Malware Analysis Report

2024-12-07 16:33

Sample ID 241114-bqeqdawkel
Target a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e
SHA256 a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e
Tags
upx defense_evasion discovery evasion persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e

Threat Level: Known bad

The file a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e was found to be: Known bad.

Malicious Activity Summary

upx defense_evasion discovery evasion persistence trojan

Windows security bypass

Boot or Logon Autostart Execution: Active Setup

Event Triggered Execution: Image File Execution Options Injection

Loads dropped DLL

Windows security modification

Executes dropped EXE

Modifies WinLogon

Indicator Removal: Clear Persistence

UPX packed file

Drops file in System32 directory

Drops file in Program Files directory

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-14 01:20

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-14 01:20

Reported

2024-11-14 01:23

Platform

win7-20240729-en

Max time kernel

149s

Max time network

121s

Command Line

winlogon.exe

Signatures

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "24064" C:\Windows\SysWOW64\issefeh.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "24064" C:\Windows\SysWOW64\issefeh.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "24064" C:\Windows\SysWOW64\issefeh.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "24064" C:\Windows\SysWOW64\issefeh.exe N/A

Boot or Logon Autostart Execution: Active Setup

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{58454355-444e-4344-5845-4355444E4344} C:\Windows\SysWOW64\issefeh.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{58454355-444e-4344-5845-4355444E4344}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" C:\Windows\SysWOW64\issefeh.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{58454355-444e-4344-5845-4355444E4344}\IsInstalled = "1" C:\Windows\SysWOW64\issefeh.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{58454355-444e-4344-5845-4355444E4344}\StubPath = "C:\\Windows\\system32\\unlirik.exe" C:\Windows\SysWOW64\issefeh.exe N/A

Event Triggered Execution: Image File Execution Options Injection

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe C:\Windows\SysWOW64\issefeh.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" C:\Windows\SysWOW64\issefeh.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\oxmearoax-oufom.exe" C:\Windows\SysWOW64\issefeh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "24064" C:\Windows\SysWOW64\issefeh.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "24064" C:\Windows\SysWOW64\issefeh.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "24064" C:\Windows\SysWOW64\issefeh.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "24064" C:\Windows\SysWOW64\issefeh.exe N/A

Indicator Removal: Clear Persistence

defense_evasion
Description Indicator Process Target
Delete value \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger C:\Windows\SysWOW64\issefeh.exe N/A

Modifies WinLogon

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" C:\Windows\SysWOW64\issefeh.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} C:\Windows\SysWOW64\issefeh.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify C:\Windows\SysWOW64\issefeh.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" C:\Windows\SysWOW64\issefeh.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\uvbecood.dll" C:\Windows\SysWOW64\issefeh.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\issefeh.exe C:\Users\Admin\AppData\Local\Temp\a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e.exe N/A
File created C:\Windows\SysWOW64\oxmearoax-oufom.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\unlirik.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\rmass.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\ahuy.exe C:\Windows\SysWOW64\issefeh.exe N/A
File created C:\Windows\SysWOW64\issefeh.exe C:\Users\Admin\AppData\Local\Temp\a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e.exe N/A
File opened for modification C:\Windows\SysWOW64\oxmearoax-oufom.exe C:\Windows\SysWOW64\issefeh.exe N/A
File created C:\Windows\SysWOW64\unlirik.exe C:\Windows\SysWOW64\issefeh.exe N/A
File created C:\Windows\SysWOW64\uvbecood.dll C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\idbg32.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\ntdbg.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\RECOVER32.DLL C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\gymspzd.dll C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\issefeh.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\uvbecood.dll C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\winrnt.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\aset32.exe C:\Windows\SysWOW64\issefeh.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Common Files\System\ahuy.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\idbg32.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\ntdbg.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\RECOVER32.DLL C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\gymspzd.dll C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\winrnt.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\rmass.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\aset32.exe C:\Windows\SysWOW64\issefeh.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\issefeh.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\issefeh.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2124 wrote to memory of 2352 N/A C:\Users\Admin\AppData\Local\Temp\a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e.exe C:\Windows\SysWOW64\issefeh.exe
PID 2124 wrote to memory of 2352 N/A C:\Users\Admin\AppData\Local\Temp\a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e.exe C:\Windows\SysWOW64\issefeh.exe
PID 2124 wrote to memory of 2352 N/A C:\Users\Admin\AppData\Local\Temp\a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e.exe C:\Windows\SysWOW64\issefeh.exe
PID 2124 wrote to memory of 2352 N/A C:\Users\Admin\AppData\Local\Temp\a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e.exe C:\Windows\SysWOW64\issefeh.exe
PID 2352 wrote to memory of 432 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\system32\winlogon.exe
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1376 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\SysWOW64\issefeh.exe
PID 2352 wrote to memory of 1376 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\SysWOW64\issefeh.exe
PID 2352 wrote to memory of 1376 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\SysWOW64\issefeh.exe
PID 2352 wrote to memory of 1376 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\SysWOW64\issefeh.exe
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 2352 wrote to memory of 1260 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\system32\winlogon.exe

winlogon.exe

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e.exe

"C:\Users\Admin\AppData\Local\Temp\a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e.exe"

C:\Windows\SysWOW64\issefeh.exe

"C:\Windows\system32\issefeh.exe"

C:\Windows\SysWOW64\issefeh.exe

--k33p

Network

Country Destination Domain Proto
US 8.8.8.8:53 qzkresafnyeef.museum udp
US 8.8.8.8:53 qzkresafnyeef.museum udp

Files

memory/2124-0-0x0000000000400000-0x0000000000417000-memory.dmp

\Windows\SysWOW64\issefeh.exe

MD5 43641196e0d4c8995133d4d3c721a0c4
SHA1 422ef769e8eaf0ef26ebb71b43d3f762a25dadce
SHA256 a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e
SHA512 eb00d08f1dbcf2aed302d4499d6589ff1e5f73ad7986804668d0c2a0b0c1009e2f4c556a386e4340a789098f32604e6f3c4ac286a3a66c72ae94a96a2e4f681b

memory/2352-24-0x00000000003E0000-0x00000000003F7000-memory.dmp

memory/2124-11-0x0000000000400000-0x0000000000417000-memory.dmp

C:\Windows\SysWOW64\unlirik.exe

MD5 0dda6f4cc1d390b630cf029f37dda6c0
SHA1 75cf7e3f84a85b62f95600781be1c8c8ef7a4979
SHA256 aa3e37986b084fe4b78b91bc26131d0f96af5edcd8a796df087eb4ee31b164d6
SHA512 6e3c7ab2a08840f92e7f557561c76935442dc75ed06bd28907758a1e807d800a6a58f7e46c0607fd959f1925e749372b9a18e5d2b39483939b7a60fc3efb7b7b

C:\Windows\SysWOW64\oxmearoax-oufom.exe

MD5 9bc1c0393daeb23fd75fd7bbd5759846
SHA1 8e2f15034edce62a61f64b5416191d9ae3e05e4e
SHA256 9e176d6fe0e7f192ddfa8c0a24157e951f342f7cb710974ee85e39caff782c4d
SHA512 6a7ba5d38fea83d96432eb3a9618518b9fce8c748d6ddaf5e94a37617127e8b08d84f66422ad6505e46b3f3492b3b77b8451eda75e683617cd102b385e78f414

C:\Windows\SysWOW64\uvbecood.dll

MD5 c8521a5fdd1c9387d536f599d850b195
SHA1 a543080665107b7e32bcc1ed19dbfbc1d2931356
SHA256 fa8f77b6daf775d66de9d27c1d896168a792057358e518c00e72b8964b966ca5
SHA512 541500e2cd502852a007d29badc1a1848d187245f78ec272281bab290cc6e308f0ae6d1b96863e0c30a176b16c6cf7e63e08a8de81a84615e4710e7164a805cd

memory/2352-46-0x0000000000400000-0x0000000000417000-memory.dmp

memory/1376-53-0x0000000000400000-0x0000000000417000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-14 01:20

Reported

2024-11-14 01:23

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

151s

Command Line

winlogon.exe

Signatures

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "24064" C:\Windows\SysWOW64\issefeh.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "24064" C:\Windows\SysWOW64\issefeh.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "24064" C:\Windows\SysWOW64\issefeh.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "24064" C:\Windows\SysWOW64\issefeh.exe N/A

Boot or Logon Autostart Execution: Active Setup

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{47594841-534f-4c53-4759-4841534F4c53} C:\Windows\SysWOW64\issefeh.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{47594841-534f-4c53-4759-4841534F4c53}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" C:\Windows\SysWOW64\issefeh.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{47594841-534f-4c53-4759-4841534F4c53}\IsInstalled = "1" C:\Windows\SysWOW64\issefeh.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{47594841-534f-4c53-4759-4841534F4c53}\StubPath = "C:\\Windows\\system32\\unlirik.exe" C:\Windows\SysWOW64\issefeh.exe N/A

Event Triggered Execution: Image File Execution Options Injection

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe C:\Windows\SysWOW64\issefeh.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" C:\Windows\SysWOW64\issefeh.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\oxmearoax-oufom.exe" C:\Windows\SysWOW64\issefeh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "24064" C:\Windows\SysWOW64\issefeh.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "24064" C:\Windows\SysWOW64\issefeh.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "24064" C:\Windows\SysWOW64\issefeh.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "24064" C:\Windows\SysWOW64\issefeh.exe N/A

Indicator Removal: Clear Persistence

defense_evasion
Description Indicator Process Target
Delete value \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger C:\Windows\SysWOW64\issefeh.exe N/A

Modifies WinLogon

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} C:\Windows\SysWOW64\issefeh.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify C:\Windows\SysWOW64\issefeh.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" C:\Windows\SysWOW64\issefeh.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\uvbecood.dll" C:\Windows\SysWOW64\issefeh.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" C:\Windows\SysWOW64\issefeh.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\RECOVER32.DLL C:\Windows\SysWOW64\issefeh.exe N/A
File created C:\Windows\SysWOW64\oxmearoax-oufom.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\aset32.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\ntdbg.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\unlirik.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\uvbecood.dll C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\winrnt.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\gymspzd.dll C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\rmass.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\ahuy.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\idbg32.exe C:\Windows\SysWOW64\issefeh.exe N/A
File created C:\Windows\SysWOW64\unlirik.exe C:\Windows\SysWOW64\issefeh.exe N/A
File created C:\Windows\SysWOW64\uvbecood.dll C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\issefeh.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Windows\SysWOW64\issefeh.exe C:\Users\Admin\AppData\Local\Temp\a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e.exe N/A
File created C:\Windows\SysWOW64\issefeh.exe C:\Users\Admin\AppData\Local\Temp\a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e.exe N/A
File opened for modification C:\Windows\SysWOW64\oxmearoax-oufom.exe C:\Windows\SysWOW64\issefeh.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Common Files\System\winrnt.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\rmass.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\aset32.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\ahuy.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\idbg32.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\ntdbg.exe C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\RECOVER32.DLL C:\Windows\SysWOW64\issefeh.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\gymspzd.dll C:\Windows\SysWOW64\issefeh.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\issefeh.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\issefeh.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A
N/A N/A C:\Windows\SysWOW64\issefeh.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\issefeh.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3608 wrote to memory of 3884 N/A C:\Users\Admin\AppData\Local\Temp\a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e.exe C:\Windows\SysWOW64\issefeh.exe
PID 3608 wrote to memory of 3884 N/A C:\Users\Admin\AppData\Local\Temp\a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e.exe C:\Windows\SysWOW64\issefeh.exe
PID 3608 wrote to memory of 3884 N/A C:\Users\Admin\AppData\Local\Temp\a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e.exe C:\Windows\SysWOW64\issefeh.exe
PID 3884 wrote to memory of 2204 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\SysWOW64\issefeh.exe
PID 3884 wrote to memory of 2204 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\SysWOW64\issefeh.exe
PID 3884 wrote to memory of 2204 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\SysWOW64\issefeh.exe
PID 3884 wrote to memory of 592 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\system32\winlogon.exe
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE
PID 3884 wrote to memory of 3484 N/A C:\Windows\SysWOW64\issefeh.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\system32\winlogon.exe

winlogon.exe

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e.exe

"C:\Users\Admin\AppData\Local\Temp\a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e.exe"

C:\Windows\SysWOW64\issefeh.exe

"C:\Windows\system32\issefeh.exe"

C:\Windows\SysWOW64\issefeh.exe

--k33p

Network

Country Destination Domain Proto
US 8.8.8.8:53 huyuunihuasqt.nu udp
US 8.8.8.8:53 huyuunihuasqt.nu udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 181.129.81.91.in-addr.arpa udp
US 8.8.8.8:53 73.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 9.173.189.20.in-addr.arpa udp

Files

memory/3608-0-0x0000000000400000-0x0000000000417000-memory.dmp

memory/3608-7-0x0000000000400000-0x0000000000417000-memory.dmp

C:\Windows\SysWOW64\issefeh.exe

MD5 43641196e0d4c8995133d4d3c721a0c4
SHA1 422ef769e8eaf0ef26ebb71b43d3f762a25dadce
SHA256 a81b318fbfd733366340305a6f77bd73e879049b26d1a5e42c3e59f424fe822e
SHA512 eb00d08f1dbcf2aed302d4499d6589ff1e5f73ad7986804668d0c2a0b0c1009e2f4c556a386e4340a789098f32604e6f3c4ac286a3a66c72ae94a96a2e4f681b

memory/2204-18-0x0000000000400000-0x0000000000417000-memory.dmp

C:\Windows\SysWOW64\unlirik.exe

MD5 e7a1fbed67fc3033d1b5cc03310738ca
SHA1 9ccd88d01d67c707da5f761df7bf1e207b7ca057
SHA256 db3b5db27054d6a0a56fed966ebab40fa4d4458ac8c5704b197afcf131f7bc44
SHA512 0eca117ba3e16b4c308aac48a0aee875c0ab99286f43c0113abcf5c8c11f52e03883e29d345e61735c9011ea546c9915495b9aa302b43f4170775f83cd455d7a

C:\Windows\SysWOW64\oxmearoax-oufom.exe

MD5 57f2c38551635b60b2279fbdb3066602
SHA1 b96eec99d8eb667e06d36fb48da77e3e95d9f24f
SHA256 a141ebd75f87ab6f313bcd3f135593f7ffe89e1de2984550fd587924f49503a7
SHA512 699b1e0c2cd7a308ee79a6d68b7c7e97a459e47dd0508790251e74ab133ac957ebb4d188dffa298029e697bc08b003fd36fe2157e3a6886c950c4991e9430fa4

C:\Windows\SysWOW64\uvbecood.dll

MD5 c8521a5fdd1c9387d536f599d850b195
SHA1 a543080665107b7e32bcc1ed19dbfbc1d2931356
SHA256 fa8f77b6daf775d66de9d27c1d896168a792057358e518c00e72b8964b966ca5
SHA512 541500e2cd502852a007d29badc1a1848d187245f78ec272281bab290cc6e308f0ae6d1b96863e0c30a176b16c6cf7e63e08a8de81a84615e4710e7164a805cd

memory/3884-43-0x0000000000400000-0x0000000000417000-memory.dmp