Analysis
-
max time kernel
5s -
max time network
7s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-12-2020 03:53
Static task
static1
Behavioral task
behavioral1
Sample
cela.exe
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
cela.exe
-
Size
930KB
-
MD5
507c92e12c99eb53544aba006004b843
-
SHA1
11205b1e7e9317192994f5a9037d0f9924f29469
-
SHA256
3f50cb0f25bc9fdaa5c75865eaca04ed12f45d5419b6624f1cf0f507be3cdafe
-
SHA512
21b13fa6b070f3fecab15fe8c4124c4ec592b2886eff6a9b39efef84097aa33defc0815a1696617674072343144c83f6756f349e2b71afef11e69f46f614bc16
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3164 update.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cela.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cela.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3264 schtasks.exe 4580 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3384 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4764 cela.exe Token: SeDebugPrivilege 3384 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4764 wrote to memory of 3264 4764 cela.exe 77 PID 4764 wrote to memory of 3264 4764 cela.exe 77 PID 4764 wrote to memory of 3264 4764 cela.exe 77 PID 4764 wrote to memory of 3164 4764 cela.exe 79 PID 4764 wrote to memory of 3164 4764 cela.exe 79 PID 4764 wrote to memory of 3164 4764 cela.exe 79 PID 4764 wrote to memory of 3384 4764 cela.exe 80 PID 4764 wrote to memory of 3384 4764 cela.exe 80 PID 4764 wrote to memory of 3384 4764 cela.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\cela.exe"C:\Users\Admin\AppData\Local\Temp\cela.exe"1⤵
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\cela.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:3264
-
-
C:\Users\Admin\AppData\Roaming\SubDir\update.exe"C:\Users\Admin\AppData\Roaming\SubDir\update.exe"2⤵
- Executes dropped EXE
PID:3164 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\update.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:4580
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VUSIYPFdEVOy.bat" "3⤵PID:4572
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3384
-