General
-
Target
accgen.exe
-
Size
7.5MB
-
Sample
241204-eymbza1qgy
-
MD5
a67d509f43e7644fc0e19982afb5e78b
-
SHA1
e7793b425aaf522ae16e46d1b1208ff47b795e6c
-
SHA256
2b48a65306f5b0c5cc4d23e902277c067f3a288892771bc7dffd225882214295
-
SHA512
2aac62fafb430156b17f69bcca4b3e6f16a05eb42ed895e2ce10e0cd14e114cffb92c6328660460f01c132acc168e345db91a5ecf3856f8b98ca29b08ff7ee22
-
SSDEEP
196608:afQCwVUurErvI9pWjgN3ZdahF0pbH1AY7WtQsNo/03vC1n:nVUurEUWjqeWx06rYYn
Behavioral task
behavioral1
Sample
accgen.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
accgen.exe
-
Size
7.5MB
-
MD5
a67d509f43e7644fc0e19982afb5e78b
-
SHA1
e7793b425aaf522ae16e46d1b1208ff47b795e6c
-
SHA256
2b48a65306f5b0c5cc4d23e902277c067f3a288892771bc7dffd225882214295
-
SHA512
2aac62fafb430156b17f69bcca4b3e6f16a05eb42ed895e2ce10e0cd14e114cffb92c6328660460f01c132acc168e345db91a5ecf3856f8b98ca29b08ff7ee22
-
SSDEEP
196608:afQCwVUurErvI9pWjgN3ZdahF0pbH1AY7WtQsNo/03vC1n:nVUurEUWjqeWx06rYYn
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3