Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
597s -
max time network
606s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 07:35
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (10) - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 9 IoCs
Processes:
resource yara_rule behavioral5/memory/1632-1-0x0000000001020000-0x000000000108C000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral5/memory/992-12-0x0000000000A80000-0x0000000000AEC000-memory.dmp family_quasar behavioral5/memory/1084-29-0x0000000000D60000-0x0000000000DCC000-memory.dmp family_quasar behavioral5/memory/1560-41-0x00000000003E0000-0x000000000044C000-memory.dmp family_quasar behavioral5/memory/1852-53-0x0000000000E20000-0x0000000000E8C000-memory.dmp family_quasar behavioral5/memory/2172-65-0x0000000001190000-0x00000000011FC000-memory.dmp family_quasar behavioral5/memory/1660-77-0x0000000001190000-0x00000000011FC000-memory.dmp family_quasar behavioral5/memory/904-111-0x00000000001A0000-0x000000000020C000-memory.dmp family_quasar -
Executes dropped EXE 9 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 992 Client.exe 1084 Client.exe 1560 Client.exe 1852 Client.exe 2172 Client.exe 1660 Client.exe 2848 Client.exe 1420 Client.exe 904 Client.exe -
Loads dropped DLL 9 IoCs
Processes:
Uni - Copy (10) - Copy - Copy.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exepid process 1632 Uni - Copy (10) - Copy - Copy.exe 2208 cmd.exe 896 cmd.exe 2452 cmd.exe 844 cmd.exe 1220 cmd.exe 3004 cmd.exe 824 cmd.exe 1728 cmd.exe -
Looks up external IP address via web service 20 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 api.ipify.org 23 api.ipify.org 35 api.ipify.org 47 api.ipify.org 2 ip-api.com 15 ip-api.com 17 api.ipify.org 27 ip-api.com 29 api.ipify.org 41 api.ipify.org 45 ip-api.com 53 api.ipify.org 8 ip-api.com 59 api.ipify.org 57 ip-api.com 33 ip-api.com 21 ip-api.com 39 ip-api.com 51 ip-api.com 6 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2900 schtasks.exe 1648 SCHTASKS.exe 1412 schtasks.exe 1864 schtasks.exe 2888 schtasks.exe 2284 schtasks.exe 1228 schtasks.exe 3004 schtasks.exe 2056 schtasks.exe 988 schtasks.exe -
Runs ping.exe 1 TTPs 8 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 924 PING.EXE 996 PING.EXE 760 PING.EXE 440 PING.EXE 1196 PING.EXE 2844 PING.EXE 756 PING.EXE 2864 PING.EXE -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
Uni - Copy (10) - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 1632 Uni - Copy (10) - Copy - Copy.exe Token: SeDebugPrivilege 992 Client.exe Token: SeDebugPrivilege 1084 Client.exe Token: SeDebugPrivilege 1560 Client.exe Token: SeDebugPrivilege 1852 Client.exe Token: SeDebugPrivilege 2172 Client.exe Token: SeDebugPrivilege 1660 Client.exe Token: SeDebugPrivilege 2848 Client.exe Token: SeDebugPrivilege 1420 Client.exe Token: SeDebugPrivilege 904 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (10) - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 1632 wrote to memory of 2900 1632 Uni - Copy (10) - Copy - Copy.exe schtasks.exe PID 1632 wrote to memory of 2900 1632 Uni - Copy (10) - Copy - Copy.exe schtasks.exe PID 1632 wrote to memory of 2900 1632 Uni - Copy (10) - Copy - Copy.exe schtasks.exe PID 1632 wrote to memory of 2900 1632 Uni - Copy (10) - Copy - Copy.exe schtasks.exe PID 1632 wrote to memory of 992 1632 Uni - Copy (10) - Copy - Copy.exe Client.exe PID 1632 wrote to memory of 992 1632 Uni - Copy (10) - Copy - Copy.exe Client.exe PID 1632 wrote to memory of 992 1632 Uni - Copy (10) - Copy - Copy.exe Client.exe PID 1632 wrote to memory of 992 1632 Uni - Copy (10) - Copy - Copy.exe Client.exe PID 1632 wrote to memory of 992 1632 Uni - Copy (10) - Copy - Copy.exe Client.exe PID 1632 wrote to memory of 992 1632 Uni - Copy (10) - Copy - Copy.exe Client.exe PID 1632 wrote to memory of 992 1632 Uni - Copy (10) - Copy - Copy.exe Client.exe PID 1632 wrote to memory of 1648 1632 Uni - Copy (10) - Copy - Copy.exe SCHTASKS.exe PID 1632 wrote to memory of 1648 1632 Uni - Copy (10) - Copy - Copy.exe SCHTASKS.exe PID 1632 wrote to memory of 1648 1632 Uni - Copy (10) - Copy - Copy.exe SCHTASKS.exe PID 1632 wrote to memory of 1648 1632 Uni - Copy (10) - Copy - Copy.exe SCHTASKS.exe PID 992 wrote to memory of 1412 992 Client.exe schtasks.exe PID 992 wrote to memory of 1412 992 Client.exe schtasks.exe PID 992 wrote to memory of 1412 992 Client.exe schtasks.exe PID 992 wrote to memory of 1412 992 Client.exe schtasks.exe PID 992 wrote to memory of 2208 992 Client.exe cmd.exe PID 992 wrote to memory of 2208 992 Client.exe cmd.exe PID 992 wrote to memory of 2208 992 Client.exe cmd.exe PID 992 wrote to memory of 2208 992 Client.exe cmd.exe PID 2208 wrote to memory of 2172 2208 cmd.exe chcp.com PID 2208 wrote to memory of 2172 2208 cmd.exe chcp.com PID 2208 wrote to memory of 2172 2208 cmd.exe chcp.com PID 2208 wrote to memory of 2172 2208 cmd.exe chcp.com PID 2208 wrote to memory of 1196 2208 cmd.exe PING.EXE PID 2208 wrote to memory of 1196 2208 cmd.exe PING.EXE PID 2208 wrote to memory of 1196 2208 cmd.exe PING.EXE PID 2208 wrote to memory of 1196 2208 cmd.exe PING.EXE PID 2208 wrote to memory of 1084 2208 cmd.exe Client.exe PID 2208 wrote to memory of 1084 2208 cmd.exe Client.exe PID 2208 wrote to memory of 1084 2208 cmd.exe Client.exe PID 2208 wrote to memory of 1084 2208 cmd.exe Client.exe PID 2208 wrote to memory of 1084 2208 cmd.exe Client.exe PID 2208 wrote to memory of 1084 2208 cmd.exe Client.exe PID 2208 wrote to memory of 1084 2208 cmd.exe Client.exe PID 1084 wrote to memory of 1228 1084 Client.exe schtasks.exe PID 1084 wrote to memory of 1228 1084 Client.exe schtasks.exe PID 1084 wrote to memory of 1228 1084 Client.exe schtasks.exe PID 1084 wrote to memory of 1228 1084 Client.exe schtasks.exe PID 1084 wrote to memory of 896 1084 Client.exe cmd.exe PID 1084 wrote to memory of 896 1084 Client.exe cmd.exe PID 1084 wrote to memory of 896 1084 Client.exe cmd.exe PID 1084 wrote to memory of 896 1084 Client.exe cmd.exe PID 896 wrote to memory of 680 896 cmd.exe chcp.com PID 896 wrote to memory of 680 896 cmd.exe chcp.com PID 896 wrote to memory of 680 896 cmd.exe chcp.com PID 896 wrote to memory of 680 896 cmd.exe chcp.com PID 896 wrote to memory of 2844 896 cmd.exe PING.EXE PID 896 wrote to memory of 2844 896 cmd.exe PING.EXE PID 896 wrote to memory of 2844 896 cmd.exe PING.EXE PID 896 wrote to memory of 2844 896 cmd.exe PING.EXE PID 896 wrote to memory of 1560 896 cmd.exe Client.exe PID 896 wrote to memory of 1560 896 cmd.exe Client.exe PID 896 wrote to memory of 1560 896 cmd.exe Client.exe PID 896 wrote to memory of 1560 896 cmd.exe Client.exe PID 896 wrote to memory of 1560 896 cmd.exe Client.exe PID 896 wrote to memory of 1560 896 cmd.exe Client.exe PID 896 wrote to memory of 1560 896 cmd.exe Client.exe PID 1560 wrote to memory of 3004 1560 Client.exe schtasks.exe PID 1560 wrote to memory of 3004 1560 Client.exe schtasks.exe PID 1560 wrote to memory of 3004 1560 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\L0giNaFjdD0w.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\QCY4y5QT1OrE.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\auOy6WNacLJL.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ZWZFFsQANruF.bat" "9⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\4rq3i5CYXoTH.bat" "11⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\EZfxrW9g8luO.bat" "13⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Zs1eErNHsAJn.bat" "15⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Bn0W9DGpfn7C.bat" "17⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (10) - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4rq3i5CYXoTH.batFilesize
207B
MD5fe908a4d6701d9086d8390ea243c27d9
SHA14793c983edcae2bcabfcfe4ae836b26b9ce097cc
SHA2560386291cd927eec70e4e724410c7b3e891f6f0a013e39526acc59254c1b534a1
SHA512df593a62ccc10a0ba9e9cbfb71beed32b4538327c8b796df9a347bd99bdf5042a1ac05da19d8a505125215e33c1f3c7f1bfc14fc5cc9c1444f043685ce30cadb
-
C:\Users\Admin\AppData\Local\Temp\Bn0W9DGpfn7C.batFilesize
207B
MD503e4999fd49aa6750356434452f51fda
SHA1a7aefcd7a3acddf419a3b7631f66bc24a0bc38a3
SHA25661eff2aec8ee89d99b5aaf69ee3256a02731f3966fe8c675394e8e37bdd89c97
SHA512f465eec8cdbae3c1b4574454637cb8559b59223beb8efec6bd120c91d80c5fb5892a6857a4a75453a1a86b27671f1f5cf82fae7a6a758750cc10c915c351ce64
-
C:\Users\Admin\AppData\Local\Temp\EZfxrW9g8luO.batFilesize
207B
MD5bb75eb894e023e31c467dadfe329bc41
SHA1731b3e6acba2cf6b42931b04b008dd70d901bdb7
SHA25670c09df9e66094171f28a17ab4426fa03869ec66be95e4122b6e99b720907db3
SHA512b932cd6cd15df655d5fc505eff3c4e6c7207c56db1f9e75ff56a2aa6812471243723a0abffbbcae1524662f320fc45ed6a0009b6102d3caa07c071bd4e68c79c
-
C:\Users\Admin\AppData\Local\Temp\L0giNaFjdD0w.batFilesize
207B
MD5f6c8eba5aa3511bd068e734848f992a8
SHA167702cea15b08497ef3d4fe3503acb0d2a70a47f
SHA2569956cbed16a764446cda09792d5f07a213b2d7b5a6a6ec2b92d32977944390c2
SHA5125f3231d03a5cea097b3f7bdf82cada30ead30feaf7c1bcc8f50e470e168cd56af29c99d8cb496e1975e163ddf271f37b94b09640f99f1987fa3601e5ea2951ee
-
C:\Users\Admin\AppData\Local\Temp\QCY4y5QT1OrE.batFilesize
207B
MD55b02680bedc2623a9b411746e9abf50b
SHA192a05bf4aab14bf012b93dcca9422d75ec0213ce
SHA256892aac02988e67a926b22dea531c6f3a5cc245102443a7e26a5256f297a1cfe7
SHA5120a757e10388f26a5dd4cc06a45629d51d2d0b2004f2dde997ab54b4d687bc4400a27760ba7ea0df53a5edaa10e3baeee348c55c529df8da8d9f5d78c18ce32d0
-
C:\Users\Admin\AppData\Local\Temp\ZWZFFsQANruF.batFilesize
207B
MD5d055a5ba15c2217d2da0e320e083c88d
SHA1e98a4860b210b416d85746b78cc744c72e37b242
SHA25648f839b4054ff36757988a515cec622f31c192b50b48b04a61c59853ca495c70
SHA51263aa7030343a91a7427a580428979dbcd2ae7f6c4134729355c64d83cb5425e33eca8224fa8c23e1e7b53c5c147aa4d71e5941415ce04427ad39a6b79423a5c3
-
C:\Users\Admin\AppData\Local\Temp\Zs1eErNHsAJn.batFilesize
207B
MD54ff2730bc570c1d9c6331ff570b32914
SHA178d90ff9d48c2b072094d1cd4a74db69db4c3369
SHA2566f62b0d3f5a909022b3cadcdcfe575e719f169d06f1a0a168d5b3343b5b4430d
SHA512c0ad77c80f036a0ae0168d6304e62985da59025e0a579a93b1ed4be848b0f36d0c4d94413a77f5668eb5965966db6b453249de9a871215d4d35a82424d1469e8
-
C:\Users\Admin\AppData\Local\Temp\auOy6WNacLJL.batFilesize
207B
MD53b2ead8139067cdb8425e05da7d87439
SHA1880ef0cc1a9fe4117f31cf3795b60d3420f05a99
SHA256d3701aa356b1e57bed04fd969d27a98b408fcfa3e42a4755672426b6314ed84f
SHA512ac7d1f4b90d1e9e8aec662347d7098a3c1248e2509a2d11f96d062d53b476d597f2e0602d48c1d70ffd5a68c2a7bf0fc09af3578a0ff91bda4752571869c2aff
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/904-111-0x00000000001A0000-0x000000000020C000-memory.dmpFilesize
432KB
-
memory/992-12-0x0000000000A80000-0x0000000000AEC000-memory.dmpFilesize
432KB
-
memory/992-14-0x0000000074950000-0x000000007503E000-memory.dmpFilesize
6.9MB
-
memory/992-26-0x0000000074950000-0x000000007503E000-memory.dmpFilesize
6.9MB
-
memory/992-16-0x0000000074950000-0x000000007503E000-memory.dmpFilesize
6.9MB
-
memory/992-13-0x0000000074950000-0x000000007503E000-memory.dmpFilesize
6.9MB
-
memory/1084-29-0x0000000000D60000-0x0000000000DCC000-memory.dmpFilesize
432KB
-
memory/1560-41-0x00000000003E0000-0x000000000044C000-memory.dmpFilesize
432KB
-
memory/1632-0-0x000000007495E000-0x000000007495F000-memory.dmpFilesize
4KB
-
memory/1632-15-0x0000000074950000-0x000000007503E000-memory.dmpFilesize
6.9MB
-
memory/1632-4-0x0000000074950000-0x000000007503E000-memory.dmpFilesize
6.9MB
-
memory/1632-3-0x000000007495E000-0x000000007495F000-memory.dmpFilesize
4KB
-
memory/1632-2-0x0000000074950000-0x000000007503E000-memory.dmpFilesize
6.9MB
-
memory/1632-1-0x0000000001020000-0x000000000108C000-memory.dmpFilesize
432KB
-
memory/1660-77-0x0000000001190000-0x00000000011FC000-memory.dmpFilesize
432KB
-
memory/1852-53-0x0000000000E20000-0x0000000000E8C000-memory.dmpFilesize
432KB
-
memory/2172-65-0x0000000001190000-0x00000000011FC000-memory.dmpFilesize
432KB