Overview
overview
8Static
static
3FluentWPF.dll
windows10-ltsc 2021-x64
1M Centers.exe
windows10-ltsc 2021-x64
8M Centers.exe.config
windows10-ltsc 2021-x64
3M Centers.pdb
windows10-ltsc 2021-x64
3MCentersLibrary.dll
windows10-ltsc 2021-x64
1MCentersLibrary.pdb
windows10-ltsc 2021-x64
3MaterialDe...rs.dll
windows10-ltsc 2021-x64
1MaterialDe...pf.dll
windows10-ltsc 2021-x64
1MaterialDe...pf.xml
windows10-ltsc 2021-x64
3Analysis
-
max time kernel
285s -
max time network
285s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
02-12-2024 01:51
Static task
static1
Behavioral task
behavioral1
Sample
FluentWPF.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
M Centers.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
M Centers.exe.config
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
M Centers.pdb
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
MCentersLibrary.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
MCentersLibrary.pdb
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
MaterialDesignColors.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral8
Sample
MaterialDesignThemes.Wpf.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral9
Sample
MaterialDesignThemes.Wpf.xml
Resource
win10ltsc2021-20241023-en
General
-
Target
M Centers.exe
-
Size
1.6MB
-
MD5
1d3d75fa1c81b55d68500d95a92807fb
-
SHA1
c45be1e05788005a24e4c73628d1f85003890957
-
SHA256
5f405489a7f6c67bbcc130ebbb272a99bde94b0d01b1b958f6f05580fb58a2d3
-
SHA512
b910ed4d71503d888d004b28b4991f8d5b8635ad0fb708cc987f4996a1f4e6ee22469f0c9c29946913988fea3163c5f6e313fdf643249eba4adf9d5df0cfcc83
-
SSDEEP
49152:Lj2I6gR13Be4vZ+5o12w1cRTTQAwnnsn3nmB:nPRNXBGhw1wTEAwnnsn3nmB
Malware Config
Signatures
-
Downloads MZ/PE file
-
Possible privilege escalation attempt 8 IoCs
pid Process 1992 takeown.exe 4376 icacls.exe 3160 takeown.exe 1848 icacls.exe 4304 takeown.exe 4580 icacls.exe 760 takeown.exe 1236 icacls.exe -
Modifies file permissions 1 TTPs 8 IoCs
pid Process 3160 takeown.exe 1848 icacls.exe 4304 takeown.exe 4580 icacls.exe 760 takeown.exe 1236 icacls.exe 1992 takeown.exe 4376 icacls.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 7 raw.githubusercontent.com 8 raw.githubusercontent.com 23 raw.githubusercontent.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Windows.ApplicationModel.Store.dll M Centers.exe File created C:\Windows\System32\Windows.ApplicationModel.Store.dll M Centers.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe 1108 M Centers.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1108 M Centers.exe Token: SeIncBasePriorityPrivilege 1108 M Centers.exe Token: SeTakeOwnershipPrivilege 4304 takeown.exe Token: SeTakeOwnershipPrivilege 760 takeown.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1108 wrote to memory of 4304 1108 M Centers.exe 87 PID 1108 wrote to memory of 4304 1108 M Centers.exe 87 PID 1108 wrote to memory of 4580 1108 M Centers.exe 89 PID 1108 wrote to memory of 4580 1108 M Centers.exe 89 PID 1108 wrote to memory of 760 1108 M Centers.exe 91 PID 1108 wrote to memory of 760 1108 M Centers.exe 91 PID 1108 wrote to memory of 1236 1108 M Centers.exe 93 PID 1108 wrote to memory of 1236 1108 M Centers.exe 93 PID 1108 wrote to memory of 1992 1108 M Centers.exe 95 PID 1108 wrote to memory of 1992 1108 M Centers.exe 95 PID 1108 wrote to memory of 4376 1108 M Centers.exe 97 PID 1108 wrote to memory of 4376 1108 M Centers.exe 97 PID 1108 wrote to memory of 3160 1108 M Centers.exe 100 PID 1108 wrote to memory of 3160 1108 M Centers.exe 100 PID 1108 wrote to memory of 1848 1108 M Centers.exe 102 PID 1108 wrote to memory of 1848 1108 M Centers.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\M Centers.exe"C:\Users\Admin\AppData\Local\Temp\M Centers.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SYSTEM32\takeown.exe"takeown.exe" /f C:\Windows\System32\Windows.ApplicationModel.Store.dll /A2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4304
-
-
C:\Windows\SYSTEM32\icacls.exe"icacls.exe" C:\Windows\System32\Windows.ApplicationModel.Store.dll /grant *S-1-5-32-544:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4580
-
-
C:\Windows\SYSTEM32\takeown.exe"takeown.exe" /f C:\Windows\SysWOW64\Windows.ApplicationModel.Store.dll /A2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:760
-
-
C:\Windows\SYSTEM32\icacls.exe"icacls.exe" C:\Windows\SysWOW64\Windows.ApplicationModel.Store.dll /grant *S-1-5-32-544:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1236
-
-
C:\Windows\SYSTEM32\takeown.exe"takeown.exe" /f C:\Windows\System32\Windows.ApplicationModel.Store.dll /A2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1992
-
-
C:\Windows\SYSTEM32\icacls.exe"icacls.exe" C:\Windows\System32\Windows.ApplicationModel.Store.dll /grant *S-1-5-32-544:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4376
-
-
C:\Windows\SYSTEM32\takeown.exe"takeown.exe" /f C:\Windows\SysWOW64\Windows.ApplicationModel.Store.dll /A2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3160
-
-
C:\Windows\SYSTEM32\icacls.exe"icacls.exe" C:\Windows\SysWOW64\Windows.ApplicationModel.Store.dll /grant *S-1-5-32-544:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD572f99d7440de5f00e5a2129635fe2223
SHA19d0260c28290307afc6c6b06dcefdb1bfb6416ed
SHA25630c62d555a7f924aa691c95fbf022c7a995d5f6a7296ac03e083379c8bd7193e
SHA512b8ebeabf6f6f94b7cf489c5c9d6c63962fbf91946fec6029e44df6c557595ea174ddefcbce1601241c090fd400b5d2e1d472fa18a75925513f38c5ec6e221c6c
-
Filesize
1.6MB
MD5e438c3dafd8c886aadcf1ef6264a0123
SHA1d13bd03d1b7631a93680195863f87f6d382b828f
SHA256eb9e1e06a847fe679d3c1a1f4b57fa492535dab75ef304fdd4f20550c3b0cd00
SHA512651444178d1d7c8356c8eb6f8b6ed01e607ea2613f9f76f6d6d6edd961ce3d3b9dc3571e9d690fea39d54eb567751ed6eac920c98f00c0634743deca92fefdcd