Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
596s -
max time network
606s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 07:35
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (103) - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 10 IoCs
Processes:
resource yara_rule behavioral27/memory/2124-1-0x0000000000F90000-0x0000000000FFC000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral27/memory/2992-12-0x0000000001140000-0x00000000011AC000-memory.dmp family_quasar behavioral27/memory/828-29-0x0000000000210000-0x000000000027C000-memory.dmp family_quasar behavioral27/memory/1800-41-0x0000000000840000-0x00000000008AC000-memory.dmp family_quasar behavioral27/memory/2980-53-0x0000000000C00000-0x0000000000C6C000-memory.dmp family_quasar behavioral27/memory/2752-65-0x0000000001380000-0x00000000013EC000-memory.dmp family_quasar behavioral27/memory/2020-77-0x0000000001380000-0x00000000013EC000-memory.dmp family_quasar behavioral27/memory/3020-100-0x0000000000190000-0x00000000001FC000-memory.dmp family_quasar behavioral27/memory/3064-112-0x00000000003F0000-0x000000000045C000-memory.dmp family_quasar -
Executes dropped EXE 9 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2992 Client.exe 828 Client.exe 1800 Client.exe 2980 Client.exe 2752 Client.exe 2020 Client.exe 2356 Client.exe 3020 Client.exe 3064 Client.exe -
Loads dropped DLL 9 IoCs
Processes:
Uni - Copy (103) - Copy - Copy.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exepid process 2124 Uni - Copy (103) - Copy - Copy.exe 320 cmd.exe 648 cmd.exe 2748 cmd.exe 1392 cmd.exe 1344 cmd.exe 2840 cmd.exe 1108 cmd.exe 1912 cmd.exe -
Looks up external IP address via web service 20 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 23 api.ipify.org 53 api.ipify.org 15 ip-api.com 17 api.ipify.org 11 api.ipify.org 27 ip-api.com 39 ip-api.com 41 api.ipify.org 45 ip-api.com 51 ip-api.com 2 ip-api.com 6 api.ipify.org 59 api.ipify.org 47 api.ipify.org 57 ip-api.com 8 ip-api.com 21 ip-api.com 35 api.ipify.org 29 api.ipify.org 33 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exepid process 1344 schtasks.exe 1976 schtasks.exe 1924 schtasks.exe 1252 schtasks.exe 1184 schtasks.exe 2592 schtasks.exe 1520 SCHTASKS.exe 2740 schtasks.exe 2788 schtasks.exe 2196 schtasks.exe -
Runs ping.exe 1 TTPs 8 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 2596 PING.EXE 1316 PING.EXE 1980 PING.EXE 2904 PING.EXE 2760 PING.EXE 1704 PING.EXE 1260 PING.EXE 1784 PING.EXE -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
Uni - Copy (103) - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 2124 Uni - Copy (103) - Copy - Copy.exe Token: SeDebugPrivilege 2992 Client.exe Token: SeDebugPrivilege 828 Client.exe Token: SeDebugPrivilege 1800 Client.exe Token: SeDebugPrivilege 2980 Client.exe Token: SeDebugPrivilege 2752 Client.exe Token: SeDebugPrivilege 2020 Client.exe Token: SeDebugPrivilege 2356 Client.exe Token: SeDebugPrivilege 3020 Client.exe Token: SeDebugPrivilege 3064 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (103) - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 2124 wrote to memory of 2592 2124 Uni - Copy (103) - Copy - Copy.exe schtasks.exe PID 2124 wrote to memory of 2592 2124 Uni - Copy (103) - Copy - Copy.exe schtasks.exe PID 2124 wrote to memory of 2592 2124 Uni - Copy (103) - Copy - Copy.exe schtasks.exe PID 2124 wrote to memory of 2592 2124 Uni - Copy (103) - Copy - Copy.exe schtasks.exe PID 2124 wrote to memory of 2992 2124 Uni - Copy (103) - Copy - Copy.exe Client.exe PID 2124 wrote to memory of 2992 2124 Uni - Copy (103) - Copy - Copy.exe Client.exe PID 2124 wrote to memory of 2992 2124 Uni - Copy (103) - Copy - Copy.exe Client.exe PID 2124 wrote to memory of 2992 2124 Uni - Copy (103) - Copy - Copy.exe Client.exe PID 2124 wrote to memory of 2992 2124 Uni - Copy (103) - Copy - Copy.exe Client.exe PID 2124 wrote to memory of 2992 2124 Uni - Copy (103) - Copy - Copy.exe Client.exe PID 2124 wrote to memory of 2992 2124 Uni - Copy (103) - Copy - Copy.exe Client.exe PID 2124 wrote to memory of 1520 2124 Uni - Copy (103) - Copy - Copy.exe SCHTASKS.exe PID 2124 wrote to memory of 1520 2124 Uni - Copy (103) - Copy - Copy.exe SCHTASKS.exe PID 2124 wrote to memory of 1520 2124 Uni - Copy (103) - Copy - Copy.exe SCHTASKS.exe PID 2124 wrote to memory of 1520 2124 Uni - Copy (103) - Copy - Copy.exe SCHTASKS.exe PID 2992 wrote to memory of 2740 2992 Client.exe schtasks.exe PID 2992 wrote to memory of 2740 2992 Client.exe schtasks.exe PID 2992 wrote to memory of 2740 2992 Client.exe schtasks.exe PID 2992 wrote to memory of 2740 2992 Client.exe schtasks.exe PID 2992 wrote to memory of 320 2992 Client.exe cmd.exe PID 2992 wrote to memory of 320 2992 Client.exe cmd.exe PID 2992 wrote to memory of 320 2992 Client.exe cmd.exe PID 2992 wrote to memory of 320 2992 Client.exe cmd.exe PID 320 wrote to memory of 1220 320 cmd.exe chcp.com PID 320 wrote to memory of 1220 320 cmd.exe chcp.com PID 320 wrote to memory of 1220 320 cmd.exe chcp.com PID 320 wrote to memory of 1220 320 cmd.exe chcp.com PID 320 wrote to memory of 1260 320 cmd.exe PING.EXE PID 320 wrote to memory of 1260 320 cmd.exe PING.EXE PID 320 wrote to memory of 1260 320 cmd.exe PING.EXE PID 320 wrote to memory of 1260 320 cmd.exe PING.EXE PID 320 wrote to memory of 828 320 cmd.exe Client.exe PID 320 wrote to memory of 828 320 cmd.exe Client.exe PID 320 wrote to memory of 828 320 cmd.exe Client.exe PID 320 wrote to memory of 828 320 cmd.exe Client.exe PID 320 wrote to memory of 828 320 cmd.exe Client.exe PID 320 wrote to memory of 828 320 cmd.exe Client.exe PID 320 wrote to memory of 828 320 cmd.exe Client.exe PID 828 wrote to memory of 1344 828 Client.exe schtasks.exe PID 828 wrote to memory of 1344 828 Client.exe schtasks.exe PID 828 wrote to memory of 1344 828 Client.exe schtasks.exe PID 828 wrote to memory of 1344 828 Client.exe schtasks.exe PID 828 wrote to memory of 648 828 Client.exe cmd.exe PID 828 wrote to memory of 648 828 Client.exe cmd.exe PID 828 wrote to memory of 648 828 Client.exe cmd.exe PID 828 wrote to memory of 648 828 Client.exe cmd.exe PID 648 wrote to memory of 2308 648 cmd.exe chcp.com PID 648 wrote to memory of 2308 648 cmd.exe chcp.com PID 648 wrote to memory of 2308 648 cmd.exe chcp.com PID 648 wrote to memory of 2308 648 cmd.exe chcp.com PID 648 wrote to memory of 1784 648 cmd.exe PING.EXE PID 648 wrote to memory of 1784 648 cmd.exe PING.EXE PID 648 wrote to memory of 1784 648 cmd.exe PING.EXE PID 648 wrote to memory of 1784 648 cmd.exe PING.EXE PID 648 wrote to memory of 1800 648 cmd.exe Client.exe PID 648 wrote to memory of 1800 648 cmd.exe Client.exe PID 648 wrote to memory of 1800 648 cmd.exe Client.exe PID 648 wrote to memory of 1800 648 cmd.exe Client.exe PID 648 wrote to memory of 1800 648 cmd.exe Client.exe PID 648 wrote to memory of 1800 648 cmd.exe Client.exe PID 648 wrote to memory of 1800 648 cmd.exe Client.exe PID 1800 wrote to memory of 2788 1800 Client.exe schtasks.exe PID 1800 wrote to memory of 2788 1800 Client.exe schtasks.exe PID 1800 wrote to memory of 2788 1800 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OQuUMXeL3mko.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\kEPzV4U2UA17.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\jqaHeQYbFgc2.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\FFba0qflpWrd.bat" "9⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\o9mj8SOz6Ky9.bat" "11⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2sQM3eVQD57A.bat" "13⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ShjbzvVQ9H5N.bat" "15⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\EDEH8BfR5Mq5.bat" "17⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (103) - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2sQM3eVQD57A.batFilesize
207B
MD5f33462ae94fcda123bab241f3b80a617
SHA166253daec9b9d753487a7e21fafb2df037c4ba11
SHA256a236e044d9f1f665a9da0bb15542c4f61cc26230b4ec65b5262a82b95e9ae360
SHA512fea2c60a2a01953b760864307bd669d0ca4b5dfa8415bf72b24d68e70ecf97e05d41f252d31f600742b66aecdf2e64673a7cff832539c69cd424dde6a4a695d0
-
C:\Users\Admin\AppData\Local\Temp\EDEH8BfR5Mq5.batFilesize
207B
MD5c291a06f56509eb82fd40e9dcea1781f
SHA18d39c52fa31bfa7e7c8639c47377bfa463fc3337
SHA256107b8acadb95fa19e67e1847056c95ef3656ce5699c9015c316e01b6262df34f
SHA5126f329db073df91d6ea13f5f6f594216c3530c09c50b3d062f6d89198dba921b1bc3bbe59813009232ebe0807c0676b8572b6a0e2eea0a2a27725aa16a323b618
-
C:\Users\Admin\AppData\Local\Temp\FFba0qflpWrd.batFilesize
207B
MD56f2c516d72140f9e445744904adc4e25
SHA1e240e86de2638af970a509ad2c3bdaa830749e6b
SHA256e010cbac8504208ae0b23c5e6db01602233d441778318e38e4d023aa420773d6
SHA512d6aceae40c852827f7ff6454c04a5f29dbb2ec5685c26a8809a0da2adbd3625ae387457d7a9571c0c5da6b093611a60a88ebae03e092ba3bcc87eaced5ed004e
-
C:\Users\Admin\AppData\Local\Temp\OQuUMXeL3mko.batFilesize
207B
MD581c29b1cf82335a432960bebb03bdcd2
SHA16865278b5c2e42f830fecb18b33e6519b33fc8f2
SHA256bbeb2be2149e67f03d3e2c3de5279820c97fc9bd6f42d8804da74cff814d0b48
SHA51234926a365eae62c5b01c90ba6bb581630b90d7eb18d9680741093c7833135bdb375e53d7b0a2f4441642b36cf995cfdd7f7a057ee232cd302c6234b75469fe31
-
C:\Users\Admin\AppData\Local\Temp\ShjbzvVQ9H5N.batFilesize
207B
MD583a503a0da2f6eeea09db3e49348a407
SHA1002f0a972773f0f86fb94a62346d181ae10915de
SHA25657ce83a782794c4f9e3a8d05ac0e236ff47fb2daff83a94c61b0845b87864c6e
SHA51298593be71d91472911add53867828755c00d1919b1df686c343f219e55bbe3458c202f3fbee5eaf58774010a73876beca27380825202082aa83fba08dac7c323
-
C:\Users\Admin\AppData\Local\Temp\jqaHeQYbFgc2.batFilesize
207B
MD515a284ede958a8ade17418a827873baf
SHA13e3cf98ed34d7a3a952af8e18c93ed87548f6252
SHA256bf3a7b64a83017bd4f0b2c8ba3a2faacc6386e2d30c9c0037a7941a460b3afa8
SHA512816b145ad51607bb4fb7e04c1d70ed0202f94b613b9f8a778e79a53b5f638a1976347557bc373531ac8103418396ffcf8f6b9942399d40acb51bba8b428c0a16
-
C:\Users\Admin\AppData\Local\Temp\kEPzV4U2UA17.batFilesize
207B
MD599eb860a28ac1854aa69d002bdb99e10
SHA11042ae6d13eeda418eb34c29fa67cf50d3983310
SHA256e517cb8abb6388a68856d895aafda0242accfd75f5220851f1076b96edb2741c
SHA5121ae748141d64c13de87bb2ca3cab07ea4ac781fbe9c5452206147c534f4ceaba7c83aae5a73fff0eb65fb02a8276f036ed8bb9851aa31a014efb199c1f4e822b
-
C:\Users\Admin\AppData\Local\Temp\o9mj8SOz6Ky9.batFilesize
207B
MD5b4057fbf22791e8132c42f9c35f70554
SHA19959cecdd66debc720f70ecd6638d28cf4b88629
SHA25665902ed33bf3b6a4f28f380cda17774b77b032da09a4faac3e83746039d9d212
SHA512be6ac002f3982ca96770fe4218d6c69dfa1f67ad3bd015197223b0b7f8fa60a843deedff1c8e3388512832e65b08d466628d259a0e428b346e8a48ba59974d24
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/828-29-0x0000000000210000-0x000000000027C000-memory.dmpFilesize
432KB
-
memory/1800-41-0x0000000000840000-0x00000000008AC000-memory.dmpFilesize
432KB
-
memory/2020-77-0x0000000001380000-0x00000000013EC000-memory.dmpFilesize
432KB
-
memory/2124-15-0x0000000074410000-0x0000000074AFE000-memory.dmpFilesize
6.9MB
-
memory/2124-0-0x000000007441E000-0x000000007441F000-memory.dmpFilesize
4KB
-
memory/2124-4-0x0000000074410000-0x0000000074AFE000-memory.dmpFilesize
6.9MB
-
memory/2124-3-0x000000007441E000-0x000000007441F000-memory.dmpFilesize
4KB
-
memory/2124-2-0x0000000074410000-0x0000000074AFE000-memory.dmpFilesize
6.9MB
-
memory/2124-1-0x0000000000F90000-0x0000000000FFC000-memory.dmpFilesize
432KB
-
memory/2752-65-0x0000000001380000-0x00000000013EC000-memory.dmpFilesize
432KB
-
memory/2980-53-0x0000000000C00000-0x0000000000C6C000-memory.dmpFilesize
432KB
-
memory/2992-12-0x0000000001140000-0x00000000011AC000-memory.dmpFilesize
432KB
-
memory/2992-26-0x0000000074410000-0x0000000074AFE000-memory.dmpFilesize
6.9MB
-
memory/2992-16-0x0000000074410000-0x0000000074AFE000-memory.dmpFilesize
6.9MB
-
memory/2992-13-0x0000000074410000-0x0000000074AFE000-memory.dmpFilesize
6.9MB
-
memory/2992-14-0x0000000074410000-0x0000000074AFE000-memory.dmpFilesize
6.9MB
-
memory/3020-100-0x0000000000190000-0x00000000001FC000-memory.dmpFilesize
432KB
-
memory/3064-112-0x00000000003F0000-0x000000000045C000-memory.dmpFilesize
432KB