Analysis

  • max time kernel
    61s
  • max time network
    70s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-03-2024 12:43

General

  • Target

    Celestial.exe

  • Size

    273KB

  • MD5

    7ca6a26751bd7ad90ffc2843f040117c

  • SHA1

    5c2be81194456480f952d674c0513959eab0ceda

  • SHA256

    c13b27db146974839ceeb088132e55627944f9a230392e4f8661749586a3626a

  • SHA512

    0f16bbf19913c4c09a13ea48325a3751311941b2d6b11a70a97737628c53bd58b8009fa9439e3b0ce66ef0e46dc420a6535b2d8803cbf6669d024c3c4ea3b896

  • SSDEEP

    6144:Of+BLtABPD7sBi/0QNE44FCpHoafTy/lI1D0NiJ:essK44FCpO61DzJ

Malware Config

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Celestial.exe
    "C:\Users\Admin\AppData\Local\Temp\Celestial.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4416
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:4312
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3436

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\44\Process.txt
      Filesize

      756B

      MD5

      49eea3db3c1b38183dcb701b8f1e48e1

      SHA1

      432c8c199599fb68785446b963dfceac89a9d5bb

      SHA256

      6477c5d94008b05aacb5ee1c75c2d441b7725c374e652c5d6273e4b8f91ad7c6

      SHA512

      9ff5c2fc4346ba962604a6b08c85c743563ec62b6ddb74e81515bc6e30dc5e5bff42b13767249a0425992856c05a457721c90f27091c3e4d361e0b4f8b79ffe3

    • C:\Users\Admin\AppData\Roaming\44\Process.txt
      Filesize

      1KB

      MD5

      833fea63499246d803b013087dd2aad9

      SHA1

      e21280b8b20fdf8f6c737ac6e8f966e2ee91ed4b

      SHA256

      e690ee3f256837350e391d920a5bca0d372c67e5cb44ea02f95bdf540a59c345

      SHA512

      dda493f34794c875655bfbca3cae61e916a7a619eacb41d5f849e2da9d5bd3bfbfadfab55ede915ca856eb5de79640a77da83a57495172ab73549bc5c9bf2344

    • memory/4312-128-0x000001DDE42A0000-0x000001DDE42A1000-memory.dmp
      Filesize

      4KB

    • memory/4312-133-0x000001DDE42A0000-0x000001DDE42A1000-memory.dmp
      Filesize

      4KB

    • memory/4312-139-0x000001DDE42A0000-0x000001DDE42A1000-memory.dmp
      Filesize

      4KB

    • memory/4312-137-0x000001DDE42A0000-0x000001DDE42A1000-memory.dmp
      Filesize

      4KB

    • memory/4312-127-0x000001DDE42A0000-0x000001DDE42A1000-memory.dmp
      Filesize

      4KB

    • memory/4312-129-0x000001DDE42A0000-0x000001DDE42A1000-memory.dmp
      Filesize

      4KB

    • memory/4312-138-0x000001DDE42A0000-0x000001DDE42A1000-memory.dmp
      Filesize

      4KB

    • memory/4312-136-0x000001DDE42A0000-0x000001DDE42A1000-memory.dmp
      Filesize

      4KB

    • memory/4312-134-0x000001DDE42A0000-0x000001DDE42A1000-memory.dmp
      Filesize

      4KB

    • memory/4312-135-0x000001DDE42A0000-0x000001DDE42A1000-memory.dmp
      Filesize

      4KB

    • memory/4416-32-0x000002C2DC900000-0x000002C2DC910000-memory.dmp
      Filesize

      64KB

    • memory/4416-0-0x000002C2C2300000-0x000002C2C234A000-memory.dmp
      Filesize

      296KB

    • memory/4416-126-0x00007FFAEA3A0000-0x00007FFAEAE61000-memory.dmp
      Filesize

      10.8MB

    • memory/4416-27-0x00007FFAEA3A0000-0x00007FFAEAE61000-memory.dmp
      Filesize

      10.8MB