Analysis

  • max time kernel
    152s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2024, 18:37

General

  • Target

    M Centers.exe

  • Size

    1.6MB

  • MD5

    1d3d75fa1c81b55d68500d95a92807fb

  • SHA1

    c45be1e05788005a24e4c73628d1f85003890957

  • SHA256

    5f405489a7f6c67bbcc130ebbb272a99bde94b0d01b1b958f6f05580fb58a2d3

  • SHA512

    b910ed4d71503d888d004b28b4991f8d5b8635ad0fb708cc987f4996a1f4e6ee22469f0c9c29946913988fea3163c5f6e313fdf643249eba4adf9d5df0cfcc83

  • SSDEEP

    49152:Lj2I6gR13Be4vZ+5o12w1cRTTQAwnnsn3nmB:nPRNXBGhw1wTEAwnnsn3nmB

Malware Config

Signatures

  • Downloads MZ/PE file
  • Possible privilege escalation attempt 4 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\M Centers.exe
    "C:\Users\Admin\AppData\Local\Temp\M Centers.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3532
    • C:\Windows\SYSTEM32\takeown.exe
      "takeown.exe" /f C:\Windows\System32\Windows.ApplicationModel.Store.dll /A
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      • Suspicious use of AdjustPrivilegeToken
      PID:4960
    • C:\Windows\SYSTEM32\icacls.exe
      "icacls.exe" C:\Windows\System32\Windows.ApplicationModel.Store.dll /grant *S-1-5-32-544:F
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      PID:1488
    • C:\Windows\SYSTEM32\takeown.exe
      "takeown.exe" /f C:\Windows\SysWOW64\Windows.ApplicationModel.Store.dll /A
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      • Suspicious use of AdjustPrivilegeToken
      PID:2672
    • C:\Windows\SYSTEM32\icacls.exe
      "icacls.exe" C:\Windows\SysWOW64\Windows.ApplicationModel.Store.dll /grant *S-1-5-32-544:F
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      PID:4664
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe" C:\ProgramData\MCenters\Logs\
      2⤵
        PID:3316
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe" C:\ProgramData\MCenters\Logs\
        2⤵
          PID:1068
        • C:\Windows\System32\sfc.exe
          "C:\Windows\System32\sfc.exe" /scanfile=C:\Windows\System32\Windows.ApplicationModel.Store.dll
          2⤵
            PID:2560
          • C:\Windows\System32\sfc.exe
            "C:\Windows\System32\sfc.exe" /scanfile=C:\Windows\SysWOW64\Windows.ApplicationModel.Store.dll
            2⤵
              PID:3500
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
            1⤵
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1432
            • C:\Windows\system32\NOTEPAD.EXE
              "C:\Windows\system32\NOTEPAD.EXE" C:\ProgramData\MCenters\Logs\Monday_5_August_2024 06_38_55_PM.txt
              2⤵
                PID:3920
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
              1⤵
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious behavior: AddClipboardFormatListener
              • Suspicious use of SetWindowsHookEx
              PID:1480
            • C:\Windows\System32\rundll32.exe
              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
              1⤵
                PID:536

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\ProgramData\MCenters\Logs\Monday_5_August_2024 06_38_55_PM.txt

                Filesize

                4KB

                MD5

                5f5ab961047764fecf4386e81fd3b30c

                SHA1

                d69968671f373701c8c68ffeab5cbdaf42d1687e

                SHA256

                3880af99c6913bb4dbbcefab6850eaa2bdb8e2aae7268ea3c767caf1b7c16847

                SHA512

                657723d9d493ae2403865c73170a92e602b2bf069200de976ad8c3cc29f0c3aa1a67bc20eed9adf4587c92b5fbe9fbd9f9e353ff9783a31527b3ae577da29d47

              • C:\ProgramData\MCenters\Methods\Dll\19041.906\x64\Windows.ApplicationModel.Store.dll

                Filesize

                2.2MB

                MD5

                3e9f96520731308adbf87172614ced92

                SHA1

                31ee1629f8431fc1101bfcb8167abbd3e4fb98f3

                SHA256

                5fc5b78a3d9d6e80748004e43bf11a2be14b355290180475a5b4fad9259dc8d2

                SHA512

                850baa06de00533592ba34bbe4e2749d2475b8998b75c8a5d583b7f0363d9f612bc761b9476dfb39c7502a5d054e2ecf829169e379d21ff29566b20c66cf67ec

              • memory/3532-12-0x00007FF8DC850000-0x00007FF8DD311000-memory.dmp

                Filesize

                10.8MB

              • memory/3532-11-0x0000019A68C00000-0x0000019A68C0E000-memory.dmp

                Filesize

                56KB

              • memory/3532-5-0x0000019A65F30000-0x0000019A668A4000-memory.dmp

                Filesize

                9.5MB

              • memory/3532-6-0x0000019A65610000-0x0000019A65664000-memory.dmp

                Filesize

                336KB

              • memory/3532-4-0x00007FF8DC850000-0x00007FF8DD311000-memory.dmp

                Filesize

                10.8MB

              • memory/3532-7-0x0000019A65830000-0x0000019A658EA000-memory.dmp

                Filesize

                744KB

              • memory/3532-8-0x00007FF8DC850000-0x00007FF8DD311000-memory.dmp

                Filesize

                10.8MB

              • memory/3532-9-0x0000019A68B60000-0x0000019A68B68000-memory.dmp

                Filesize

                32KB

              • memory/3532-0-0x00007FF8DC853000-0x00007FF8DC855000-memory.dmp

                Filesize

                8KB

              • memory/3532-3-0x00007FF8DC850000-0x00007FF8DD311000-memory.dmp

                Filesize

                10.8MB

              • memory/3532-10-0x0000019A69050000-0x0000019A69088000-memory.dmp

                Filesize

                224KB

              • memory/3532-13-0x00007FF8DC853000-0x00007FF8DC855000-memory.dmp

                Filesize

                8KB

              • memory/3532-14-0x00007FF8DC850000-0x00007FF8DD311000-memory.dmp

                Filesize

                10.8MB

              • memory/3532-15-0x00007FF8DC850000-0x00007FF8DD311000-memory.dmp

                Filesize

                10.8MB

              • memory/3532-16-0x00007FF8DC850000-0x00007FF8DD311000-memory.dmp

                Filesize

                10.8MB

              • memory/3532-2-0x0000019A4B690000-0x0000019A4B6CE000-memory.dmp

                Filesize

                248KB

              • memory/3532-28-0x00007FF8DC850000-0x00007FF8DD311000-memory.dmp

                Filesize

                10.8MB

              • memory/3532-1-0x0000019A495E0000-0x0000019A49784000-memory.dmp

                Filesize

                1.6MB

              • memory/3532-30-0x00007FF8DC850000-0x00007FF8DD311000-memory.dmp

                Filesize

                10.8MB