Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/03/2025, 00:28
Behavioral task
behavioral1
Sample
KeyGen.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
KeyGen.exe
Resource
win10v2004-20250217-en
General
-
Target
KeyGen.exe
-
Size
71KB
-
MD5
7addd5b9c97fa34625567991ad42a6b0
-
SHA1
305a6af73234cb5d7c4fab4ecb35751af2977a8c
-
SHA256
35b6f516e20f2d01dd638055decb824ee2d83d23d7d01fe010d92f22a0e38911
-
SHA512
aca3379e929a38f61a3e096f74618fe761d2f0723d36f0e2bd2eb37f141e87cff5ea62bc9ab4deffc07c615f579a976951ee7393ee495b32a3d57a724a1072f7
-
SSDEEP
1536:VRLxhVj7D+Ihw3+bwxK0ZV6ypm6TNOQRu0US6Sd:Vb7hw3+bwxtQOOQRb0s
Malware Config
Extracted
xworm
127.0.0.1:1139
w4wrzaq8l.localto.net:1139
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1060-1-0x00000000010F0000-0x0000000001108000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3040 powershell.exe 2080 powershell.exe 2868 powershell.exe 2876 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Injector.lnk KeyGen.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Injector.lnk KeyGen.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Injector = "C:\\Users\\Admin\\AppData\\Roaming\\Injector" KeyGen.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3040 powershell.exe 2080 powershell.exe 2868 powershell.exe 2876 powershell.exe 1060 KeyGen.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1060 KeyGen.exe Token: SeDebugPrivilege 3040 powershell.exe Token: SeDebugPrivilege 2080 powershell.exe Token: SeDebugPrivilege 2868 powershell.exe Token: SeDebugPrivilege 2876 powershell.exe Token: SeDebugPrivilege 1060 KeyGen.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1060 KeyGen.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1060 wrote to memory of 3040 1060 KeyGen.exe 30 PID 1060 wrote to memory of 3040 1060 KeyGen.exe 30 PID 1060 wrote to memory of 3040 1060 KeyGen.exe 30 PID 1060 wrote to memory of 2080 1060 KeyGen.exe 32 PID 1060 wrote to memory of 2080 1060 KeyGen.exe 32 PID 1060 wrote to memory of 2080 1060 KeyGen.exe 32 PID 1060 wrote to memory of 2868 1060 KeyGen.exe 34 PID 1060 wrote to memory of 2868 1060 KeyGen.exe 34 PID 1060 wrote to memory of 2868 1060 KeyGen.exe 34 PID 1060 wrote to memory of 2876 1060 KeyGen.exe 36 PID 1060 wrote to memory of 2876 1060 KeyGen.exe 36 PID 1060 wrote to memory of 2876 1060 KeyGen.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\KeyGen.exe"C:\Users\Admin\AppData\Local\Temp\KeyGen.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\KeyGen.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'KeyGen.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Injector'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Injector'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:3060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5949dccd844d4e28f9fc8b9f29fe6b431
SHA10d8eb153b23810a0185afb370670db9ed0dc5827
SHA256714b0b490702e291aa5d87c76221c5ca5c240dea07d2f716fc546cc6c1fb43a2
SHA512d73a241eb613ea5b22ddb5c7833a236514fe91916becddd417b0f2d808056a38b5cd7f65a2645d419a1a33fcc45b520076c7c9552819bd1e6400fbdf3edb4efe