Analysis
-
max time kernel
148s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 15:37
General
-
Target
AccGenerator.exe
-
Size
45KB
-
MD5
1d003893714bb9352f9ff8d1326a747e
-
SHA1
b50e5a1fc7d09a25d48a3e6b70885944f42f6e7b
-
SHA256
4499ad4bac40fa5651b07bf3243aa38a1e463b5ce63095a5b905c4d0bc15dc7f
-
SHA512
a05441ae4d70b7180a86c656ff5d0937a59232cda276b4d36d16b6a390cf05e3d2a8627ff6eff150a37fb2e01ec377260decb3fe7328d78175492cfaf5e7b661
-
SSDEEP
768:rdhO/poiiUcjlJInctUH9Xqk5nWEZ5SbTDaiWI7CPW5n:Zw+jjgnaUH9XqcnW85SbTrWIv
Malware Config
Extracted
xenorat
127.001.0000
AccBuilder
-
delay
20
-
install_path
temp
-
port
4444
-
startup_name
Acc_Maker
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Control Panel\International\Geo\Nation AccGenerator.exe -
Executes dropped EXE 1 IoCs
pid Process 3576 AccGenerator.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5116 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 776 wrote to memory of 3576 776 AccGenerator.exe 85 PID 776 wrote to memory of 3576 776 AccGenerator.exe 85 PID 776 wrote to memory of 3576 776 AccGenerator.exe 85 PID 3576 wrote to memory of 5116 3576 AccGenerator.exe 86 PID 3576 wrote to memory of 5116 3576 AccGenerator.exe 86 PID 3576 wrote to memory of 5116 3576 AccGenerator.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\AccGenerator.exe"C:\Users\Admin\AppData\Local\Temp\AccGenerator.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\AccGenerator.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\AccGenerator.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Acc_Maker" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8B38.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:5116
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
45KB
MD51d003893714bb9352f9ff8d1326a747e
SHA1b50e5a1fc7d09a25d48a3e6b70885944f42f6e7b
SHA2564499ad4bac40fa5651b07bf3243aa38a1e463b5ce63095a5b905c4d0bc15dc7f
SHA512a05441ae4d70b7180a86c656ff5d0937a59232cda276b4d36d16b6a390cf05e3d2a8627ff6eff150a37fb2e01ec377260decb3fe7328d78175492cfaf5e7b661
-
Filesize
1KB
MD52fc870dd8aeed94684a92c1cda0ccf45
SHA11f0fca48a710d4d00255553fc5591531d7076d2e
SHA25634e1c204572a807fd5c569a94a7ae3c1b03817bafe802a8f23771e248ebd995b
SHA512dbf76bebd2ad547ea93a5476a3d62f46be1feb5874ee45c95391d59cfd2cbe0a8aeef70c32b6fa489f7aff572950b0f81aa203c7f5d9015110540118ebd47c22