Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
596s -
max time network
606s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 07:35
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 11 IoCs
Processes:
resource yara_rule behavioral15/memory/492-1-0x0000000000F90000-0x0000000000FFC000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral15/memory/2540-12-0x0000000000990000-0x00000000009FC000-memory.dmp family_quasar behavioral15/memory/2488-29-0x0000000000110000-0x000000000017C000-memory.dmp family_quasar behavioral15/memory/2356-41-0x0000000000C30000-0x0000000000C9C000-memory.dmp family_quasar behavioral15/memory/2764-53-0x00000000002E0000-0x000000000034C000-memory.dmp family_quasar behavioral15/memory/492-65-0x0000000000A30000-0x0000000000A9C000-memory.dmp family_quasar behavioral15/memory/532-77-0x0000000000240000-0x00000000002AC000-memory.dmp family_quasar behavioral15/memory/2656-89-0x0000000000D40000-0x0000000000DAC000-memory.dmp family_quasar behavioral15/memory/1684-101-0x0000000000D40000-0x0000000000DAC000-memory.dmp family_quasar behavioral15/memory/2496-113-0x00000000010D0000-0x000000000113C000-memory.dmp family_quasar -
Executes dropped EXE 9 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2540 Client.exe 2488 Client.exe 2356 Client.exe 2764 Client.exe 492 Client.exe 532 Client.exe 2656 Client.exe 1684 Client.exe 2496 Client.exe -
Loads dropped DLL 9 IoCs
Processes:
Uni - Copy (101) - Copy - Copy - Copy - Copy.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exepid process 492 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe 1868 cmd.exe 2232 cmd.exe 2528 cmd.exe 1808 cmd.exe 1760 cmd.exe 2116 cmd.exe 2428 cmd.exe 1988 cmd.exe -
Looks up external IP address via web service 20 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 29 api.ipify.org 35 api.ipify.org 8 ip-api.com 15 ip-api.com 41 api.ipify.org 57 ip-api.com 33 ip-api.com 47 api.ipify.org 53 api.ipify.org 2 ip-api.com 17 api.ipify.org 23 api.ipify.org 27 ip-api.com 45 ip-api.com 51 ip-api.com 59 api.ipify.org 6 api.ipify.org 11 api.ipify.org 21 ip-api.com 39 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2508 schtasks.exe 1724 SCHTASKS.exe 2440 schtasks.exe 1736 schtasks.exe 2116 schtasks.exe 992 schtasks.exe 1996 schtasks.exe 2644 schtasks.exe 1364 schtasks.exe 2492 schtasks.exe -
Runs ping.exe 1 TTPs 8 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 328 PING.EXE 3024 PING.EXE 2436 PING.EXE 1088 PING.EXE 2952 PING.EXE 2328 PING.EXE 2788 PING.EXE 1892 PING.EXE -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
Uni - Copy (101) - Copy - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 492 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe Token: SeDebugPrivilege 2540 Client.exe Token: SeDebugPrivilege 2488 Client.exe Token: SeDebugPrivilege 2356 Client.exe Token: SeDebugPrivilege 2764 Client.exe Token: SeDebugPrivilege 492 Client.exe Token: SeDebugPrivilege 532 Client.exe Token: SeDebugPrivilege 2656 Client.exe Token: SeDebugPrivilege 1684 Client.exe Token: SeDebugPrivilege 2496 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (101) - Copy - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 492 wrote to memory of 2508 492 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe schtasks.exe PID 492 wrote to memory of 2508 492 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe schtasks.exe PID 492 wrote to memory of 2508 492 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe schtasks.exe PID 492 wrote to memory of 2508 492 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe schtasks.exe PID 492 wrote to memory of 2540 492 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe Client.exe PID 492 wrote to memory of 2540 492 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe Client.exe PID 492 wrote to memory of 2540 492 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe Client.exe PID 492 wrote to memory of 2540 492 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe Client.exe PID 492 wrote to memory of 2540 492 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe Client.exe PID 492 wrote to memory of 2540 492 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe Client.exe PID 492 wrote to memory of 2540 492 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe Client.exe PID 492 wrote to memory of 1724 492 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe SCHTASKS.exe PID 492 wrote to memory of 1724 492 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe SCHTASKS.exe PID 492 wrote to memory of 1724 492 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe SCHTASKS.exe PID 492 wrote to memory of 1724 492 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe SCHTASKS.exe PID 2540 wrote to memory of 2440 2540 Client.exe schtasks.exe PID 2540 wrote to memory of 2440 2540 Client.exe schtasks.exe PID 2540 wrote to memory of 2440 2540 Client.exe schtasks.exe PID 2540 wrote to memory of 2440 2540 Client.exe schtasks.exe PID 2540 wrote to memory of 1868 2540 Client.exe cmd.exe PID 2540 wrote to memory of 1868 2540 Client.exe cmd.exe PID 2540 wrote to memory of 1868 2540 Client.exe cmd.exe PID 2540 wrote to memory of 1868 2540 Client.exe cmd.exe PID 1868 wrote to memory of 2384 1868 cmd.exe chcp.com PID 1868 wrote to memory of 2384 1868 cmd.exe chcp.com PID 1868 wrote to memory of 2384 1868 cmd.exe chcp.com PID 1868 wrote to memory of 2384 1868 cmd.exe chcp.com PID 1868 wrote to memory of 2952 1868 cmd.exe PING.EXE PID 1868 wrote to memory of 2952 1868 cmd.exe PING.EXE PID 1868 wrote to memory of 2952 1868 cmd.exe PING.EXE PID 1868 wrote to memory of 2952 1868 cmd.exe PING.EXE PID 1868 wrote to memory of 2488 1868 cmd.exe Client.exe PID 1868 wrote to memory of 2488 1868 cmd.exe Client.exe PID 1868 wrote to memory of 2488 1868 cmd.exe Client.exe PID 1868 wrote to memory of 2488 1868 cmd.exe Client.exe PID 1868 wrote to memory of 2488 1868 cmd.exe Client.exe PID 1868 wrote to memory of 2488 1868 cmd.exe Client.exe PID 1868 wrote to memory of 2488 1868 cmd.exe Client.exe PID 2488 wrote to memory of 1736 2488 Client.exe schtasks.exe PID 2488 wrote to memory of 1736 2488 Client.exe schtasks.exe PID 2488 wrote to memory of 1736 2488 Client.exe schtasks.exe PID 2488 wrote to memory of 1736 2488 Client.exe schtasks.exe PID 2488 wrote to memory of 2232 2488 Client.exe cmd.exe PID 2488 wrote to memory of 2232 2488 Client.exe cmd.exe PID 2488 wrote to memory of 2232 2488 Client.exe cmd.exe PID 2488 wrote to memory of 2232 2488 Client.exe cmd.exe PID 2232 wrote to memory of 1704 2232 cmd.exe chcp.com PID 2232 wrote to memory of 1704 2232 cmd.exe chcp.com PID 2232 wrote to memory of 1704 2232 cmd.exe chcp.com PID 2232 wrote to memory of 1704 2232 cmd.exe chcp.com PID 2232 wrote to memory of 2328 2232 cmd.exe PING.EXE PID 2232 wrote to memory of 2328 2232 cmd.exe PING.EXE PID 2232 wrote to memory of 2328 2232 cmd.exe PING.EXE PID 2232 wrote to memory of 2328 2232 cmd.exe PING.EXE PID 2232 wrote to memory of 2356 2232 cmd.exe Client.exe PID 2232 wrote to memory of 2356 2232 cmd.exe Client.exe PID 2232 wrote to memory of 2356 2232 cmd.exe Client.exe PID 2232 wrote to memory of 2356 2232 cmd.exe Client.exe PID 2232 wrote to memory of 2356 2232 cmd.exe Client.exe PID 2232 wrote to memory of 2356 2232 cmd.exe Client.exe PID 2232 wrote to memory of 2356 2232 cmd.exe Client.exe PID 2356 wrote to memory of 2116 2356 Client.exe schtasks.exe PID 2356 wrote to memory of 2116 2356 Client.exe schtasks.exe PID 2356 wrote to memory of 2116 2356 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (101) - Copy - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (101) - Copy - Copy - Copy - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (101) - Copy - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\F8yxQcruEb0r.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DIEpQci1aATM.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sE1Q8jlstayg.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\U90I35eQfCn6.bat" "9⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DehEPbe85Trt.bat" "11⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\mYrMXENMLIyP.bat" "13⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Y4M1gTYNHNk7.bat" "15⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\D09dOabFZnGR.bat" "17⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (101) - Copy - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (101) - Copy - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\D09dOabFZnGR.batFilesize
207B
MD5163a96def42c3403d09d3f8d018e1613
SHA17e2cb41328b1482118da6b738962cd03f3075ec7
SHA256cceead55dd455d247221635b9139d47ebc6f4811e5a2f6534bd81623fc28e23d
SHA5128f50b7ec273a8950927c2e5a3ade4790b40551436de31fc2ad37c88724b3d3efa8c7064f98dd23b90880096c3c8d7e7e4efb15f2fd3307a343205a7919b5d366
-
C:\Users\Admin\AppData\Local\Temp\DIEpQci1aATM.batFilesize
207B
MD56bec1befda9cf2dda800a38acf8fa999
SHA165c0889cbd5941676f2eca6fda83b4876b450cbe
SHA2564ab79906bf4a52a14d83ece830108ff57d1d12da994296ab759e9f4a1266a45d
SHA512aa7dba7304dcdb6fdac4246e406d8eefa320a5c4b648c72e229ab3f557415e405c39d4f9a6aab04cc886e980314d08e2fb499d457a9bfef01b886e84a0fd0082
-
C:\Users\Admin\AppData\Local\Temp\DehEPbe85Trt.batFilesize
207B
MD5692982512a37b4335898eaa868587389
SHA1c2aec4ac56c62d28f88f004ea8542ac9bf349f26
SHA25675e48031c7a93801e24c4a67115b6504cadc3fb810deec27adcdc5039cd6d438
SHA512b0be05de9ad35cc442d537bcd09ae1cc0c9f026bcb88dee3f8e9e4922d59867e19818f074567aa190ff8578d70b58acff331f90cac8a8de437cc57eaf74c5da2
-
C:\Users\Admin\AppData\Local\Temp\F8yxQcruEb0r.batFilesize
207B
MD5597d18a8d309ca7c63e292e68482c0a8
SHA1bbba92079322938d1ec0eec0513b7350014525ec
SHA2568086b863572bd7bb1bcebc4ee997aeae9428ae9e49b844854971ea065a503413
SHA512e9df6e162e1e5f8e9681a07333a8224227935cff2b23a4b266c37d2c087cfc824164202552535f354127e0e66249cd8eeebd900cb0446326785c324a8605e111
-
C:\Users\Admin\AppData\Local\Temp\U90I35eQfCn6.batFilesize
207B
MD548171d787f9c382bb06e1fd68f4f78da
SHA1e1333306ccea97171f720342bb0eb8cc9489af86
SHA25668001f84b94bbf2e673a2cfa8face0d23185a2926a18b081236b5e261bed7fdf
SHA5121b708f29f163b497674b7042b7d1c693e26a209623e20171181896f7217ab463f00d2e8bcd01f947c607767a037b7af292e58a676a23152fdf3e9dfa28239a53
-
C:\Users\Admin\AppData\Local\Temp\Y4M1gTYNHNk7.batFilesize
207B
MD5e34c081c00b8d142672ab541ec754948
SHA1b0a0f995de42c52c1debcbda4adaee1b70e7851f
SHA2567c770a011f8309684bb7e15db1a263cbd6733ea36547555a7ed6bee506d55793
SHA512623c75cfc9a59b56c0d1a2d49354a06afc0db95e24c8b7d093f9977b8385fb695eebf795c89b584bf779097b8d844417d0e1a30e7460aef034d6f61d1233e96c
-
C:\Users\Admin\AppData\Local\Temp\mYrMXENMLIyP.batFilesize
207B
MD5ed11ae24f6f7566e1d53370e588c1f5d
SHA183f3fd83c48997e4a4c942f5d84bac79c43031ff
SHA256943f74cf4f985758ec4020ecc61dd38eece008dfaea52ea61c99fb5484ca6580
SHA512172186e14eef9e44af519b2669a27646f53b7e5eb459217cde25691dbcd20b510ea5f1ce5c4b0cfd0e1c69030c4c7529442a74b8479413b2f655029eb8b857d9
-
C:\Users\Admin\AppData\Local\Temp\sE1Q8jlstayg.batFilesize
207B
MD52af45d14a49923d94dccef46e347ca88
SHA1c771c11de4eea1f9d4ed6538418ab260d9af52d8
SHA25638f43ec34cc749697d38007de243711026bc9bf4208c9ec69544fa7acc0a4247
SHA512e1b267fa2e1702a03b6432ac44e14a8062172f72f7875088c336e47ee31c51c9731475dae23ce344f8246333be9300a22217c26911b3f709a67e0944c561af9b
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/492-15-0x0000000073EB0000-0x000000007459E000-memory.dmpFilesize
6.9MB
-
memory/492-0-0x0000000073EBE000-0x0000000073EBF000-memory.dmpFilesize
4KB
-
memory/492-4-0x0000000073EB0000-0x000000007459E000-memory.dmpFilesize
6.9MB
-
memory/492-3-0x0000000073EBE000-0x0000000073EBF000-memory.dmpFilesize
4KB
-
memory/492-65-0x0000000000A30000-0x0000000000A9C000-memory.dmpFilesize
432KB
-
memory/492-2-0x0000000073EB0000-0x000000007459E000-memory.dmpFilesize
6.9MB
-
memory/492-1-0x0000000000F90000-0x0000000000FFC000-memory.dmpFilesize
432KB
-
memory/532-77-0x0000000000240000-0x00000000002AC000-memory.dmpFilesize
432KB
-
memory/1684-101-0x0000000000D40000-0x0000000000DAC000-memory.dmpFilesize
432KB
-
memory/2356-41-0x0000000000C30000-0x0000000000C9C000-memory.dmpFilesize
432KB
-
memory/2488-29-0x0000000000110000-0x000000000017C000-memory.dmpFilesize
432KB
-
memory/2496-113-0x00000000010D0000-0x000000000113C000-memory.dmpFilesize
432KB
-
memory/2540-25-0x0000000073EB0000-0x000000007459E000-memory.dmpFilesize
6.9MB
-
memory/2540-16-0x0000000073EB0000-0x000000007459E000-memory.dmpFilesize
6.9MB
-
memory/2540-14-0x0000000073EB0000-0x000000007459E000-memory.dmpFilesize
6.9MB
-
memory/2540-13-0x0000000073EB0000-0x000000007459E000-memory.dmpFilesize
6.9MB
-
memory/2540-12-0x0000000000990000-0x00000000009FC000-memory.dmpFilesize
432KB
-
memory/2656-89-0x0000000000D40000-0x0000000000DAC000-memory.dmpFilesize
432KB
-
memory/2764-53-0x00000000002E0000-0x000000000034C000-memory.dmpFilesize
432KB