Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
596s -
max time network
606s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 07:35
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (100) - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 7 IoCs
Processes:
resource yara_rule behavioral13/memory/1924-1-0x0000000000C20000-0x0000000000C8C000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral13/memory/1636-12-0x0000000000D40000-0x0000000000DAC000-memory.dmp family_quasar behavioral13/memory/332-29-0x00000000013B0000-0x000000000141C000-memory.dmp family_quasar behavioral13/memory/1820-41-0x00000000013B0000-0x000000000141C000-memory.dmp family_quasar behavioral13/memory/1232-97-0x0000000000120000-0x000000000018C000-memory.dmp family_quasar behavioral13/memory/2380-109-0x0000000000D60000-0x0000000000DCC000-memory.dmp family_quasar -
Executes dropped EXE 9 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 1636 Client.exe 332 Client.exe 1820 Client.exe 1512 Client.exe 1764 Client.exe 2316 Client.exe 2632 Client.exe 1232 Client.exe 2380 Client.exe -
Loads dropped DLL 9 IoCs
Processes:
Uni - Copy (100) - Copy - Copy.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exepid process 1924 Uni - Copy (100) - Copy - Copy.exe 2688 cmd.exe 1084 cmd.exe 2636 cmd.exe 1256 cmd.exe 1408 cmd.exe 2600 cmd.exe 1964 cmd.exe 1732 cmd.exe -
Looks up external IP address via web service 20 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 59 api.ipify.org 17 api.ipify.org 21 ip-api.com 51 ip-api.com 39 ip-api.com 41 api.ipify.org 57 ip-api.com 11 api.ipify.org 23 api.ipify.org 33 ip-api.com 2 ip-api.com 15 ip-api.com 53 api.ipify.org 29 api.ipify.org 35 api.ipify.org 45 ip-api.com 47 api.ipify.org 6 api.ipify.org 8 ip-api.com 27 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2796 schtasks.exe 1836 schtasks.exe 2156 SCHTASKS.exe 2364 schtasks.exe 1524 schtasks.exe 1772 schtasks.exe 1872 schtasks.exe 2520 schtasks.exe 1952 schtasks.exe 2180 schtasks.exe -
Runs ping.exe 1 TTPs 8 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 1096 PING.EXE 1208 PING.EXE 1460 PING.EXE 1960 PING.EXE 1684 PING.EXE 992 PING.EXE 2504 PING.EXE 2628 PING.EXE -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
Uni - Copy (100) - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 1924 Uni - Copy (100) - Copy - Copy.exe Token: SeDebugPrivilege 1636 Client.exe Token: SeDebugPrivilege 332 Client.exe Token: SeDebugPrivilege 1820 Client.exe Token: SeDebugPrivilege 1512 Client.exe Token: SeDebugPrivilege 1764 Client.exe Token: SeDebugPrivilege 2316 Client.exe Token: SeDebugPrivilege 2632 Client.exe Token: SeDebugPrivilege 1232 Client.exe Token: SeDebugPrivilege 2380 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (100) - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 1924 wrote to memory of 2520 1924 Uni - Copy (100) - Copy - Copy.exe schtasks.exe PID 1924 wrote to memory of 2520 1924 Uni - Copy (100) - Copy - Copy.exe schtasks.exe PID 1924 wrote to memory of 2520 1924 Uni - Copy (100) - Copy - Copy.exe schtasks.exe PID 1924 wrote to memory of 2520 1924 Uni - Copy (100) - Copy - Copy.exe schtasks.exe PID 1924 wrote to memory of 1636 1924 Uni - Copy (100) - Copy - Copy.exe Client.exe PID 1924 wrote to memory of 1636 1924 Uni - Copy (100) - Copy - Copy.exe Client.exe PID 1924 wrote to memory of 1636 1924 Uni - Copy (100) - Copy - Copy.exe Client.exe PID 1924 wrote to memory of 1636 1924 Uni - Copy (100) - Copy - Copy.exe Client.exe PID 1924 wrote to memory of 1636 1924 Uni - Copy (100) - Copy - Copy.exe Client.exe PID 1924 wrote to memory of 1636 1924 Uni - Copy (100) - Copy - Copy.exe Client.exe PID 1924 wrote to memory of 1636 1924 Uni - Copy (100) - Copy - Copy.exe Client.exe PID 1924 wrote to memory of 2156 1924 Uni - Copy (100) - Copy - Copy.exe SCHTASKS.exe PID 1924 wrote to memory of 2156 1924 Uni - Copy (100) - Copy - Copy.exe SCHTASKS.exe PID 1924 wrote to memory of 2156 1924 Uni - Copy (100) - Copy - Copy.exe SCHTASKS.exe PID 1924 wrote to memory of 2156 1924 Uni - Copy (100) - Copy - Copy.exe SCHTASKS.exe PID 1636 wrote to memory of 2364 1636 Client.exe schtasks.exe PID 1636 wrote to memory of 2364 1636 Client.exe schtasks.exe PID 1636 wrote to memory of 2364 1636 Client.exe schtasks.exe PID 1636 wrote to memory of 2364 1636 Client.exe schtasks.exe PID 1636 wrote to memory of 2688 1636 Client.exe cmd.exe PID 1636 wrote to memory of 2688 1636 Client.exe cmd.exe PID 1636 wrote to memory of 2688 1636 Client.exe cmd.exe PID 1636 wrote to memory of 2688 1636 Client.exe cmd.exe PID 2688 wrote to memory of 2328 2688 cmd.exe chcp.com PID 2688 wrote to memory of 2328 2688 cmd.exe chcp.com PID 2688 wrote to memory of 2328 2688 cmd.exe chcp.com PID 2688 wrote to memory of 2328 2688 cmd.exe chcp.com PID 2688 wrote to memory of 1208 2688 cmd.exe PING.EXE PID 2688 wrote to memory of 1208 2688 cmd.exe PING.EXE PID 2688 wrote to memory of 1208 2688 cmd.exe PING.EXE PID 2688 wrote to memory of 1208 2688 cmd.exe PING.EXE PID 2688 wrote to memory of 332 2688 cmd.exe Client.exe PID 2688 wrote to memory of 332 2688 cmd.exe Client.exe PID 2688 wrote to memory of 332 2688 cmd.exe Client.exe PID 2688 wrote to memory of 332 2688 cmd.exe Client.exe PID 2688 wrote to memory of 332 2688 cmd.exe Client.exe PID 2688 wrote to memory of 332 2688 cmd.exe Client.exe PID 2688 wrote to memory of 332 2688 cmd.exe Client.exe PID 332 wrote to memory of 1524 332 Client.exe schtasks.exe PID 332 wrote to memory of 1524 332 Client.exe schtasks.exe PID 332 wrote to memory of 1524 332 Client.exe schtasks.exe PID 332 wrote to memory of 1524 332 Client.exe schtasks.exe PID 332 wrote to memory of 1084 332 Client.exe cmd.exe PID 332 wrote to memory of 1084 332 Client.exe cmd.exe PID 332 wrote to memory of 1084 332 Client.exe cmd.exe PID 332 wrote to memory of 1084 332 Client.exe cmd.exe PID 1084 wrote to memory of 2888 1084 cmd.exe chcp.com PID 1084 wrote to memory of 2888 1084 cmd.exe chcp.com PID 1084 wrote to memory of 2888 1084 cmd.exe chcp.com PID 1084 wrote to memory of 2888 1084 cmd.exe chcp.com PID 1084 wrote to memory of 1460 1084 cmd.exe PING.EXE PID 1084 wrote to memory of 1460 1084 cmd.exe PING.EXE PID 1084 wrote to memory of 1460 1084 cmd.exe PING.EXE PID 1084 wrote to memory of 1460 1084 cmd.exe PING.EXE PID 1084 wrote to memory of 1820 1084 cmd.exe Client.exe PID 1084 wrote to memory of 1820 1084 cmd.exe Client.exe PID 1084 wrote to memory of 1820 1084 cmd.exe Client.exe PID 1084 wrote to memory of 1820 1084 cmd.exe Client.exe PID 1084 wrote to memory of 1820 1084 cmd.exe Client.exe PID 1084 wrote to memory of 1820 1084 cmd.exe Client.exe PID 1084 wrote to memory of 1820 1084 cmd.exe Client.exe PID 1820 wrote to memory of 1952 1820 Client.exe schtasks.exe PID 1820 wrote to memory of 1952 1820 Client.exe schtasks.exe PID 1820 wrote to memory of 1952 1820 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (100) - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (100) - Copy - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (100) - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sADVVufWFxWI.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\zrFfrbRKK5GV.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\VGGzE1YTuwU6.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\s4lVMYO9LJlP.bat" "9⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\qgvmVuSj6pNK.bat" "11⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\hiO0C6O9Egjq.bat" "13⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\52YRMBm4Uuo9.bat" "15⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2ayCcKUspWkT.bat" "17⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (100) - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (100) - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2ayCcKUspWkT.batFilesize
207B
MD50b4500202563fcffbcd991fd614a9ab5
SHA1c4b14b3df095c69687b18bda7f86637fa312be97
SHA25670f7dfb9e35d0d9dae1da9ed31bf9d843801ab07a18bfb22870f6dc57f1e6e94
SHA512d20e0e235d84ff748f0f356ec749bda82a29d049eec6eb9a589f0f96a19316a6ab696aa8e92bf6d0679a281a40d5f29f0361311e59ff0952debd41d41e68f77a
-
C:\Users\Admin\AppData\Local\Temp\52YRMBm4Uuo9.batFilesize
207B
MD5cdb812d1ea5827e8bc70da24058655c5
SHA111acef92bb12278b8610bf2583cb894df375c522
SHA2562f836e0a084086134def59363a6e627e00def7044fd5c3be2248c004da5b76fa
SHA5129169f61373288c74f2686b71625d928ac216fb357ae0464d327b7fc80ee32a4f4622ddf6b05880f27ad507536bf5eb1bad89ae43267f69a1db6c2c059b7734eb
-
C:\Users\Admin\AppData\Local\Temp\VGGzE1YTuwU6.batFilesize
207B
MD51cbfe735f208063f2edd8554c18268ed
SHA12e7d0b6c926f1f7262b0d92b4259b1d01bff642d
SHA256ea51aa882ffd3fd202182ba9217dd41c63ac5763a61b3bd0a0c39590f7dc5b28
SHA512e1cf2d854635a3b36da6b1ff48eebb08698d5f2fd43df69abe975ea1139b14caa3204e03221f94cab567b11f9bf4015ae914f73def15dc46a581f2a53730040f
-
C:\Users\Admin\AppData\Local\Temp\hiO0C6O9Egjq.batFilesize
207B
MD551464b5bf97c5dd5aaf742bc7f3e101e
SHA1e8924997a0819e72a2fd0ddefebe1a552ad307ce
SHA2567adf0988371faba58ffbbb554a7271c07ae3f24cadaa1dbc5731ecc130735c10
SHA5125f543541c0c1a5c5e466a9d023c4323b97828d948187870a2e2a80e84ea19c13a8f6d8161bcf1ad21f5b80df932a06fdb17b2feb2029ba6f61f356eb8525d8df
-
C:\Users\Admin\AppData\Local\Temp\qgvmVuSj6pNK.batFilesize
207B
MD5eccb913cc2fa8de35527af2fdd457f27
SHA191beb3025632f1697b2fccd92acce36fd20b01d6
SHA2568a4cc434861e7dd861616e07571925ba51267647de1ee20e867b234a8f932430
SHA512a3dc5d947e905c1157afd44c27cc75ef6be58ec9080ca65358dd89597a0b645199b7ecd7b465412b0b56e8f6d37b96ba5f0d61939d297bd67bf50b48f7538d9b
-
C:\Users\Admin\AppData\Local\Temp\s4lVMYO9LJlP.batFilesize
207B
MD53234f24b331cf0561b4647a0b3831075
SHA1c3170bbe5a78913d9fd2437cb7ec195cebd52340
SHA2563e90508b0e251988bdb143b25865eb236e3d60d29d7c42e37f59caba7e046bb7
SHA51289221d7b777cb8f780908defbd1d729f7051e5770cf89589acdf0517a80b5cc0fb6cb992591b0683021e00cea2810d185f3cca94c54cfc7d59741edb29487e4b
-
C:\Users\Admin\AppData\Local\Temp\sADVVufWFxWI.batFilesize
207B
MD530a94107738ee27a6ba761241dfe33ff
SHA11c4a1e807fa0a3d70b275df8b4dc08862cbb31e3
SHA256b34da337979645b74588aad65e4c7c3d9d2b325dc79c67fda8653d01319611b1
SHA5120909a4f776cb9cba28a894d4705fe943f5f94da22d962ca776177b271125e4cb0d0260f34cbfc4bd51de899e637df977d78551f177772d36a66b261eaf4db90c
-
C:\Users\Admin\AppData\Local\Temp\zrFfrbRKK5GV.batFilesize
207B
MD58f1a33081cf8970e3fc5c3aed978ee85
SHA1fcc6396c3aa7bb49f3542057220409a1c3a92aaf
SHA256875857ee899e2d1e65a0c4e01935ae814ae835bce92242fae79f90db6d47ac51
SHA5124a11bb24fb8d09aa35827a911d1ddf88c1249fd1e8779fa71d064f2e59c9792312160aed25f4119a039d1458208cecf62a250e05dfe9143ecbf74b006a966746
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/332-29-0x00000000013B0000-0x000000000141C000-memory.dmpFilesize
432KB
-
memory/1232-97-0x0000000000120000-0x000000000018C000-memory.dmpFilesize
432KB
-
memory/1636-12-0x0000000000D40000-0x0000000000DAC000-memory.dmpFilesize
432KB
-
memory/1636-25-0x0000000074460000-0x0000000074B4E000-memory.dmpFilesize
6.9MB
-
memory/1636-16-0x0000000074460000-0x0000000074B4E000-memory.dmpFilesize
6.9MB
-
memory/1636-14-0x0000000074460000-0x0000000074B4E000-memory.dmpFilesize
6.9MB
-
memory/1636-13-0x0000000074460000-0x0000000074B4E000-memory.dmpFilesize
6.9MB
-
memory/1820-41-0x00000000013B0000-0x000000000141C000-memory.dmpFilesize
432KB
-
memory/1924-15-0x0000000074460000-0x0000000074B4E000-memory.dmpFilesize
6.9MB
-
memory/1924-0-0x000000007446E000-0x000000007446F000-memory.dmpFilesize
4KB
-
memory/1924-4-0x0000000074460000-0x0000000074B4E000-memory.dmpFilesize
6.9MB
-
memory/1924-3-0x000000007446E000-0x000000007446F000-memory.dmpFilesize
4KB
-
memory/1924-2-0x0000000074460000-0x0000000074B4E000-memory.dmpFilesize
6.9MB
-
memory/1924-1-0x0000000000C20000-0x0000000000C8C000-memory.dmpFilesize
432KB
-
memory/2380-109-0x0000000000D60000-0x0000000000DCC000-memory.dmpFilesize
432KB