Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
597s -
max time network
606s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 07:35
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 10 IoCs
Processes:
resource yara_rule behavioral25/memory/2980-1-0x0000000000890000-0x00000000008FC000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral25/memory/2780-12-0x0000000000FD0000-0x000000000103C000-memory.dmp family_quasar behavioral25/memory/2848-29-0x0000000000FD0000-0x000000000103C000-memory.dmp family_quasar behavioral25/memory/2220-41-0x0000000000FD0000-0x000000000103C000-memory.dmp family_quasar behavioral25/memory/308-53-0x0000000000FD0000-0x000000000103C000-memory.dmp family_quasar behavioral25/memory/1264-65-0x00000000001B0000-0x000000000021C000-memory.dmp family_quasar behavioral25/memory/620-77-0x0000000000DD0000-0x0000000000E3C000-memory.dmp family_quasar behavioral25/memory/2668-89-0x0000000000EF0000-0x0000000000F5C000-memory.dmp family_quasar behavioral25/memory/2880-101-0x0000000000EF0000-0x0000000000F5C000-memory.dmp family_quasar -
Executes dropped EXE 9 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2780 Client.exe 2848 Client.exe 2220 Client.exe 308 Client.exe 1264 Client.exe 620 Client.exe 2668 Client.exe 2880 Client.exe 1348 Client.exe -
Loads dropped DLL 9 IoCs
Processes:
Uni - Copy (103) - Copy - Copy - Copy.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exepid process 2980 Uni - Copy (103) - Copy - Copy - Copy.exe 2064 cmd.exe 1860 cmd.exe 1752 cmd.exe 2896 cmd.exe 1080 cmd.exe 2732 cmd.exe 2684 cmd.exe 3060 cmd.exe -
Looks up external IP address via web service 20 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 api.ipify.org 8 ip-api.com 15 ip-api.com 39 ip-api.com 45 ip-api.com 53 api.ipify.org 2 ip-api.com 27 ip-api.com 29 api.ipify.org 33 ip-api.com 17 api.ipify.org 21 ip-api.com 35 api.ipify.org 41 api.ipify.org 51 ip-api.com 59 api.ipify.org 11 api.ipify.org 23 api.ipify.org 47 api.ipify.org 57 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1144 schtasks.exe 1612 schtasks.exe 2160 SCHTASKS.exe 1880 schtasks.exe 2424 schtasks.exe 1276 schtasks.exe 2940 schtasks.exe 916 schtasks.exe 2872 schtasks.exe 2704 schtasks.exe -
Runs ping.exe 1 TTPs 8 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 864 PING.EXE 2912 PING.EXE 1684 PING.EXE 2036 PING.EXE 2924 PING.EXE 1200 PING.EXE 800 PING.EXE 2112 PING.EXE -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
Uni - Copy (103) - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 2980 Uni - Copy (103) - Copy - Copy - Copy.exe Token: SeDebugPrivilege 2780 Client.exe Token: SeDebugPrivilege 2848 Client.exe Token: SeDebugPrivilege 2220 Client.exe Token: SeDebugPrivilege 308 Client.exe Token: SeDebugPrivilege 1264 Client.exe Token: SeDebugPrivilege 620 Client.exe Token: SeDebugPrivilege 2668 Client.exe Token: SeDebugPrivilege 2880 Client.exe Token: SeDebugPrivilege 1348 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (103) - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 2980 wrote to memory of 916 2980 Uni - Copy (103) - Copy - Copy - Copy.exe schtasks.exe PID 2980 wrote to memory of 916 2980 Uni - Copy (103) - Copy - Copy - Copy.exe schtasks.exe PID 2980 wrote to memory of 916 2980 Uni - Copy (103) - Copy - Copy - Copy.exe schtasks.exe PID 2980 wrote to memory of 916 2980 Uni - Copy (103) - Copy - Copy - Copy.exe schtasks.exe PID 2980 wrote to memory of 2780 2980 Uni - Copy (103) - Copy - Copy - Copy.exe Client.exe PID 2980 wrote to memory of 2780 2980 Uni - Copy (103) - Copy - Copy - Copy.exe Client.exe PID 2980 wrote to memory of 2780 2980 Uni - Copy (103) - Copy - Copy - Copy.exe Client.exe PID 2980 wrote to memory of 2780 2980 Uni - Copy (103) - Copy - Copy - Copy.exe Client.exe PID 2980 wrote to memory of 2780 2980 Uni - Copy (103) - Copy - Copy - Copy.exe Client.exe PID 2980 wrote to memory of 2780 2980 Uni - Copy (103) - Copy - Copy - Copy.exe Client.exe PID 2980 wrote to memory of 2780 2980 Uni - Copy (103) - Copy - Copy - Copy.exe Client.exe PID 2980 wrote to memory of 2160 2980 Uni - Copy (103) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2980 wrote to memory of 2160 2980 Uni - Copy (103) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2980 wrote to memory of 2160 2980 Uni - Copy (103) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2980 wrote to memory of 2160 2980 Uni - Copy (103) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2780 wrote to memory of 2872 2780 Client.exe schtasks.exe PID 2780 wrote to memory of 2872 2780 Client.exe schtasks.exe PID 2780 wrote to memory of 2872 2780 Client.exe schtasks.exe PID 2780 wrote to memory of 2872 2780 Client.exe schtasks.exe PID 2780 wrote to memory of 2064 2780 Client.exe cmd.exe PID 2780 wrote to memory of 2064 2780 Client.exe cmd.exe PID 2780 wrote to memory of 2064 2780 Client.exe cmd.exe PID 2780 wrote to memory of 2064 2780 Client.exe cmd.exe PID 2064 wrote to memory of 1816 2064 cmd.exe chcp.com PID 2064 wrote to memory of 1816 2064 cmd.exe chcp.com PID 2064 wrote to memory of 1816 2064 cmd.exe chcp.com PID 2064 wrote to memory of 1816 2064 cmd.exe chcp.com PID 2064 wrote to memory of 2112 2064 cmd.exe PING.EXE PID 2064 wrote to memory of 2112 2064 cmd.exe PING.EXE PID 2064 wrote to memory of 2112 2064 cmd.exe PING.EXE PID 2064 wrote to memory of 2112 2064 cmd.exe PING.EXE PID 2064 wrote to memory of 2848 2064 cmd.exe Client.exe PID 2064 wrote to memory of 2848 2064 cmd.exe Client.exe PID 2064 wrote to memory of 2848 2064 cmd.exe Client.exe PID 2064 wrote to memory of 2848 2064 cmd.exe Client.exe PID 2064 wrote to memory of 2848 2064 cmd.exe Client.exe PID 2064 wrote to memory of 2848 2064 cmd.exe Client.exe PID 2064 wrote to memory of 2848 2064 cmd.exe Client.exe PID 2848 wrote to memory of 1880 2848 Client.exe schtasks.exe PID 2848 wrote to memory of 1880 2848 Client.exe schtasks.exe PID 2848 wrote to memory of 1880 2848 Client.exe schtasks.exe PID 2848 wrote to memory of 1880 2848 Client.exe schtasks.exe PID 2848 wrote to memory of 1860 2848 Client.exe cmd.exe PID 2848 wrote to memory of 1860 2848 Client.exe cmd.exe PID 2848 wrote to memory of 1860 2848 Client.exe cmd.exe PID 2848 wrote to memory of 1860 2848 Client.exe cmd.exe PID 1860 wrote to memory of 1848 1860 cmd.exe chcp.com PID 1860 wrote to memory of 1848 1860 cmd.exe chcp.com PID 1860 wrote to memory of 1848 1860 cmd.exe chcp.com PID 1860 wrote to memory of 1848 1860 cmd.exe chcp.com PID 1860 wrote to memory of 864 1860 cmd.exe PING.EXE PID 1860 wrote to memory of 864 1860 cmd.exe PING.EXE PID 1860 wrote to memory of 864 1860 cmd.exe PING.EXE PID 1860 wrote to memory of 864 1860 cmd.exe PING.EXE PID 1860 wrote to memory of 2220 1860 cmd.exe Client.exe PID 1860 wrote to memory of 2220 1860 cmd.exe Client.exe PID 1860 wrote to memory of 2220 1860 cmd.exe Client.exe PID 1860 wrote to memory of 2220 1860 cmd.exe Client.exe PID 1860 wrote to memory of 2220 1860 cmd.exe Client.exe PID 1860 wrote to memory of 2220 1860 cmd.exe Client.exe PID 1860 wrote to memory of 2220 1860 cmd.exe Client.exe PID 2220 wrote to memory of 2704 2220 Client.exe schtasks.exe PID 2220 wrote to memory of 2704 2220 Client.exe schtasks.exe PID 2220 wrote to memory of 2704 2220 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tRnXCdhtFhDN.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\08ohXKThKqxa.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\d7X5Lti0XLRZ.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\rqBiG4oSe6aa.bat" "9⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\33BQBiNew0ub.bat" "11⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\5g9R6obYDKDQ.bat" "13⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\b5AlTEihnBR1.bat" "15⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\rJyDAbQDbtTw.bat" "17⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (103) - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\08ohXKThKqxa.batFilesize
207B
MD5f472a1f33a7e0bc00076c3cfd8f6ba6f
SHA14048c4fee43f101ee655a40479b358913d33a919
SHA256d82898fe8db189455aaeab1130ec4a450cd5aac8078d13a200245f2dbeef14e0
SHA512817729fe837510f4009a887aab27512b01b42e1986b7b02d072da5a1c97cb7c625cdb45d2ffc3341f1a69e25b546a64d84d84401d6b9780b699499e38a09b91e
-
C:\Users\Admin\AppData\Local\Temp\33BQBiNew0ub.batFilesize
207B
MD533f6b0c23aaebcfd6902fe3c93ce740e
SHA1c8e6201210836d932c5518c83ccafd6173733b9c
SHA2564f5165ebec5be6ac7251c36f3c07bfe1c20189e9f44a27e56e1c3cab6ee0bc6c
SHA5121eeabb000bbad95e523135df0ae7952d4689965409245e449679f07ec47381cd86ea88f5d18a57aa854eb37d9c18a77d29e1180d8f98727d5c0247eb93676c44
-
C:\Users\Admin\AppData\Local\Temp\5g9R6obYDKDQ.batFilesize
207B
MD503aaa9074dc8a82bc407c57d63bd1ba0
SHA13aa06ec43f1aac58399e1204da222afb3f8ca197
SHA256e28f66c10a7fd66303a96f966c86fb0c059f8bc19ec1a8b2a91c110d39cf8639
SHA512f2c458018d8a5c5211181170452abde761afba64539b6f49b94c588cea3cb96c55770df2ab90a962fb5049dc706b4b7d25c0036d01025b0178b16ca476b81b4c
-
C:\Users\Admin\AppData\Local\Temp\b5AlTEihnBR1.batFilesize
207B
MD5848c459903e8e980fc1348986fbbc21e
SHA14b118e1e2bcf3485368a70039f59f9865aa642ae
SHA256b364e01c64cad5db3c33fd3cc63951596cb1a2d24230b64eacc9d12050d867bf
SHA512413eef6d32ebd591fff64013a1bae5c6d007ba2eb7e1fe70bd69829055b77668bb03bce93594a02b15032e354606111098faf34f2d47f834b825a9d8f1532f78
-
C:\Users\Admin\AppData\Local\Temp\d7X5Lti0XLRZ.batFilesize
207B
MD5923b04de6418b25ccc0a42f19e33ca1d
SHA1ccccc476e7482c61c803e2e8e6b0f9e2a582568c
SHA2564a96bd2e40e4a47be109029228a8f6f876e6c301f20782407dbb8bf4d7295ed3
SHA5128fad07cd2a78b8df148eab9716df14bbd93c3035d100a835b9bffebe8edc54112fb3e1bae92681e300a322e07c5e0469a20b7bad1152e41659b35731d53f02f6
-
C:\Users\Admin\AppData\Local\Temp\rJyDAbQDbtTw.batFilesize
207B
MD50953f3a0100c1c4fc4f09aabb8d7f86c
SHA19370ec5eae6c5f0823e7516a64fa019f6ad44da6
SHA25669f5c4269664741ad34c9376cad83d2defee57a63369e1430bf4f4c18c492daf
SHA512c5f351305777aa22f2783faa98917cf70f289d202ac397a3b031395f2d14585fdd547fb1fc955c10bf8a5e541d031ee577a58e4ce87b7e9ca42a570207c27595
-
C:\Users\Admin\AppData\Local\Temp\rqBiG4oSe6aa.batFilesize
207B
MD5a9c240627343f3a7c3bf6d33ad5f4743
SHA19d4ebff72c5793898a185da0ad4b1299a77d8960
SHA256c8109bb3790801135c92952c2e521b2b968c79c2b4049ceead3f1107f7b2f46e
SHA5121803d4716ba7d90c1cd627a20988b12831be3cbc1dc75f179fa2798daab8af3299c02dd8a46cebd7a8891644bde7df16a634935eb0f666856ebf988b416e000a
-
C:\Users\Admin\AppData\Local\Temp\tRnXCdhtFhDN.batFilesize
207B
MD59b0430d59275f06223f0c510f8fea7a2
SHA106c3b173a70d3ceac0f2a8e6f0425a67a34566f8
SHA2569f9297b7ad9fcf2b2927d94ec480d029d873c0fbfa4283f2e2a0eebeafb75c6c
SHA512271945e863bb708da9f11045d3152220afc4a0b41d19000545913e352d43fd0e2005d064091f20117458048e64e5dccc36c410c494efbbcba2c1ee3d808c2a43
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/308-53-0x0000000000FD0000-0x000000000103C000-memory.dmpFilesize
432KB
-
memory/620-77-0x0000000000DD0000-0x0000000000E3C000-memory.dmpFilesize
432KB
-
memory/1264-65-0x00000000001B0000-0x000000000021C000-memory.dmpFilesize
432KB
-
memory/2220-41-0x0000000000FD0000-0x000000000103C000-memory.dmpFilesize
432KB
-
memory/2668-89-0x0000000000EF0000-0x0000000000F5C000-memory.dmpFilesize
432KB
-
memory/2780-12-0x0000000000FD0000-0x000000000103C000-memory.dmpFilesize
432KB
-
memory/2780-26-0x0000000074430000-0x0000000074B1E000-memory.dmpFilesize
6.9MB
-
memory/2780-16-0x0000000074430000-0x0000000074B1E000-memory.dmpFilesize
6.9MB
-
memory/2780-14-0x0000000074430000-0x0000000074B1E000-memory.dmpFilesize
6.9MB
-
memory/2780-13-0x0000000074430000-0x0000000074B1E000-memory.dmpFilesize
6.9MB
-
memory/2848-29-0x0000000000FD0000-0x000000000103C000-memory.dmpFilesize
432KB
-
memory/2880-101-0x0000000000EF0000-0x0000000000F5C000-memory.dmpFilesize
432KB
-
memory/2980-15-0x0000000074430000-0x0000000074B1E000-memory.dmpFilesize
6.9MB
-
memory/2980-0-0x000000007443E000-0x000000007443F000-memory.dmpFilesize
4KB
-
memory/2980-4-0x0000000074430000-0x0000000074B1E000-memory.dmpFilesize
6.9MB
-
memory/2980-3-0x000000007443E000-0x000000007443F000-memory.dmpFilesize
4KB
-
memory/2980-2-0x0000000074430000-0x0000000074B1E000-memory.dmpFilesize
6.9MB
-
memory/2980-1-0x0000000000890000-0x00000000008FC000-memory.dmpFilesize
432KB