File name:

SeedGen.exe

Full analysis: https://app.any.run/tasks/604aa7e5-c31c-4d0a-ac23-7c58f3f3bb6c
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: May 18, 2025, 01:52:47
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-reg
auto-startup
xworm
remote
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

0560C26F6FB8D3E20D455165D3B46CE8

SHA1:

E1F140E3D8246EC8177708B8398BC184D43B2C0F

SHA256:

030BC8E3E86A6F6BCCD7FAF1279212682B13B6FA361855CB13A89BAD7F8E9671

SSDEEP:

49152:j2r4BkP577aYmmOfTbUmWpTpMUlGzk0ZR7FoRAyLhVn31UDfDptVwnWL61Mt3fHN:ar4B6imKTVWp+UQYm7FeS1t+WmuVh+92

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • Interrupts 5.6.exe (PID: 1672)
    • Create files in the Startup directory

      • Interrupts 5.6.exe (PID: 1672)
    • XWORM has been detected (YARA)

      • Interrupts 5.6.exe (PID: 1672)
    • XWORM has been detected (SURICATA)

      • Interrupts 5.6.exe (PID: 1672)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • SeedGen.exe (PID: 6712)
      • SeedGen.exe (PID: 7052)
    • Executable content was dropped or overwritten

      • SeedGen.exe (PID: 6712)
      • Interrupts 5.6.exe (PID: 1672)
    • Starts a Microsoft application from unusual location

      • Interrupts 5.6.exe (PID: 1672)
      • Interrupts.exe (PID: 5164)
    • Likely accesses (executes) a file from the Public directory

      • Interrupts.exe (PID: 5164)
    • Connects to unusual port

      • Interrupts 5.6.exe (PID: 1672)
    • Contacting a server suspected of hosting an CnC

      • Interrupts 5.6.exe (PID: 1672)
  • INFO

    • Create files in a temporary directory

      • SeedGen.exe (PID: 6712)
    • Checks supported languages

      • SeedGen.exe (PID: 6712)
      • Interrupts 5.6.exe (PID: 1672)
      • Interrupts.exe (PID: 5164)
      • SeedGen.exe (PID: 7052)
    • Reads the computer name

      • SeedGen.exe (PID: 6712)
      • Interrupts 5.6.exe (PID: 1672)
      • Interrupts.exe (PID: 5164)
      • SeedGen.exe (PID: 7052)
    • Process checks computer location settings

      • SeedGen.exe (PID: 6712)
    • Auto-launch of the file from Registry key

      • Interrupts 5.6.exe (PID: 1672)
    • Reads the machine GUID from the registry

      • Interrupts 5.6.exe (PID: 1672)
      • SeedGen.exe (PID: 7052)
      • Interrupts.exe (PID: 5164)
    • Reads the software policy settings

      • SeedGen.exe (PID: 7052)
      • slui.exe (PID: 2140)
    • Manual execution by a user

      • Interrupts.exe (PID: 5164)
    • Auto-launch of the file from Startup directory

      • Interrupts 5.6.exe (PID: 1672)
    • Creates files or folders in the user directory

      • Interrupts 5.6.exe (PID: 1672)
    • Checks proxy server information

      • SeedGen.exe (PID: 7052)
      • slui.exe (PID: 2140)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(1672) Interrupts 5.6.exe
C2SLL.casacam.net:4444
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameSYS
Mutextqiul2oM8KdU2TW1
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2015:12:27 05:38:55+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 24576
InitializedDataSize: 164864
UninitializedDataSize: 1024
EntryPoint: 0x310d
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
8
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start seedgen.exe #XWORM interrupts 5.6.exe seedgen.exe conhost.exe no specs interrupts.exe no specs svchost.exe slui.exe seedgen.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1672"C:\Users\admin\AppData\Local\Temp\Interrupts 5.6.exe" C:\Users\admin\AppData\Local\Temp\Interrupts 5.6.exe
SeedGen.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Explorer
Version:
6.3.9600.18460
Modules
Images
c:\users\admin\appdata\local\temp\interrupts 5.6.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
XWorm
(PID) Process(1672) Interrupts 5.6.exe
C2SLL.casacam.net:4444
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameSYS
Mutextqiul2oM8KdU2TW1
2140C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
5164"C:\Users\admin\Desktop\SeedGen.exe" C:\Users\admin\Desktop\SeedGen.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\seedgen.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
5164C:\Users\Public\Interrupts.exeC:\Users\Public\Interrupts.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.3.9600.18460
Modules
Images
c:\users\public\interrupts.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
5392\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSeedGen.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6712"C:\Users\admin\Desktop\SeedGen.exe" C:\Users\admin\Desktop\SeedGen.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\seedgen.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7052"C:\Users\admin\AppData\Local\Temp\SeedGen.exe" C:\Users\admin\AppData\Local\Temp\SeedGen.exe
SeedGen.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\seedgen.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
7 840
Read events
7 839
Write events
1
Delete events
0

Modification events

(PID) Process:(1672) Interrupts 5.6.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Interrupts
Value:
C:\Users\Public\Interrupts.exe
Executable files
3
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1672Interrupts 5.6.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Interrupts.lnkbinary
MD5:1AA22C4D1365A59D57B15C7DBFE71574
SHA256:047AFE64909D5AC513E381FC4428CB4707F47D1E91E05573A7859C473CABA5CC
6712SeedGen.exeC:\Users\admin\AppData\Local\Temp\Interrupts 5.6.exeexecutable
MD5:6195CF61E9CE067F4C726EB0B0E349E0
SHA256:1DC33C440DA44C802F8119FC2EAA2E9633296742AAAF5713171EE7D5C481DD31
6712SeedGen.exeC:\Users\admin\AppData\Local\Temp\SeedGen.exeexecutable
MD5:52A162C45B0B57F136E8758803ACBD2F
SHA256:782CA55226727B4C490010C3DB738B19CBB426ABCF90BDF8471EEF5327021D47
1672Interrupts 5.6.exeC:\Users\Public\Interrupts.exeexecutable
MD5:6195CF61E9CE067F4C726EB0B0E349E0
SHA256:1DC33C440DA44C802F8119FC2EAA2E9633296742AAAF5713171EE7D5C481DD31
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
54
DNS requests
17
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4980
RUXIMICS.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
960
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
4980
RUXIMICS.exe
GET
200
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
960
SIHClient.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
960
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
960
SIHClient.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
960
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
960
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
960
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4980
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
20.190.160.14:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.14:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4980
RUXIMICS.exe
2.19.11.105:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
4980
RUXIMICS.exe
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
7052
SeedGen.exe
104.17.172.30:443
www.blockchain.com
CLOUDFLARENET
suspicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
login.live.com
  • 20.190.160.14
  • 20.190.160.66
  • 20.190.160.64
  • 40.126.32.138
  • 20.190.160.65
  • 40.126.32.134
  • 40.126.32.74
  • 20.190.160.131
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
google.com
  • 142.250.184.238
whitelisted
crl.microsoft.com
  • 2.19.11.105
  • 2.19.11.120
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 23.219.150.101
  • 23.35.229.160
whitelisted
www.blockchain.com
  • 104.17.172.30
  • 104.17.173.30
unknown
SLL.casacam.net
  • 45.247.62.116
malicious
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DYNAMIC_DNS Query to a *.casacam .net Domain
1672
Interrupts 5.6.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm Network Packet
No debug info