Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
02-12-2024 18:12
Static task
static1
Behavioral task
behavioral1
Sample
FluentWPF.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
M Centers.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
MCentersLibrary.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
MaterialDesignColors.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
MaterialDesignThemes.Wpf.dll
Resource
win10ltsc2021-20241023-en
General
-
Target
M Centers.exe
-
Size
1.6MB
-
MD5
1d3d75fa1c81b55d68500d95a92807fb
-
SHA1
c45be1e05788005a24e4c73628d1f85003890957
-
SHA256
5f405489a7f6c67bbcc130ebbb272a99bde94b0d01b1b958f6f05580fb58a2d3
-
SHA512
b910ed4d71503d888d004b28b4991f8d5b8635ad0fb708cc987f4996a1f4e6ee22469f0c9c29946913988fea3163c5f6e313fdf643249eba4adf9d5df0cfcc83
-
SSDEEP
49152:Lj2I6gR13Be4vZ+5o12w1cRTTQAwnnsn3nmB:nPRNXBGhw1wTEAwnnsn3nmB
Malware Config
Signatures
-
Possible privilege escalation attempt 8 IoCs
pid Process 4608 takeown.exe 3620 icacls.exe 3224 takeown.exe 4776 icacls.exe 1080 takeown.exe 4768 icacls.exe 460 takeown.exe 1160 icacls.exe -
Modifies file permissions 1 TTPs 8 IoCs
pid Process 4608 takeown.exe 3620 icacls.exe 3224 takeown.exe 4776 icacls.exe 1080 takeown.exe 4768 icacls.exe 460 takeown.exe 1160 icacls.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 12 raw.githubusercontent.com 13 raw.githubusercontent.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Windows.ApplicationModel.Store.dll M Centers.exe File created C:\Windows\System32\Windows.ApplicationModel.Store.dll M Centers.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe 1244 M Centers.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1244 M Centers.exe Token: SeIncBasePriorityPrivilege 1244 M Centers.exe Token: SeTakeOwnershipPrivilege 460 takeown.exe Token: SeTakeOwnershipPrivilege 4608 takeown.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1244 wrote to memory of 460 1244 M Centers.exe 88 PID 1244 wrote to memory of 460 1244 M Centers.exe 88 PID 1244 wrote to memory of 1160 1244 M Centers.exe 90 PID 1244 wrote to memory of 1160 1244 M Centers.exe 90 PID 1244 wrote to memory of 4608 1244 M Centers.exe 92 PID 1244 wrote to memory of 4608 1244 M Centers.exe 92 PID 1244 wrote to memory of 3620 1244 M Centers.exe 94 PID 1244 wrote to memory of 3620 1244 M Centers.exe 94 PID 1244 wrote to memory of 3224 1244 M Centers.exe 96 PID 1244 wrote to memory of 3224 1244 M Centers.exe 96 PID 1244 wrote to memory of 4776 1244 M Centers.exe 98 PID 1244 wrote to memory of 4776 1244 M Centers.exe 98 PID 1244 wrote to memory of 1080 1244 M Centers.exe 100 PID 1244 wrote to memory of 1080 1244 M Centers.exe 100 PID 1244 wrote to memory of 4768 1244 M Centers.exe 102 PID 1244 wrote to memory of 4768 1244 M Centers.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\M Centers.exe"C:\Users\Admin\AppData\Local\Temp\M Centers.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SYSTEM32\takeown.exe"takeown.exe" /f C:\Windows\System32\Windows.ApplicationModel.Store.dll /A2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:460
-
-
C:\Windows\SYSTEM32\icacls.exe"icacls.exe" C:\Windows\System32\Windows.ApplicationModel.Store.dll /grant *S-1-5-32-544:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1160
-
-
C:\Windows\SYSTEM32\takeown.exe"takeown.exe" /f C:\Windows\SysWOW64\Windows.ApplicationModel.Store.dll /A2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
C:\Windows\SYSTEM32\icacls.exe"icacls.exe" C:\Windows\SysWOW64\Windows.ApplicationModel.Store.dll /grant *S-1-5-32-544:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3620
-
-
C:\Windows\SYSTEM32\takeown.exe"takeown.exe" /f C:\Windows\System32\Windows.ApplicationModel.Store.dll /A2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3224
-
-
C:\Windows\SYSTEM32\icacls.exe"icacls.exe" C:\Windows\System32\Windows.ApplicationModel.Store.dll /grant *S-1-5-32-544:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4776
-
-
C:\Windows\SYSTEM32\takeown.exe"takeown.exe" /f C:\Windows\SysWOW64\Windows.ApplicationModel.Store.dll /A2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1080
-
-
C:\Windows\SYSTEM32\icacls.exe"icacls.exe" C:\Windows\SysWOW64\Windows.ApplicationModel.Store.dll /grant *S-1-5-32-544:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4768
-