Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
596s -
max time network
606s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 07:35
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (10) - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 11 IoCs
Processes:
resource yara_rule behavioral7/memory/2032-1-0x00000000010E0000-0x000000000114C000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral7/memory/1808-12-0x0000000001120000-0x000000000118C000-memory.dmp family_quasar behavioral7/memory/1724-29-0x0000000000310000-0x000000000037C000-memory.dmp family_quasar behavioral7/memory/2264-41-0x0000000000990000-0x00000000009FC000-memory.dmp family_quasar behavioral7/memory/2648-53-0x00000000012F0000-0x000000000135C000-memory.dmp family_quasar behavioral7/memory/1696-65-0x00000000012F0000-0x000000000135C000-memory.dmp family_quasar behavioral7/memory/764-77-0x00000000003C0000-0x000000000042C000-memory.dmp family_quasar behavioral7/memory/1536-89-0x0000000000230000-0x000000000029C000-memory.dmp family_quasar behavioral7/memory/1352-101-0x0000000000A80000-0x0000000000AEC000-memory.dmp family_quasar behavioral7/memory/1560-113-0x0000000000E70000-0x0000000000EDC000-memory.dmp family_quasar -
Executes dropped EXE 9 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 1808 Client.exe 1724 Client.exe 2264 Client.exe 2648 Client.exe 1696 Client.exe 764 Client.exe 1536 Client.exe 1352 Client.exe 1560 Client.exe -
Loads dropped DLL 9 IoCs
Processes:
Uni - Copy (10) - Copy.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exepid process 2032 Uni - Copy (10) - Copy.exe 1200 cmd.exe 1960 cmd.exe 2540 cmd.exe 1232 cmd.exe 1984 cmd.exe 2664 cmd.exe 2740 cmd.exe 2480 cmd.exe -
Looks up external IP address via web service 20 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 21 ip-api.com 33 ip-api.com 35 api.ipify.org 45 ip-api.com 51 ip-api.com 59 api.ipify.org 15 ip-api.com 17 api.ipify.org 11 api.ipify.org 27 ip-api.com 39 ip-api.com 57 ip-api.com 8 ip-api.com 29 api.ipify.org 23 api.ipify.org 41 api.ipify.org 47 api.ipify.org 53 api.ipify.org 2 ip-api.com 6 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
SCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2148 SCHTASKS.exe 1676 schtasks.exe 2712 schtasks.exe 2764 schtasks.exe 1060 schtasks.exe 1044 schtasks.exe 2580 schtasks.exe 2756 schtasks.exe 2064 schtasks.exe 2868 schtasks.exe -
Runs ping.exe 1 TTPs 8 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 492 PING.EXE 2108 PING.EXE 2668 PING.EXE 308 PING.EXE 2452 PING.EXE 1348 PING.EXE 2816 PING.EXE 2892 PING.EXE -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
Uni - Copy (10) - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 2032 Uni - Copy (10) - Copy.exe Token: SeDebugPrivilege 1808 Client.exe Token: SeDebugPrivilege 1724 Client.exe Token: SeDebugPrivilege 2264 Client.exe Token: SeDebugPrivilege 2648 Client.exe Token: SeDebugPrivilege 1696 Client.exe Token: SeDebugPrivilege 764 Client.exe Token: SeDebugPrivilege 1536 Client.exe Token: SeDebugPrivilege 1352 Client.exe Token: SeDebugPrivilege 1560 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (10) - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 2032 wrote to memory of 2580 2032 Uni - Copy (10) - Copy.exe schtasks.exe PID 2032 wrote to memory of 2580 2032 Uni - Copy (10) - Copy.exe schtasks.exe PID 2032 wrote to memory of 2580 2032 Uni - Copy (10) - Copy.exe schtasks.exe PID 2032 wrote to memory of 2580 2032 Uni - Copy (10) - Copy.exe schtasks.exe PID 2032 wrote to memory of 1808 2032 Uni - Copy (10) - Copy.exe Client.exe PID 2032 wrote to memory of 1808 2032 Uni - Copy (10) - Copy.exe Client.exe PID 2032 wrote to memory of 1808 2032 Uni - Copy (10) - Copy.exe Client.exe PID 2032 wrote to memory of 1808 2032 Uni - Copy (10) - Copy.exe Client.exe PID 2032 wrote to memory of 1808 2032 Uni - Copy (10) - Copy.exe Client.exe PID 2032 wrote to memory of 1808 2032 Uni - Copy (10) - Copy.exe Client.exe PID 2032 wrote to memory of 1808 2032 Uni - Copy (10) - Copy.exe Client.exe PID 2032 wrote to memory of 2148 2032 Uni - Copy (10) - Copy.exe SCHTASKS.exe PID 2032 wrote to memory of 2148 2032 Uni - Copy (10) - Copy.exe SCHTASKS.exe PID 2032 wrote to memory of 2148 2032 Uni - Copy (10) - Copy.exe SCHTASKS.exe PID 2032 wrote to memory of 2148 2032 Uni - Copy (10) - Copy.exe SCHTASKS.exe PID 1808 wrote to memory of 2868 1808 Client.exe schtasks.exe PID 1808 wrote to memory of 2868 1808 Client.exe schtasks.exe PID 1808 wrote to memory of 2868 1808 Client.exe schtasks.exe PID 1808 wrote to memory of 2868 1808 Client.exe schtasks.exe PID 1808 wrote to memory of 1200 1808 Client.exe cmd.exe PID 1808 wrote to memory of 1200 1808 Client.exe cmd.exe PID 1808 wrote to memory of 1200 1808 Client.exe cmd.exe PID 1808 wrote to memory of 1200 1808 Client.exe cmd.exe PID 1200 wrote to memory of 1696 1200 cmd.exe chcp.com PID 1200 wrote to memory of 1696 1200 cmd.exe chcp.com PID 1200 wrote to memory of 1696 1200 cmd.exe chcp.com PID 1200 wrote to memory of 1696 1200 cmd.exe chcp.com PID 1200 wrote to memory of 2452 1200 cmd.exe PING.EXE PID 1200 wrote to memory of 2452 1200 cmd.exe PING.EXE PID 1200 wrote to memory of 2452 1200 cmd.exe PING.EXE PID 1200 wrote to memory of 2452 1200 cmd.exe PING.EXE PID 1200 wrote to memory of 1724 1200 cmd.exe Client.exe PID 1200 wrote to memory of 1724 1200 cmd.exe Client.exe PID 1200 wrote to memory of 1724 1200 cmd.exe Client.exe PID 1200 wrote to memory of 1724 1200 cmd.exe Client.exe PID 1200 wrote to memory of 1724 1200 cmd.exe Client.exe PID 1200 wrote to memory of 1724 1200 cmd.exe Client.exe PID 1200 wrote to memory of 1724 1200 cmd.exe Client.exe PID 1724 wrote to memory of 1676 1724 Client.exe schtasks.exe PID 1724 wrote to memory of 1676 1724 Client.exe schtasks.exe PID 1724 wrote to memory of 1676 1724 Client.exe schtasks.exe PID 1724 wrote to memory of 1676 1724 Client.exe schtasks.exe PID 1724 wrote to memory of 1960 1724 Client.exe cmd.exe PID 1724 wrote to memory of 1960 1724 Client.exe cmd.exe PID 1724 wrote to memory of 1960 1724 Client.exe cmd.exe PID 1724 wrote to memory of 1960 1724 Client.exe cmd.exe PID 1960 wrote to memory of 1452 1960 cmd.exe chcp.com PID 1960 wrote to memory of 1452 1960 cmd.exe chcp.com PID 1960 wrote to memory of 1452 1960 cmd.exe chcp.com PID 1960 wrote to memory of 1452 1960 cmd.exe chcp.com PID 1960 wrote to memory of 1348 1960 cmd.exe PING.EXE PID 1960 wrote to memory of 1348 1960 cmd.exe PING.EXE PID 1960 wrote to memory of 1348 1960 cmd.exe PING.EXE PID 1960 wrote to memory of 1348 1960 cmd.exe PING.EXE PID 1960 wrote to memory of 2264 1960 cmd.exe Client.exe PID 1960 wrote to memory of 2264 1960 cmd.exe Client.exe PID 1960 wrote to memory of 2264 1960 cmd.exe Client.exe PID 1960 wrote to memory of 2264 1960 cmd.exe Client.exe PID 1960 wrote to memory of 2264 1960 cmd.exe Client.exe PID 1960 wrote to memory of 2264 1960 cmd.exe Client.exe PID 1960 wrote to memory of 2264 1960 cmd.exe Client.exe PID 2264 wrote to memory of 2712 2264 Client.exe schtasks.exe PID 2264 wrote to memory of 2712 2264 Client.exe schtasks.exe PID 2264 wrote to memory of 2712 2264 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\rMYtyXpcd9xc.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DA3O64fI4XEw.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CmEgFPjsq3qq.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\mC3jOa0LvhlL.bat" "9⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\wutdW1xTWeCS.bat" "11⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\YpsURNq1JG1s.bat" "13⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\mYW8NZxSQ1At.bat" "15⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\pgey4rmQOILc.bat" "17⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (10) - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\CmEgFPjsq3qq.batFilesize
207B
MD5fdfc67bedec0dbad7660438161c303a8
SHA188e866a3c4820ce482322ac0dd2518f33fef0d41
SHA25633723c6e0ddef8c60fa0ece25a1388cf75f619eea3c2d7a131d445f379cb9321
SHA5126a9e311d7dc3f79ff0e9d501406a8d871f696a45ff0b8f2bc8d8ac10399eaffdec4ce94e288e366246dc81088b746e08da8ee402905fc892adcd51bad1fbd800
-
C:\Users\Admin\AppData\Local\Temp\DA3O64fI4XEw.batFilesize
207B
MD551a815b00fe94f69bd76bd0f61248417
SHA1e3ac38e59c23074f95c7e1b5d7deb7cb324d2c52
SHA256b5ee7a7126c546b27c5fdc23665e9ab53c0795299260ecce1e0f140e363bad66
SHA512477ce2832c1b99e36c6ba1275f8da2d7de7b6f9ad1c5e6c7d8f01b4bda90df7fd902c69908dc854e483871784a92a33d0a4dad6ad24b275542cc959db45cacd2
-
C:\Users\Admin\AppData\Local\Temp\YpsURNq1JG1s.batFilesize
207B
MD57f3a191b8c3d22e19506787aafeb7f8f
SHA1b98fb3f9edd072f138a8acdf66cd061db76b9b7c
SHA256333d8c988f6a4cd810c82d593b4c05815496543f2609668bea582b9bfb471a50
SHA512f44c8a3f07232f52d79cc023eae8128624fcba14888f8d9eb03e5435db45dbdc1c3ce7e5f511e931cf86ffae3dc3f43973f796d37760274641046ab7f0a30a61
-
C:\Users\Admin\AppData\Local\Temp\mC3jOa0LvhlL.batFilesize
207B
MD5f5e683ecfad0d17d02d3d4c5d9ea3c10
SHA1b44c2197a7f98bed3a0b5a6d348a1a1d350f0ed5
SHA2569243ba81655999153063744af35268d4e759a307607563be15bd538393c1c289
SHA51258aa29056214d76105d08cef53b4c884159eb48d2d9ea39c9c0b2bbf24725eb913250a53f55b65e81e630e9bc2dcc5af77e295adffb08db68371f84775dfbb41
-
C:\Users\Admin\AppData\Local\Temp\mYW8NZxSQ1At.batFilesize
207B
MD5faf29efa261450b69f98635622439638
SHA138f9589772b1db1db5a37633e2bf68f7984b0f57
SHA2564df8dcc446b2d8b535275cf29432b03df2153ba4fbf0932a64a06aae2ef587e1
SHA5124563595d5b9148fb74ffa2ccdf27e2a7f0f08e23b0109ae22e823f91b2b752fc17a45d46c9b632079801aab760412a91b330e5609968372f1ddaae7ea207ba4d
-
C:\Users\Admin\AppData\Local\Temp\pgey4rmQOILc.batFilesize
207B
MD57b5159ce7589237fecb6bb065d83cb41
SHA10109b430745ed9551e56d337fc33109e45dd6387
SHA2567680071c094eaa0a47a63e6782d2956ed54901784f354b6e4365363b5ef78203
SHA5124e8a1ddc7824f3f761006ad55ba69fac77e6d8b89fadbd8db7679e947ce5f3078ec57ec3065a558db7212efc81a714b7648b3baba8b5e39f8e00b45695f60d3b
-
C:\Users\Admin\AppData\Local\Temp\rMYtyXpcd9xc.batFilesize
207B
MD54a602d6298ea523f43f8ffb0f7f0875f
SHA1b3d1bd4674ad296f447e22387d420a15f81dafd7
SHA256056ee8526479322965d4f35ea266f9dda2bb4050032822fc9e24d0772540c1eb
SHA5124c54dad3cfadb4d162c416414ef69a5b2bad9d5531c0b0bcc56e9347e97cb37e4c3287f1a6702ea58c6ce567fa36682ef61e8c62f5bec406534ebf3819bb684f
-
C:\Users\Admin\AppData\Local\Temp\wutdW1xTWeCS.batFilesize
207B
MD50a9362612ce81435e096aa7c39115f61
SHA18ed8cee0535324829272411c24a6b5a3ef66ccab
SHA25663ee9ca225227cdb53870a469a230015629cbb0f44e8b6560fc08c03b43a3b68
SHA5122eaa1229941a31619df46c0c0ee934c5c76a18f8e2f5bfef56e6d98ed65cee0b77c13894f928a067cc34de92b12e1c008161aa5b27c389f66a233b6028f02876
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/764-77-0x00000000003C0000-0x000000000042C000-memory.dmpFilesize
432KB
-
memory/1352-101-0x0000000000A80000-0x0000000000AEC000-memory.dmpFilesize
432KB
-
memory/1536-89-0x0000000000230000-0x000000000029C000-memory.dmpFilesize
432KB
-
memory/1560-113-0x0000000000E70000-0x0000000000EDC000-memory.dmpFilesize
432KB
-
memory/1696-65-0x00000000012F0000-0x000000000135C000-memory.dmpFilesize
432KB
-
memory/1724-29-0x0000000000310000-0x000000000037C000-memory.dmpFilesize
432KB
-
memory/1808-12-0x0000000001120000-0x000000000118C000-memory.dmpFilesize
432KB
-
memory/1808-13-0x0000000074730000-0x0000000074E1E000-memory.dmpFilesize
6.9MB
-
memory/1808-16-0x0000000074730000-0x0000000074E1E000-memory.dmpFilesize
6.9MB
-
memory/1808-14-0x0000000074730000-0x0000000074E1E000-memory.dmpFilesize
6.9MB
-
memory/1808-26-0x0000000074730000-0x0000000074E1E000-memory.dmpFilesize
6.9MB
-
memory/2032-4-0x0000000074730000-0x0000000074E1E000-memory.dmpFilesize
6.9MB
-
memory/2032-0-0x000000007473E000-0x000000007473F000-memory.dmpFilesize
4KB
-
memory/2032-3-0x000000007473E000-0x000000007473F000-memory.dmpFilesize
4KB
-
memory/2032-2-0x0000000074730000-0x0000000074E1E000-memory.dmpFilesize
6.9MB
-
memory/2032-1-0x00000000010E0000-0x000000000114C000-memory.dmpFilesize
432KB
-
memory/2032-15-0x0000000074730000-0x0000000074E1E000-memory.dmpFilesize
6.9MB
-
memory/2264-41-0x0000000000990000-0x00000000009FC000-memory.dmpFilesize
432KB
-
memory/2648-53-0x00000000012F0000-0x000000000135C000-memory.dmpFilesize
432KB