Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2025, 19:08

General

  • Target

    xenonew.exe

  • Size

    3.1MB

  • MD5

    2d60a76ce3357eecb47f10d21ba01fb0

  • SHA1

    1798a8dee078e7bd72296e79bbd2c2061d584fd7

  • SHA256

    55fd96a344bf6ccbf74dc7408f77f1080158fc2a0a20903b20e77a9cee2983d1

  • SHA512

    184f946295c7669f46a8fb878cb68bea943ed09c74cbd3588d4d7572295668edc8ba098f4e8c2deb21977d08ecc4b1f8e34376c4bb3074073e889864f04852e8

  • SSDEEP

    49152:fvelL26AaNeWgPhlmVqvMQ7XSK1NRJ6XbR3LoGduTHHB72eh2NT:fvOL26AaNeWgPhlmVqkQ7XSK1NRJ6p

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

augustinevegas-31173.portmap.host:31173

Mutex

7d74883a-5879-4f61-8c23-fc7af453d7c2

Attributes
  • encryption_key

    0B6DCD2BE4C82058601AFDA4AB9525FABE85A71D

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    1

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Checks computer location settings 2 TTPs 15 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 15 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 15 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 15 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\xenonew.exe
    "C:\Users\Admin\AppData\Local\Temp\xenonew.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:4236
    • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4392
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1056
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7UWzM2VzME2O.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1740
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:1284
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            4⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2208
          • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
            "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3296
            • C:\Windows\SYSTEM32\schtasks.exe
              "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
              5⤵
              • Scheduled Task/Job: Scheduled Task
              PID:5052
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Vjk56ZH8zYHd.bat" "
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3824
              • C:\Windows\system32\chcp.com
                chcp 65001
                6⤵
                  PID:4088
                • C:\Windows\system32\PING.EXE
                  ping -n 10 localhost
                  6⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:4344
                • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                  "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                  6⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:3192
                  • C:\Windows\SYSTEM32\schtasks.exe
                    "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                    7⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:1320
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\a04ZkgGk6ghc.bat" "
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2172
                    • C:\Windows\system32\chcp.com
                      chcp 65001
                      8⤵
                        PID:3948
                      • C:\Windows\system32\PING.EXE
                        ping -n 10 localhost
                        8⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Runs ping.exe
                        PID:1540
                      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                        "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                        8⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of WriteProcessMemory
                        PID:2684
                        • C:\Windows\SYSTEM32\schtasks.exe
                          "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                          9⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:1340
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DXevDlc1pvgx.bat" "
                          9⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3196
                          • C:\Windows\system32\chcp.com
                            chcp 65001
                            10⤵
                              PID:1972
                            • C:\Windows\system32\PING.EXE
                              ping -n 10 localhost
                              10⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:4420
                            • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                              "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                              10⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              • Suspicious use of WriteProcessMemory
                              PID:3028
                              • C:\Windows\SYSTEM32\schtasks.exe
                                "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                11⤵
                                • Scheduled Task/Job: Scheduled Task
                                PID:1436
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nfGI00sF3V1t.bat" "
                                11⤵
                                • Suspicious use of WriteProcessMemory
                                PID:2528
                                • C:\Windows\system32\chcp.com
                                  chcp 65001
                                  12⤵
                                    PID:3328
                                  • C:\Windows\system32\PING.EXE
                                    ping -n 10 localhost
                                    12⤵
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    • Runs ping.exe
                                    PID:808
                                  • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                    "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                    12⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    • Suspicious use of WriteProcessMemory
                                    PID:548
                                    • C:\Windows\SYSTEM32\schtasks.exe
                                      "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                      13⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1244
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dvVIHgwxHlwV.bat" "
                                      13⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:1844
                                      • C:\Windows\system32\chcp.com
                                        chcp 65001
                                        14⤵
                                          PID:4332
                                        • C:\Windows\system32\PING.EXE
                                          ping -n 10 localhost
                                          14⤵
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          • Runs ping.exe
                                          PID:1284
                                        • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                          "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                          14⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of FindShellTrayWindow
                                          • Suspicious use of SendNotifyMessage
                                          PID:1968
                                          • C:\Windows\SYSTEM32\schtasks.exe
                                            "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                            15⤵
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:868
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KP6dOaQ8UlKo.bat" "
                                            15⤵
                                              PID:1776
                                              • C:\Windows\system32\chcp.com
                                                chcp 65001
                                                16⤵
                                                  PID:3368
                                                • C:\Windows\system32\PING.EXE
                                                  ping -n 10 localhost
                                                  16⤵
                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                  • Runs ping.exe
                                                  PID:4892
                                                • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                  "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                  16⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SendNotifyMessage
                                                  PID:3600
                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                    "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                    17⤵
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2452
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vZSA196xOb8R.bat" "
                                                    17⤵
                                                      PID:1304
                                                      • C:\Windows\system32\chcp.com
                                                        chcp 65001
                                                        18⤵
                                                          PID:3824
                                                        • C:\Windows\system32\PING.EXE
                                                          ping -n 10 localhost
                                                          18⤵
                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                          • Runs ping.exe
                                                          PID:1104
                                                        • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                          "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                          18⤵
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          • Suspicious use of FindShellTrayWindow
                                                          • Suspicious use of SendNotifyMessage
                                                          PID:2876
                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                            "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                            19⤵
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:4732
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iOw3QMGlFMJV.bat" "
                                                            19⤵
                                                              PID:4296
                                                              • C:\Windows\system32\chcp.com
                                                                chcp 65001
                                                                20⤵
                                                                  PID:3392
                                                                • C:\Windows\system32\PING.EXE
                                                                  ping -n 10 localhost
                                                                  20⤵
                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                  • Runs ping.exe
                                                                  PID:3232
                                                                • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                                  "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                                  20⤵
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  • Suspicious use of SendNotifyMessage
                                                                  PID:3492
                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                    "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                    21⤵
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:1340
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KYKNDUpJ1JUO.bat" "
                                                                    21⤵
                                                                      PID:2144
                                                                      • C:\Windows\system32\chcp.com
                                                                        chcp 65001
                                                                        22⤵
                                                                          PID:2984
                                                                        • C:\Windows\system32\PING.EXE
                                                                          ping -n 10 localhost
                                                                          22⤵
                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                          • Runs ping.exe
                                                                          PID:4872
                                                                        • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                                          "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                                          22⤵
                                                                          • Checks computer location settings
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:3756
                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                            "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                            23⤵
                                                                            • Scheduled Task/Job: Scheduled Task
                                                                            PID:4908
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B5ECh1GggdXs.bat" "
                                                                            23⤵
                                                                              PID:3008
                                                                              • C:\Windows\system32\chcp.com
                                                                                chcp 65001
                                                                                24⤵
                                                                                  PID:2376
                                                                                • C:\Windows\system32\PING.EXE
                                                                                  ping -n 10 localhost
                                                                                  24⤵
                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                  • Runs ping.exe
                                                                                  PID:1960
                                                                                • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                                                  "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                                                  24⤵
                                                                                  • Checks computer location settings
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                  • Suspicious use of SendNotifyMessage
                                                                                  PID:4812
                                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                                    "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                                    25⤵
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:5064
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ysOe20PhUfs6.bat" "
                                                                                    25⤵
                                                                                      PID:3244
                                                                                      • C:\Windows\system32\chcp.com
                                                                                        chcp 65001
                                                                                        26⤵
                                                                                          PID:2640
                                                                                        • C:\Windows\system32\PING.EXE
                                                                                          ping -n 10 localhost
                                                                                          26⤵
                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                          • Runs ping.exe
                                                                                          PID:1840
                                                                                        • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                                                          "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                                                          26⤵
                                                                                          • Checks computer location settings
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                          • Suspicious use of SendNotifyMessage
                                                                                          PID:1172
                                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                                            "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                                            27⤵
                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                            PID:4996
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vl4ysJcWMm17.bat" "
                                                                                            27⤵
                                                                                              PID:2936
                                                                                              • C:\Windows\system32\chcp.com
                                                                                                chcp 65001
                                                                                                28⤵
                                                                                                  PID:3324
                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                  ping -n 10 localhost
                                                                                                  28⤵
                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                  • Runs ping.exe
                                                                                                  PID:3720
                                                                                                • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                                                                  "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                                                                  28⤵
                                                                                                  • Checks computer location settings
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                                  • Suspicious use of SendNotifyMessage
                                                                                                  PID:4696
                                                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                    "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                                                    29⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:2300
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oGCgszOmOTZZ.bat" "
                                                                                                    29⤵
                                                                                                      PID:4272
                                                                                                      • C:\Windows\system32\chcp.com
                                                                                                        chcp 65001
                                                                                                        30⤵
                                                                                                          PID:2304
                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                          ping -n 10 localhost
                                                                                                          30⤵
                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                          • Runs ping.exe
                                                                                                          PID:876
                                                                                                        • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                                                                          "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                                                                          30⤵
                                                                                                          • Checks computer location settings
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                                          • Suspicious use of SendNotifyMessage
                                                                                                          PID:116
                                                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                            "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                                                            31⤵
                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                            PID:3864
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZypI6MVk2kvK.bat" "
                                                                                                            31⤵
                                                                                                              PID:1068
                                                                                                              • C:\Windows\system32\chcp.com
                                                                                                                chcp 65001
                                                                                                                32⤵
                                                                                                                  PID:2244
                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                  ping -n 10 localhost
                                                                                                                  32⤵
                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                  • Runs ping.exe
                                                                                                                  PID:1516

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Client.exe.log

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    8f0271a63446aef01cf2bfc7b7c7976b

                                                    SHA1

                                                    b70dad968e1dda14b55ad361b7fd4ef9ab6c06d7

                                                    SHA256

                                                    da740d78ae00b72cb3710d1a1256dc6431550965d20afaa65e5d5860a4748e8c

                                                    SHA512

                                                    78a403c69f1284b7dd41527019f3eede3512a5e4d439d846eca83557b741ca37bcf56c412f3e577b9dd4cfa5a6d6210961215f14cb271b143f6eb94f69389cf5

                                                  • C:\Users\Admin\AppData\Local\Temp\7UWzM2VzME2O.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    4325baa43825b172fb1408d09ee3147f

                                                    SHA1

                                                    78b17c7a2f4a0371737adef477cfa1cfd8b2a7d8

                                                    SHA256

                                                    5ba83467afbed5b2a53eadeb36027b3d4011e0897c3656eb198d5e436e01684e

                                                    SHA512

                                                    34bac8f94bf0091ecf186d214e7d099fe1e4e6ca77b36a225d478a4fd665ed289f14be05763583d81f949b5cedab67e141817a0d25624f261c3eed0f70e000b9

                                                  • C:\Users\Admin\AppData\Local\Temp\B5ECh1GggdXs.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    d2e9cd05ead63495ce1e3cae39300b21

                                                    SHA1

                                                    f5271640c3e4ad1f85ec68c89284203dbe09b3f1

                                                    SHA256

                                                    bf2bdf9885aa051b63c8a761653db6c491ab3634c33454a962152aaf1ec9be9e

                                                    SHA512

                                                    a73dc60312d8f0662d18927c4138d73fe193d71989ce83a24a81768421741a8ebf5347fe188f9c111ccd8cadb7e8681b7940c25d9297f32cbf725567ed8524cd

                                                  • C:\Users\Admin\AppData\Local\Temp\DXevDlc1pvgx.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    1d6af073ef030c56a526ddab2bcf53cd

                                                    SHA1

                                                    d455256bb521a5f230805cc58e2010cec6d26c19

                                                    SHA256

                                                    0c7daef89508d0d7d716048d03a3df423f7577f9558c14303c59ae80977e0cca

                                                    SHA512

                                                    c579506e8698c9dec16bc94bb9bb8cb18bf7a85954d129860f91ec9bc811a4324fa338bc930f9e451a109025060f7656afaccbc7447d2efcdd739682a41d67ce

                                                  • C:\Users\Admin\AppData\Local\Temp\KP6dOaQ8UlKo.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    d089ea735584f6afad0c73d4a6c0adff

                                                    SHA1

                                                    b9aab85e1869a35b178f671a2a471da822e69ab5

                                                    SHA256

                                                    7619386ba667510da01da942d98be45869a2791a1caaa2cd84363da671e86808

                                                    SHA512

                                                    8e15493a3573fcd16aad0805f710081ec0d1b121d6c2c48962faf9d8b77a0c0fb57a8df506c1c613c404091b6115bf5082307fef7d5e117ac0a2738855a6db9e

                                                  • C:\Users\Admin\AppData\Local\Temp\KYKNDUpJ1JUO.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    a76fefa98adad549237dc4bf94b2bc1b

                                                    SHA1

                                                    d77ad0836b672016a321cbf9b2a02115da588442

                                                    SHA256

                                                    b8346165bef823be8431fbc17fcc8d8f23ddc65638121d4e9f3f89a714bf9d23

                                                    SHA512

                                                    9a000ac4b508f8a43e3231bef1119ae9527b41f58550bbb0217e557a323f2998674134e973d8f6dd790b78b7c627e006b4d8dfa3ba222090d058a5e60fca7d3a

                                                  • C:\Users\Admin\AppData\Local\Temp\Vjk56ZH8zYHd.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    631fe1edcbad72cde2015fcf1976e591

                                                    SHA1

                                                    3554a5e1ab59558789892525116ed946d7716371

                                                    SHA256

                                                    aa99dfba4cb18a5bb1bfb421e2f637919b1f10a9cff7a5c9b6f8c179a2bc7856

                                                    SHA512

                                                    0afd3e7f716c5cb30bd698656a59bd1b905001df59c11718a96f2387892adfd5fba47a99fc304a1448886bc6440b2756254eef84337ae412d40832bb000ec380

                                                  • C:\Users\Admin\AppData\Local\Temp\ZypI6MVk2kvK.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    62a792e0ad7304c5da214fd444b3c782

                                                    SHA1

                                                    674b841ab9c34025bfa3a9615e7b38a87a3a9ce9

                                                    SHA256

                                                    5b698481328c2f0fe302779d5a88f28959616e31c6b3ce025ddc6d5d0c0a493b

                                                    SHA512

                                                    4ebbe7916d3b14f189cd0e4921a87003a2e6f123d4845c037f271ff3e96313010b73105b81bb96b1ae2aed5594b22ac80fb80039bc66e558e207a6f29141f040

                                                  • C:\Users\Admin\AppData\Local\Temp\a04ZkgGk6ghc.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    136c5acc6d10c6edefe9e625c75ef451

                                                    SHA1

                                                    c7cab5ce3b48b1bcbbdebe86c48cf4f3564b5fec

                                                    SHA256

                                                    9b53a2d227bddc5f4b7ccf99b7b8a8ed1fa6e1494bc794db980b4f367163169e

                                                    SHA512

                                                    af15ff8219163a45938912eb7fd20914d782294a91e9587be40887c64ee708acf75495763ae07ea451003ed3dd2255417c65b1e2dfe9d32321e38a32ab023894

                                                  • C:\Users\Admin\AppData\Local\Temp\dvVIHgwxHlwV.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    2f6359bdd8e399143a3f69ebed3ac269

                                                    SHA1

                                                    d97aae2b0220c7559cc6f6b8bff895cc25f04dab

                                                    SHA256

                                                    7a0c3a5ec070dbf2dd0388fb3b0b3f7774bbf89586d0ebb63ba04631db23b0ab

                                                    SHA512

                                                    74b05fc66b9ed52041f1736264d94493ed6b374c0d3089a33daddc97e962485c2ffd6ad63853c717d97d75b733e17729daca6a6c6924be596c3031b906c43e0a

                                                  • C:\Users\Admin\AppData\Local\Temp\iOw3QMGlFMJV.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    b4aeadd9fd8238f7ff7ec1cb39da85e6

                                                    SHA1

                                                    b6057bd4daacf167704286e4a9efd16097ff1f8a

                                                    SHA256

                                                    214b41e8b6684f16dbe6e02b27c0087d6e489003e559190cd60d43b7bf77f92e

                                                    SHA512

                                                    ddd52995d80ed5ccc6c5457670d449d8ad2361cb97466579ec667d003d7e7e7fed56e08bdb350b63223654d4bf1876eaa8f2b0502caca1e5aa0b139ef9100ad4

                                                  • C:\Users\Admin\AppData\Local\Temp\nfGI00sF3V1t.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    96acffada781e2f134004be7b6093277

                                                    SHA1

                                                    b0931582900b7a54fa08c3ccfc7fa3c6ac420ba7

                                                    SHA256

                                                    a3dda62fea921bece492c47ece41f318e66bf96689d26f587df3e7f6bd4d2d85

                                                    SHA512

                                                    68417559fff4bf342ab6103ad250d14c68ca8ab973965cb40ef2a9928b88dec93b64f027f6128e8e886155c0457f1206956a8dc2cca0a87ba9516704bb7bdf47

                                                  • C:\Users\Admin\AppData\Local\Temp\oGCgszOmOTZZ.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    cc2e53463b44e852bdf7dbad1fc4757a

                                                    SHA1

                                                    29f6aa10c31d62396cd7c5914c2079877a96bac0

                                                    SHA256

                                                    27a84ccc5c4f803a65888e937526cb1d296d4b6c3eb26b1db801069fe125f1af

                                                    SHA512

                                                    662baa2d0cf7345f5518835a87d7270e8449738d323582d39071336c012f6ade3e616c70d69d19a8b171fe41db4b5850995c90b55be89f44109e0356757a6568

                                                  • C:\Users\Admin\AppData\Local\Temp\vZSA196xOb8R.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    01d1f36df7d9e861f8c9a24212fcb8d7

                                                    SHA1

                                                    5a1f1fa659b4d5cabc6c641f6517f3d4225a5ec7

                                                    SHA256

                                                    1316b3cc61a137213ce747a08c6dedfec5f035056ece6973665df4905f44fd67

                                                    SHA512

                                                    eb5cb397f3040c0c434adbac7d73001b2f57ba6ecd9ce6d3e324ccdf7d95022789177aa3eca8a19170ed26a424605e15c607a7c8af1ab9e35196d6e4d7b348ef

                                                  • C:\Users\Admin\AppData\Local\Temp\vl4ysJcWMm17.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    2527eed6139729ac2332f49afece5695

                                                    SHA1

                                                    9af11e83a0e0424e54b45e6c3744da97a0c7a0ee

                                                    SHA256

                                                    6670511eb21c79c936288228813a5d0d8027b9b4f064111c83cf8cb56490abaa

                                                    SHA512

                                                    f19a6511ed42ccc9d08e767e31c3e9a6ab0c69bfd16a851e76cda2f1fc2d963c18a887f61c6b0f5a5284d29b26543e5342fd940d5df53f70b5d1e81443f16bbe

                                                  • C:\Users\Admin\AppData\Local\Temp\ysOe20PhUfs6.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    78fe456695c828120938c948316785fd

                                                    SHA1

                                                    811b5fae69df523e8f9fa0cded646144fca0ad8c

                                                    SHA256

                                                    373eb2a2cb3cd7b1e6d92f124567cb1bb3eafea3c43c8019875d19d88007074c

                                                    SHA512

                                                    93dc59b625b19e6dd0f1fefb85c97a7829a64a3ff7d49f3b30723154050dc733a40c1a8e8b3d16a01e4ad454c2a72b43e672b1a8b76f3cff7d803fa95f05e482

                                                  • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

                                                    Filesize

                                                    3.1MB

                                                    MD5

                                                    2d60a76ce3357eecb47f10d21ba01fb0

                                                    SHA1

                                                    1798a8dee078e7bd72296e79bbd2c2061d584fd7

                                                    SHA256

                                                    55fd96a344bf6ccbf74dc7408f77f1080158fc2a0a20903b20e77a9cee2983d1

                                                    SHA512

                                                    184f946295c7669f46a8fb878cb68bea943ed09c74cbd3588d4d7572295668edc8ba098f4e8c2deb21977d08ecc4b1f8e34376c4bb3074073e889864f04852e8

                                                  • memory/1816-0-0x00007FF96A283000-0x00007FF96A285000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/1816-10-0x00007FF96A280000-0x00007FF96AD41000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/1816-2-0x00007FF96A280000-0x00007FF96AD41000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/1816-1-0x0000000000A80000-0x0000000000DA4000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/4392-19-0x00007FF96A280000-0x00007FF96AD41000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/4392-13-0x000000001D7A0000-0x000000001D852000-memory.dmp

                                                    Filesize

                                                    712KB

                                                  • memory/4392-12-0x000000001D690000-0x000000001D6E0000-memory.dmp

                                                    Filesize

                                                    320KB

                                                  • memory/4392-11-0x00007FF96A280000-0x00007FF96AD41000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/4392-9-0x00007FF96A280000-0x00007FF96AD41000-memory.dmp

                                                    Filesize

                                                    10.8MB