ee7b00c091a3dc3ed6d3f9378c4d250ae6f55a21cc654f93be5b361d88a664284de7e199bc623cebce760d3
-
C:\Users\Admin\AppData\Local\Temp\vz7EzwI7wUiR.batFilesize
207B
MD5b5ea9559194603e8d0eb78667d3706d4
SHA1f36af3c9f2dda4219cfdfe519f9116fd1d32c8e4
SHA256c2a5e5b74e84de7825d17b9c7cb295b6c94309e8b449b3f73ad66c7c2c1d529b
SHA512d4bfc758f7172011bf2212352331354f7f3e8fcc524293af8cc3c1360b138052c64214203dc2ed877ae808622e444e2c8ed61c0c4345e463caba7631b15440b6
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/544-77-0x0000000000100000-0x000000000016C000-memory.dmpFilesize
432KB
-
memory/752-101-0x0000000000FB0000-0x000000000101C000-memory.dmpFilesize
432KB
-
memory/1156-12-0x0000000074B10000-0x00000000751FE000-memory.dmpFilesize
6.9MB
-
memory/1156-13-0x00000000011B0000-0x000000000121C000-memory.dmpFilesize
432KB
-
memory/1156-16-0x0000000074B10000-0x00000000751FE000-memory.dmpFilesize
6.9MB
-
memory/1156-14-0x0000000074B10000-0x00000000751FE000-memory.dmpFilesize
6.9MB
-
memory/1156-25-0x0000000074B10000-0x00000000751FE000-memory.dmpFilesize
6.9MB
-
memory/1736-41-0x0000000000A60000-0x0000000000ACC000-memory.dmpFilesize
432KB
-
memory/2020-65-0x0000000000D30000-0x0000000000D9C000-memory.dmpFilesize
432KB
-
memory/2132-29-0x0000000000220000-0x000000000028C000-memory.dmpFilesize
432KB
-
memory/2204-0-0x0000000074B1E000-0x0000000074B1F000-memory.dmpFilesize
4KB
-
memory/2204-4-0x0000000074B10000-0x00000000751FE000-memory.dmpFilesize
6.9MB
-
memory/2204-3-0x0000000074B1E000-0x0000000074B1F000-memory.dmpFilesize
4KB
-
memory/2204-2-0x0000000074B10000-0x00000000751FE000-memory.dmpFilesize
6.9MB
-
memory/2204-15-0x0000000074B10000-0x00000000751FE000-memory.dmpFilesize
6.9MB
-
memory/2204-1-0x0000000001010000-0x000000000107C000-memory.dmpFilesize
432KB
-
memory/2412-113-0x0000000000FB0000-0x000000000101C000-memory.dmpFilesize
432KB
-
memory/2488-89-0x0000000000940000-0x00000000009AC000-memory.dmpFilesize
432KB
-
memory/2804-53-0x0000000000C60000-0x0000000000CCC000-memory.dmpFilesize
432KB