Analysis
-
max time kernel
296s -
max time network
1739s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 15:24
Static task
static1
Behavioral task
behavioral1
Sample
Keyrox_Installer_V1.04.15.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Keyrox_Installer_V1.04.15.exe
Resource
win10v2004-20240704-en
General
-
Target
Keyrox_Installer_V1.04.15.exe
-
Size
27.1MB
-
MD5
ee5a18efc909ea498554079ad54d1b25
-
SHA1
6d97c102dc8a08e9ba590faa5d16f69b5e310b69
-
SHA256
f6ec30cf0ba234fd8dc86488412c6d3632a741532f8dc7696b41bccc591dcec9
-
SHA512
5c569e2c67df2a79e234e76b3bded610f2cb089a8c07278f44aff15e7719ad237385273a234bc149deaa05224f3b6fb86d1b6c972d2f9bb5f13caad13162d6f6
-
SSDEEP
786432:2s8hmwbosyF6M9tv7BZlx0P8oN9jTIWBTrP:2RmwK9JTANpIyT7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1044 Keyrox_Installer_V1.04.15.tmp -
Loads dropped DLL 1 IoCs
pid Process 2932 Keyrox_Installer_V1.04.15.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1044 2932 Keyrox_Installer_V1.04.15.exe 28 PID 2932 wrote to memory of 1044 2932 Keyrox_Installer_V1.04.15.exe 28 PID 2932 wrote to memory of 1044 2932 Keyrox_Installer_V1.04.15.exe 28 PID 2932 wrote to memory of 1044 2932 Keyrox_Installer_V1.04.15.exe 28 PID 2932 wrote to memory of 1044 2932 Keyrox_Installer_V1.04.15.exe 28 PID 2932 wrote to memory of 1044 2932 Keyrox_Installer_V1.04.15.exe 28 PID 2932 wrote to memory of 1044 2932 Keyrox_Installer_V1.04.15.exe 28 PID 2596 wrote to memory of 2608 2596 chrome.exe 30 PID 2596 wrote to memory of 2608 2596 chrome.exe 30 PID 2596 wrote to memory of 2608 2596 chrome.exe 30 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2412 2596 chrome.exe 32 PID 2596 wrote to memory of 2452 2596 chrome.exe 33 PID 2596 wrote to memory of 2452 2596 chrome.exe 33 PID 2596 wrote to memory of 2452 2596 chrome.exe 33 PID 2596 wrote to memory of 2896 2596 chrome.exe 34 PID 2596 wrote to memory of 2896 2596 chrome.exe 34 PID 2596 wrote to memory of 2896 2596 chrome.exe 34 PID 2596 wrote to memory of 2896 2596 chrome.exe 34 PID 2596 wrote to memory of 2896 2596 chrome.exe 34 PID 2596 wrote to memory of 2896 2596 chrome.exe 34 PID 2596 wrote to memory of 2896 2596 chrome.exe 34 PID 2596 wrote to memory of 2896 2596 chrome.exe 34 PID 2596 wrote to memory of 2896 2596 chrome.exe 34 PID 2596 wrote to memory of 2896 2596 chrome.exe 34 PID 2596 wrote to memory of 2896 2596 chrome.exe 34 PID 2596 wrote to memory of 2896 2596 chrome.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Keyrox_Installer_V1.04.15.exe"C:\Users\Admin\AppData\Local\Temp\Keyrox_Installer_V1.04.15.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\is-8MJNU.tmp\Keyrox_Installer_V1.04.15.tmp"C:\Users\Admin\AppData\Local\Temp\is-8MJNU.tmp\Keyrox_Installer_V1.04.15.tmp" /SL5="$400F4,27984686,183808,C:\Users\Admin\AppData\Local\Temp\Keyrox_Installer_V1.04.15.exe"2⤵
- Executes dropped EXE
PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef72d9758,0x7fef72d9768,0x7fef72d97782⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1184 --field-trial-handle=1244,i,17485161403042122497,9841196825736782581,131072 /prefetch:22⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1244,i,17485161403042122497,9841196825736782581,131072 /prefetch:82⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1244,i,17485161403042122497,9841196825736782581,131072 /prefetch:82⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2264 --field-trial-handle=1244,i,17485161403042122497,9841196825736782581,131072 /prefetch:12⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2272 --field-trial-handle=1244,i,17485161403042122497,9841196825736782581,131072 /prefetch:12⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1344 --field-trial-handle=1244,i,17485161403042122497,9841196825736782581,131072 /prefetch:22⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3200 --field-trial-handle=1244,i,17485161403042122497,9841196825736782581,131072 /prefetch:12⤵PID:960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3644 --field-trial-handle=1244,i,17485161403042122497,9841196825736782581,131072 /prefetch:82⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2044 --field-trial-handle=1244,i,17485161403042122497,9841196825736782581,131072 /prefetch:12⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD599390f855b6635a7c15899bcfba38d62
SHA19d16fc387c54fe57d875abcd796edf34c3e14519
SHA256b872c9a2d972b4975236ddd6a1c0c947a2d350e3d2a2fca4b837ef05c68269fa
SHA512e0d87f5bbe06ea0d0d19b10988409714a7030ae3b80975ff805dab0153d67dd253ae0884fe6123e7ce1637bba159fc2ba5fd7bff9eee3703122e0bdfad8effb9
-
Filesize
1KB
MD505363c46358625bbf42c7c6bd823ca04
SHA13fcb553d89eecd59f935800eb6457d4692f49c0b
SHA2561befe26ed1e67ce4eb66f92ed7dba99e5f6a008401011dd5a637a0e9d8f440d1
SHA51224ad96dd3db034c8a71f68d3435c4ab364d838c9dc532f2da67824f0938fab3598bd5d59d67c0b31e68fbfc2fe4ab7c947c48302cd9cfc818c7c25250777898f
-
Filesize
361B
MD54dfa2ce5a4188fca2eb73fac15a76719
SHA1bf3e982d5f7acb477718743c2d4919b37104127b
SHA25632d6f285b71e0559684cb90f53870004b3d9a01d94ff74e861e4e3ff45f28623
SHA51293ae1ebf0b562dc83ba8b0c80376bc137c20158438677727e2eefefea5458f00c14abfcc8441ca5b8d3d2e525549156008dbf8f3a054b695316891c516bf8259
-
Filesize
6KB
MD5eb1629862b4f214d31a121678e26b6ca
SHA18232daac2eaefd198b892056f70fdef048eff814
SHA256a74b1c9b2c2684db2c283b342b69a5a354c09cb5b2f1717802c8c9edfa1d8ecc
SHA512095ba24b42739f20c9dc0ca0b357c10aeccce10295af5a864cd09042a7c0d638f157fd3f95c932b7c2878fff83e93ef06f58e7d7973352674b9fa2460456bc8e
-
Filesize
5KB
MD54ed01a4e2420fa08e0bb58c905215384
SHA18aa29e46e6d53f953cdb6310e544f46a556b06c2
SHA25618c923e0ce6b2d509f45a9854d26401b21482e32c338340d09a3888b9ba7a216
SHA512f49dbcb2503fb955b44d48b9495716300ef3f28d4e9e29ba6b7afea8c575f11c00d0e2a84d9455e41770516ed282e208042d5938ca76917bc9a1fb697f433bc7
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
1.2MB
MD55d352ef82b75a48867aafb7ae95f8987
SHA15f720a62e012ff0aa287e57a596b7a66dedf76e5
SHA25658ca3f3f57ee75501074d8298d434c7ddbbdb23809af5eafa6e87bd318f6a6b4
SHA512593a55bdc5be6b3290f01edabf73c2ba3a61f1440ab4d3010a04bc76763093784b72f3bc1b856725fbda70838ba8ab8028c9226782e981a5b8bd39ef876742e6