Malware Analysis Report

2025-04-13 23:57

Sample ID 241104-r5ksyasank
Target c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebbN
SHA256 c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebb
Tags
defense_evasion discovery evasion persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebb

Threat Level: Known bad

The file c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebbN was found to be: Known bad.

Malicious Activity Summary

defense_evasion discovery evasion persistence trojan

Windows security bypass

Boot or Logon Autostart Execution: Active Setup

Event Triggered Execution: Image File Execution Options Injection

Executes dropped EXE

Loads dropped DLL

Windows security modification

Indicator Removal: Clear Persistence

Modifies WinLogon

Drops file in System32 directory

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-04 14:46

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-04 14:46

Reported

2024-11-04 14:50

Platform

win7-20240903-en

Max time kernel

120s

Max time network

20s

Command Line

winlogon.exe

Signatures

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

Boot or Logon Autostart Execution: Active Setup

persistence
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{564F5248-5042-4142-564F-524850424142}\IsInstalled = "1" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{564F5248-5042-4142-564F-524850424142}\StubPath = "C:\\Windows\\system32\\akfeaxub.exe" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{564F5248-5042-4142-564F-524850424142} C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{564F5248-5042-4142-564F-524850424142}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

Event Triggered Execution: Image File Execution Options Injection

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\oudseadup-emum.exe" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

Indicator Removal: Clear Persistence

defense_evasion
Description Indicator Process Target
Delete value \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

Modifies WinLogon

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\eabxuvud.dll" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\akfeaxub.exe C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
File created C:\Windows\SysWOW64\akfeaxub.exe C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
File opened for modification C:\Windows\SysWOW64\eabxuvud.dll C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
File opened for modification C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Users\Admin\AppData\Local\Temp\c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebbN.exe N/A
File created C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Users\Admin\AppData\Local\Temp\c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebbN.exe N/A
File opened for modification C:\Windows\SysWOW64\oudseadup-emum.exe C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
File created C:\Windows\SysWOW64\oudseadup-emum.exe C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
File created C:\Windows\SysWOW64\eabxuvud.dll C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
File opened for modification C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebbN.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebbN.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2404 wrote to memory of 1664 N/A C:\Users\Admin\AppData\Local\Temp\c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebbN.exe C:\Windows\SysWOW64\ihxikoan-efat.exe
PID 2404 wrote to memory of 1664 N/A C:\Users\Admin\AppData\Local\Temp\c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebbN.exe C:\Windows\SysWOW64\ihxikoan-efat.exe
PID 2404 wrote to memory of 1664 N/A C:\Users\Admin\AppData\Local\Temp\c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebbN.exe C:\Windows\SysWOW64\ihxikoan-efat.exe
PID 2404 wrote to memory of 1664 N/A C:\Users\Admin\AppData\Local\Temp\c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebbN.exe C:\Windows\SysWOW64\ihxikoan-efat.exe
PID 1664 wrote to memory of 432 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\system32\winlogon.exe
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1164 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\SysWOW64\ihxikoan-efat.exe
PID 1664 wrote to memory of 1164 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\SysWOW64\ihxikoan-efat.exe
PID 1664 wrote to memory of 1164 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\SysWOW64\ihxikoan-efat.exe
PID 1664 wrote to memory of 1164 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\SysWOW64\ihxikoan-efat.exe
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 1664 wrote to memory of 1212 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\system32\winlogon.exe

winlogon.exe

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebbN.exe

"C:\Users\Admin\AppData\Local\Temp\c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebbN.exe"

C:\Windows\SysWOW64\ihxikoan-efat.exe

"C:\Windows\system32\ihxikoan-efat.exe"

C:\Windows\SysWOW64\ihxikoan-efat.exe

--k33p

Network

N/A

Files

\Windows\SysWOW64\ihxikoan-efat.exe

MD5 9cfc5c63be0deeef453ce5a86b7f8ff0
SHA1 e5decea697f1af55d2e97f9f30fca430ea3f086d
SHA256 c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebb
SHA512 524c98087941b4738acc28804576667b8a235319af7ccebacbe891b3ea3acb4af9bfa89ed805509235b60d31da539e7fe6f3a5c8290e02386194a96702a18cc2

memory/2404-9-0x0000000000400000-0x0000000000414000-memory.dmp

C:\Windows\SysWOW64\oudseadup-emum.exe

MD5 f625b00a3a28afb2fa44578fe038b16b
SHA1 3f521c55d7afe6a7386bd720990d2fc0ae009036
SHA256 042be31199cd36a9894082690a67b55e70e5e9adf541d3a1e764242585ee1a05
SHA512 7a66c4c4a3b546a6ebbcfb80bc18fc6406fb9917781e9c6aea4960cf85abfa72b8f6941dbd7cdf6b04a2620b9132d11f18ca968dc3ce01262dc4de109058f56e

C:\Windows\SysWOW64\akfeaxub.exe

MD5 f4afe1627a150675b9c1d9dca66591ef
SHA1 0daf4a14b10403800487f354a19da2c3c87c592f
SHA256 d84bdd90bb2086fc0fe874e505df3136e211e4c291592be5f9fde9bea2addea9
SHA512 12f357a56c03fcd46b7d376f000c71e6f4cac6ca63734f3d7eeee845cf480935bbd0b2e1ba0693ffad36d03e0901765c2df769225f3b3f57466211f0fe483609

C:\Windows\SysWOW64\eabxuvud.dll

MD5 f37b21c00fd81bd93c89ce741a88f183
SHA1 b2796500597c68e2f5638e1101b46eaf32676c1c
SHA256 76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512 252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

memory/1664-52-0x0000000000400000-0x0000000000414000-memory.dmp

memory/1164-53-0x0000000000400000-0x0000000000414000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-04 14:46

Reported

2024-11-04 14:52

Platform

win10v2004-20241007-en

Max time kernel

120s

Max time network

133s

Command Line

winlogon.exe

Signatures

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

Boot or Logon Autostart Execution: Active Setup

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5951524C-4b59-4f4e-5951-524C4B594f4e} C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5951524C-4b59-4f4e-5951-524C4B594f4e}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5951524C-4b59-4f4e-5951-524C4B594f4e}\IsInstalled = "1" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5951524C-4b59-4f4e-5951-524C4B594f4e}\StubPath = "C:\\Windows\\system32\\akfeaxub.exe" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

Event Triggered Execution: Image File Execution Options Injection

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\oudseadup-emum.exe" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

Indicator Removal: Clear Persistence

defense_evasion
Description Indicator Process Target
Delete value \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

Modifies WinLogon

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\eabxuvud.dll" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\oudseadup-emum.exe C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
File created C:\Windows\SysWOW64\akfeaxub.exe C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
File created C:\Windows\SysWOW64\eabxuvud.dll C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
File opened for modification C:\Windows\SysWOW64\akfeaxub.exe C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
File opened for modification C:\Windows\SysWOW64\eabxuvud.dll C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
File opened for modification C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
File opened for modification C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Users\Admin\AppData\Local\Temp\c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebbN.exe N/A
File created C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Users\Admin\AppData\Local\Temp\c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebbN.exe N/A
File created C:\Windows\SysWOW64\oudseadup-emum.exe C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebbN.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A
N/A N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebbN.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\ihxikoan-efat.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 32 wrote to memory of 3180 N/A C:\Users\Admin\AppData\Local\Temp\c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebbN.exe C:\Windows\SysWOW64\ihxikoan-efat.exe
PID 32 wrote to memory of 3180 N/A C:\Users\Admin\AppData\Local\Temp\c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebbN.exe C:\Windows\SysWOW64\ihxikoan-efat.exe
PID 32 wrote to memory of 3180 N/A C:\Users\Admin\AppData\Local\Temp\c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebbN.exe C:\Windows\SysWOW64\ihxikoan-efat.exe
PID 3180 wrote to memory of 616 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\system32\winlogon.exe
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 1608 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\SysWOW64\ihxikoan-efat.exe
PID 3180 wrote to memory of 1608 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\SysWOW64\ihxikoan-efat.exe
PID 3180 wrote to memory of 1608 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\SysWOW64\ihxikoan-efat.exe
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE
PID 3180 wrote to memory of 3496 N/A C:\Windows\SysWOW64\ihxikoan-efat.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\system32\winlogon.exe

winlogon.exe

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebbN.exe

"C:\Users\Admin\AppData\Local\Temp\c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebbN.exe"

C:\Windows\SysWOW64\ihxikoan-efat.exe

"C:\Windows\system32\ihxikoan-efat.exe"

C:\Windows\SysWOW64\ihxikoan-efat.exe

--k33p

Network

Country Destination Domain Proto
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 150.171.28.10:443 g.bing.com tcp
US 8.8.8.8:53 ruaqkmozuggss udp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 ruaqkmozuggss udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 107.12.20.2.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp

Files

C:\Windows\SysWOW64\ihxikoan-efat.exe

MD5 9cfc5c63be0deeef453ce5a86b7f8ff0
SHA1 e5decea697f1af55d2e97f9f30fca430ea3f086d
SHA256 c5831bb6e3eb0a1b7ebc4479644878b37edaf3d0eb13e2e2c1953b0b74349ebb
SHA512 524c98087941b4738acc28804576667b8a235319af7ccebacbe891b3ea3acb4af9bfa89ed805509235b60d31da539e7fe6f3a5c8290e02386194a96702a18cc2

memory/32-6-0x0000000000400000-0x0000000000414000-memory.dmp

C:\Windows\SysWOW64\akfeaxub.exe

MD5 cf8fd5fe360dde8e29512d5d70554b43
SHA1 172b47dd57c520f40b2781b2dc7a8d408a412221
SHA256 c67e4e362905cc644376467a766b67ec9176795af795fe52e00c569aa3173b03
SHA512 228389b885d78cb4095691f8d4d7a00c4b29d366e057181214df48b0d12dd5ff84fc8a3aed3fbc72b2fc969a64bf08853b0ee9fa319377ef6c5554569e5066b9

C:\Windows\SysWOW64\oudseadup-emum.exe

MD5 7d341bd64c81fe3e93a040fb9cb5980f
SHA1 37ef30c5ea0fd80c656b5c45a37deb95a11821da
SHA256 9f174a1000cf9c356a397734e35064ad41019c453c84661102c5c9db1b97d353
SHA512 387b344fe3719593e40e2450c52bea409218bccb1d61271757d4c9c219875b78ae62caac2e97b85043975689e56ffdaf86c97d011b3d1d467e5c1cc46840e5a2

C:\Windows\SysWOW64\eabxuvud.dll

MD5 f37b21c00fd81bd93c89ce741a88f183
SHA1 b2796500597c68e2f5638e1101b46eaf32676c1c
SHA256 76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512 252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

memory/1608-44-0x0000000000400000-0x0000000000414000-memory.dmp

memory/3180-43-0x0000000000400000-0x0000000000414000-memory.dmp