Analysis
-
max time kernel
142s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 16:39
Behavioral task
behavioral1
Sample
celex.exe
Resource
win7-20231215-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
celex.exe
Resource
win10v2004-20231215-en
9 signatures
150 seconds
General
-
Target
celex.exe
-
Size
4.0MB
-
MD5
c874dc90720f9240b8b95897d2d696bf
-
SHA1
8b6d7cff1b0f85c83157b96d86b828372bf45876
-
SHA256
f0bd6236ae04d1a7e53575e21a8ec4cced336b5585296766d4acb3538ad09807
-
SHA512
da7dd92b8390f339dba9e835f556b28fa5baf536f455641de5529aa5747fb510561a3b7e36f21db0c7049b883b9570396e71f08033edde9573cca0f8953f9aef
-
SSDEEP
98304:BBPWkrg/6NgmYJ+PZ/ROLbvqEufbV14C5jnlAd706/yIhBfev9MgT:BJHg/WgvJqQvHufb4UzmdRg5
Score
9/10
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ celex.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" celex.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion celex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion celex.exe -
resource yara_rule behavioral2/memory/1284-0-0x00007FF719EB0000-0x00007FF71A956000-memory.dmp themida behavioral2/memory/1284-2-0x00007FF719EB0000-0x00007FF71A956000-memory.dmp themida behavioral2/memory/1284-3-0x00007FF719EB0000-0x00007FF71A956000-memory.dmp themida behavioral2/memory/1284-4-0x00007FF719EB0000-0x00007FF71A956000-memory.dmp themida behavioral2/memory/1284-5-0x00007FF719EB0000-0x00007FF71A956000-memory.dmp themida behavioral2/memory/1284-6-0x00007FF719EB0000-0x00007FF71A956000-memory.dmp themida behavioral2/memory/1284-7-0x00007FF719EB0000-0x00007FF71A956000-memory.dmp themida behavioral2/memory/1284-8-0x00007FF719EB0000-0x00007FF71A956000-memory.dmp themida behavioral2/memory/1284-15-0x00007FF719EB0000-0x00007FF71A956000-memory.dmp themida behavioral2/memory/1284-16-0x00007FF719EB0000-0x00007FF71A956000-memory.dmp themida behavioral2/memory/1284-17-0x00007FF719EB0000-0x00007FF71A956000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA celex.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1284 celex.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1284 celex.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 1284 celex.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1284 wrote to memory of 1988 1284 celex.exe 88 PID 1284 wrote to memory of 1988 1284 celex.exe 88 PID 1988 wrote to memory of 2560 1988 cmd.exe 90 PID 1988 wrote to memory of 2560 1988 cmd.exe 90 PID 1988 wrote to memory of 1424 1988 cmd.exe 91 PID 1988 wrote to memory of 1424 1988 cmd.exe 91 PID 1988 wrote to memory of 388 1988 cmd.exe 92 PID 1988 wrote to memory of 388 1988 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\celex.exe"C:\Users\Admin\AppData\Local\Temp\celex.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Sets service image path in registry
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\celex.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\celex.exe" MD53⤵PID:2560
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:1424
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:388
-
-