Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
596s -
max time network
606s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 07:35
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 8 IoCs
Processes:
resource yara_rule behavioral29/memory/2196-1-0x0000000000BD0000-0x0000000000C3C000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral29/memory/2276-12-0x0000000000170000-0x00000000001DC000-memory.dmp family_quasar behavioral29/memory/2092-29-0x00000000001C0000-0x000000000022C000-memory.dmp family_quasar behavioral29/memory/2212-41-0x0000000000380000-0x00000000003EC000-memory.dmp family_quasar behavioral29/memory/2848-53-0x0000000000AC0000-0x0000000000B2C000-memory.dmp family_quasar behavioral29/memory/1988-65-0x0000000001250000-0x00000000012BC000-memory.dmp family_quasar behavioral29/memory/1048-77-0x0000000001250000-0x00000000012BC000-memory.dmp family_quasar -
Executes dropped EXE 9 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2276 Client.exe 2092 Client.exe 2212 Client.exe 2848 Client.exe 1988 Client.exe 1048 Client.exe 2408 Client.exe 2996 Client.exe 2148 Client.exe -
Loads dropped DLL 9 IoCs
Processes:
Uni - Copy (104) - Copy - Copy - Copy.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exepid process 2196 Uni - Copy (104) - Copy - Copy - Copy.exe 2100 cmd.exe 1924 cmd.exe 2544 cmd.exe 2356 cmd.exe 1092 cmd.exe 1796 cmd.exe 3020 cmd.exe 628 cmd.exe -
Looks up external IP address via web service 20 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 59 api.ipify.org 8 ip-api.com 15 ip-api.com 17 api.ipify.org 27 ip-api.com 33 ip-api.com 2 ip-api.com 6 api.ipify.org 29 api.ipify.org 35 api.ipify.org 47 api.ipify.org 39 ip-api.com 41 api.ipify.org 53 api.ipify.org 57 ip-api.com 11 api.ipify.org 21 ip-api.com 23 api.ipify.org 45 ip-api.com 51 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
SCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2280 SCHTASKS.exe 1368 schtasks.exe 1852 schtasks.exe 308 schtasks.exe 2600 schtasks.exe 1576 schtasks.exe 2768 schtasks.exe 2320 schtasks.exe 1568 schtasks.exe 2356 schtasks.exe -
Runs ping.exe 1 TTPs 8 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 2680 PING.EXE 2624 PING.EXE 1776 PING.EXE 2264 PING.EXE 2324 PING.EXE 2072 PING.EXE 2136 PING.EXE 1908 PING.EXE -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
Uni - Copy (104) - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 2196 Uni - Copy (104) - Copy - Copy - Copy.exe Token: SeDebugPrivilege 2276 Client.exe Token: SeDebugPrivilege 2092 Client.exe Token: SeDebugPrivilege 2212 Client.exe Token: SeDebugPrivilege 2848 Client.exe Token: SeDebugPrivilege 1988 Client.exe Token: SeDebugPrivilege 1048 Client.exe Token: SeDebugPrivilege 2408 Client.exe Token: SeDebugPrivilege 2996 Client.exe Token: SeDebugPrivilege 2148 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (104) - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 2196 wrote to memory of 1576 2196 Uni - Copy (104) - Copy - Copy - Copy.exe schtasks.exe PID 2196 wrote to memory of 1576 2196 Uni - Copy (104) - Copy - Copy - Copy.exe schtasks.exe PID 2196 wrote to memory of 1576 2196 Uni - Copy (104) - Copy - Copy - Copy.exe schtasks.exe PID 2196 wrote to memory of 1576 2196 Uni - Copy (104) - Copy - Copy - Copy.exe schtasks.exe PID 2196 wrote to memory of 2276 2196 Uni - Copy (104) - Copy - Copy - Copy.exe Client.exe PID 2196 wrote to memory of 2276 2196 Uni - Copy (104) - Copy - Copy - Copy.exe Client.exe PID 2196 wrote to memory of 2276 2196 Uni - Copy (104) - Copy - Copy - Copy.exe Client.exe PID 2196 wrote to memory of 2276 2196 Uni - Copy (104) - Copy - Copy - Copy.exe Client.exe PID 2196 wrote to memory of 2276 2196 Uni - Copy (104) - Copy - Copy - Copy.exe Client.exe PID 2196 wrote to memory of 2276 2196 Uni - Copy (104) - Copy - Copy - Copy.exe Client.exe PID 2196 wrote to memory of 2276 2196 Uni - Copy (104) - Copy - Copy - Copy.exe Client.exe PID 2196 wrote to memory of 2280 2196 Uni - Copy (104) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2196 wrote to memory of 2280 2196 Uni - Copy (104) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2196 wrote to memory of 2280 2196 Uni - Copy (104) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2196 wrote to memory of 2280 2196 Uni - Copy (104) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2276 wrote to memory of 2356 2276 Client.exe schtasks.exe PID 2276 wrote to memory of 2356 2276 Client.exe schtasks.exe PID 2276 wrote to memory of 2356 2276 Client.exe schtasks.exe PID 2276 wrote to memory of 2356 2276 Client.exe schtasks.exe PID 2276 wrote to memory of 2100 2276 Client.exe cmd.exe PID 2276 wrote to memory of 2100 2276 Client.exe cmd.exe PID 2276 wrote to memory of 2100 2276 Client.exe cmd.exe PID 2276 wrote to memory of 2100 2276 Client.exe cmd.exe PID 2100 wrote to memory of 1260 2100 cmd.exe chcp.com PID 2100 wrote to memory of 1260 2100 cmd.exe chcp.com PID 2100 wrote to memory of 1260 2100 cmd.exe chcp.com PID 2100 wrote to memory of 1260 2100 cmd.exe chcp.com PID 2100 wrote to memory of 2264 2100 cmd.exe PING.EXE PID 2100 wrote to memory of 2264 2100 cmd.exe PING.EXE PID 2100 wrote to memory of 2264 2100 cmd.exe PING.EXE PID 2100 wrote to memory of 2264 2100 cmd.exe PING.EXE PID 2100 wrote to memory of 2092 2100 cmd.exe Client.exe PID 2100 wrote to memory of 2092 2100 cmd.exe Client.exe PID 2100 wrote to memory of 2092 2100 cmd.exe Client.exe PID 2100 wrote to memory of 2092 2100 cmd.exe Client.exe PID 2100 wrote to memory of 2092 2100 cmd.exe Client.exe PID 2100 wrote to memory of 2092 2100 cmd.exe Client.exe PID 2100 wrote to memory of 2092 2100 cmd.exe Client.exe PID 2092 wrote to memory of 1368 2092 Client.exe schtasks.exe PID 2092 wrote to memory of 1368 2092 Client.exe schtasks.exe PID 2092 wrote to memory of 1368 2092 Client.exe schtasks.exe PID 2092 wrote to memory of 1368 2092 Client.exe schtasks.exe PID 2092 wrote to memory of 1924 2092 Client.exe cmd.exe PID 2092 wrote to memory of 1924 2092 Client.exe cmd.exe PID 2092 wrote to memory of 1924 2092 Client.exe cmd.exe PID 2092 wrote to memory of 1924 2092 Client.exe cmd.exe PID 1924 wrote to memory of 572 1924 cmd.exe chcp.com PID 1924 wrote to memory of 572 1924 cmd.exe chcp.com PID 1924 wrote to memory of 572 1924 cmd.exe chcp.com PID 1924 wrote to memory of 572 1924 cmd.exe chcp.com PID 1924 wrote to memory of 2324 1924 cmd.exe PING.EXE PID 1924 wrote to memory of 2324 1924 cmd.exe PING.EXE PID 1924 wrote to memory of 2324 1924 cmd.exe PING.EXE PID 1924 wrote to memory of 2324 1924 cmd.exe PING.EXE PID 1924 wrote to memory of 2212 1924 cmd.exe Client.exe PID 1924 wrote to memory of 2212 1924 cmd.exe Client.exe PID 1924 wrote to memory of 2212 1924 cmd.exe Client.exe PID 1924 wrote to memory of 2212 1924 cmd.exe Client.exe PID 1924 wrote to memory of 2212 1924 cmd.exe Client.exe PID 1924 wrote to memory of 2212 1924 cmd.exe Client.exe PID 1924 wrote to memory of 2212 1924 cmd.exe Client.exe PID 2212 wrote to memory of 2768 2212 Client.exe schtasks.exe PID 2212 wrote to memory of 2768 2212 Client.exe schtasks.exe PID 2212 wrote to memory of 2768 2212 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (104) - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (104) - Copy - Copy - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (104) - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Nq5cDvyjLNju.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\qEICnbvZPQGc.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\oqSTvxz8AvrW.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\UmG5d320TMNq.bat" "9⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\l4n2De6Hhx4L.bat" "11⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Q0aevl99zOaf.bat" "13⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\qputq299wZYs.bat" "15⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\SktllO2hjBNI.bat" "17⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (104) - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (104) - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Nq5cDvyjLNju.batFilesize
207B
MD5bc00fcd9f02032baa66251f7b144921c
SHA18f847cb8f8e1a3ebc52ded2c8bbf985e1d0be915
SHA25693cf94bdd7a739d01e2c1142a87894a99ff175160711489821bf865e18fc73fc
SHA512a471cc8fee0f7fe7238fee9483028b3a713b1475ae7749afd33b7c31d200b26097570220d654a17a6a578c59489dbe663b89c0552c7c3143cc13f1cc336a2e5d
-
C:\Users\Admin\AppData\Local\Temp\Q0aevl99zOaf.batFilesize
207B
MD5603f0c1f23dfdd4176bfe9bc183a9cf1
SHA173b13baacca70accd43939586db9c38c9c463d2a
SHA2562bcd8b7c750cee9560d8c3874303365fcc64f46a12962b2f394471e32c90da36
SHA5123a72a31c1bc39c63c9ea211062e6e42d813da0df2c26fcea23a62565ac3e6a77d39b345ff756d06d7f11c1fc31a17c2b6341e2f1c13d8535d3c5a09a70eb243d
-
C:\Users\Admin\AppData\Local\Temp\SktllO2hjBNI.batFilesize
207B
MD507768a2ba46cc4d467ef875b00c770bf
SHA1b00a20160021b41d6f95563b724028a1ac1302cd
SHA25694a41f0c5906e3cda5cb0661032233726464f08e692899b4462c58ab7bca8d11
SHA512cff6d610eaf95cd768ba10831ae53ea0edf07540d1608590986cae2696ea04222cdee438b9a6473c263bce1a3db7eda4241caa0a035a174660c8bf0f7e4a543d
-
C:\Users\Admin\AppData\Local\Temp\UmG5d320TMNq.batFilesize
207B
MD566e9b406875a4f0ba90e8a177bb16cc7
SHA10cf41ed7ac9d0bf9c191f3b27a334768e6de7386
SHA25611060773b86e15afe0e70f09615cd238c613c550087f1e995fc2974d0fa12395
SHA512746c9428e5c416c514d6239f3cfb0f62d363e36fb2bd9b4c58b2fb457dbebfadceafc90afaa3b0fa4d1c03fbc749e26428c1f026d691f51faba7b0d8fc10190b
-
C:\Users\Admin\AppData\Local\Temp\l4n2De6Hhx4L.batFilesize
207B
MD53194c4238030920959e872238220565d
SHA1740295542b3e69cfc1b3ce1b21a6b9b364b95712
SHA256754a7fff9d598f64b68ecae00756841811f75249f8a20fe7f385f802a1734b90
SHA5127aee318919ab1fad6705de5890396917b9eb962344328241edd6ca58e6045df516a7c58ac44aed7d51ce8877bb349c3d04a8a4a28ecb8cc5c52e133541a40311
-
C:\Users\Admin\AppData\Local\Temp\oqSTvxz8AvrW.batFilesize
207B
MD5cf65173cfaf212ce09cb6ffc42ac1c01
SHA13af972d312ac8d2c9053709de1cfb59859b60062
SHA2563e234657b132f9feefbff9d48abf3c8a1599397808d57f5cc758dce39d8d8caa
SHA512df15d05e2120ff0d0706456fd16a5899f20b6fdf29e7352c591f425def5dfaaaf02e7cd500af5325b524bb0dbb0d90636abf7a74d547354e0d798e797a0c5670
-
C:\Users\Admin\AppData\Local\Temp\qEICnbvZPQGc.batFilesize
207B
MD5d9a304e6ba48389296fb1acc82ffe257
SHA1b8499d94470c40069de470af2198c3421ffa14ae
SHA256c9e5e977596fecbeee69b5bf5ebf4ce319461962ed9bb51a0b158c1ae368e2de
SHA512c8d8865a8e3a07e829fb4e415275c6944764aafaee3ba380ca730f0c42e1b519e3c87b71f7b2836e3220843b0a124aff22db2937e9d6299bbe54193d741df595
-
C:\Users\Admin\AppData\Local\Temp\qputq299wZYs.batFilesize
207B
MD5fb987d72d46df57269fdb1a24744d8f1
SHA1cf137e277d142fd551876b35c1fb856296dbf55f
SHA25631bb3a3889dcebd70ee0d5579e1121cd6b99937b49a529f12615b9eccb862af0
SHA512d89ebd70070f098dcb0dcc164387f15b3fddf4922bf223d7e3f675c34c8e86c940d3cf06e538cd271a4b153e723bf45f6d1f85d25fabf91957525544e847c18d
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/1048-77-0x0000000001250000-0x00000000012BC000-memory.dmpFilesize
432KB
-
memory/1988-65-0x0000000001250000-0x00000000012BC000-memory.dmpFilesize
432KB
-
memory/2092-29-0x00000000001C0000-0x000000000022C000-memory.dmpFilesize
432KB
-
memory/2196-15-0x00000000746D0000-0x0000000074DBE000-memory.dmpFilesize
6.9MB
-
memory/2196-0-0x00000000746DE000-0x00000000746DF000-memory.dmpFilesize
4KB
-
memory/2196-4-0x00000000746D0000-0x0000000074DBE000-memory.dmpFilesize
6.9MB
-
memory/2196-3-0x00000000746DE000-0x00000000746DF000-memory.dmpFilesize
4KB
-
memory/2196-2-0x00000000746D0000-0x0000000074DBE000-memory.dmpFilesize
6.9MB
-
memory/2196-1-0x0000000000BD0000-0x0000000000C3C000-memory.dmpFilesize
432KB
-
memory/2212-41-0x0000000000380000-0x00000000003EC000-memory.dmpFilesize
432KB
-
memory/2276-13-0x00000000746D0000-0x0000000074DBE000-memory.dmpFilesize
6.9MB
-
memory/2276-25-0x00000000746D0000-0x0000000074DBE000-memory.dmpFilesize
6.9MB
-
memory/2276-16-0x00000000746D0000-0x0000000074DBE000-memory.dmpFilesize
6.9MB
-
memory/2276-12-0x0000000000170000-0x00000000001DC000-memory.dmpFilesize
432KB
-
memory/2276-14-0x00000000746D0000-0x0000000074DBE000-memory.dmpFilesize
6.9MB
-
memory/2848-53-0x0000000000AC0000-0x0000000000B2C000-memory.dmpFilesize
432KB