Overview
overview
10Static
static
9by Cel3ry V2.2.1.zip
windows10-2004-x64
1Celery.rar
windows10-2004-x64
3Celery/Celery V2.exe
windows10-2004-x64
10$INTERNET_...essive
windows10-2004-x64
1$INTERNET_CACHE/Autos
windows10-2004-x64
1$INTERNET_...rettes
windows10-2004-x64
1$INTERNET_...lexity
windows10-2004-x64
1$INTERNET_CACHE/Even
windows10-2004-x64
1$INTERNET_...Harold
windows10-2004-x64
1$INTERNET_CACHE/He
windows10-2004-x64
1$INTERNET_CACHE/Herb
windows10-2004-x64
1$INTERNET_...ndiana
windows10-2004-x64
1$INTERNET_CACHE/Kent
windows10-2004-x64
1$INTERNET_...Option
windows10-2004-x64
1$INTERNET_...anizer
windows10-2004-x64
1$INTERNET_...Outlet
windows10-2004-x64
1$INTERNET_...minder
windows10-2004-x64
1$INTERNET_...quests
windows10-2004-x64
1$INTERNET_...mebody
windows10-2004-x64
1$INTERNET_...Suited
windows10-2004-x64
1$INTERNET_...Temple
windows10-2004-x64
1$INTERNET_...lletin
windows10-2004-x64
1Celery/dll...32.dll
windows10-2004-x64
1Celery/dll...32.lib
windows10-2004-x64
3Celery/dll...SE.txt
windows10-2004-x64
1Celery/dll...wp.dll
windows10-2004-x64
1Celery/dll...uwpver
windows10-2004-x64
1Celery/dll/uwpoff.bin
windows10-2004-x64
3Celery/dll/uwpoffver
windows10-2004-x64
1Celery/dll...on.txt
windows10-2004-x64
1Celery/scr...ts.dll
windows10-2004-x64
1README.txt
windows10-2004-x64
1Analysis
-
max time kernel
1387s -
max time network
1175s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 18:07
Behavioral task
behavioral1
Sample
by Cel3ry V2.2.1.zip
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
Celery.rar
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
Celery/Celery V2.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
$INTERNET_CACHE/Aggressive
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$INTERNET_CACHE/Autos
Resource
win10v2004-20240412-en
Behavioral task
behavioral6
Sample
$INTERNET_CACHE/Cigarettes
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
$INTERNET_CACHE/Complexity
Resource
win10v2004-20240412-en
Behavioral task
behavioral8
Sample
$INTERNET_CACHE/Even
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
$INTERNET_CACHE/Harold
Resource
win10v2004-20240412-en
Behavioral task
behavioral10
Sample
$INTERNET_CACHE/He
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$INTERNET_CACHE/Herb
Resource
win10v2004-20240412-en
Behavioral task
behavioral12
Sample
$INTERNET_CACHE/Indiana
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
$INTERNET_CACHE/Kent
Resource
win10v2004-20240412-en
Behavioral task
behavioral14
Sample
$INTERNET_CACHE/Option
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
$INTERNET_CACHE/Organizer
Resource
win10v2004-20240412-en
Behavioral task
behavioral16
Sample
$INTERNET_CACHE/Outlet
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
$INTERNET_CACHE/Reminder
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
$INTERNET_CACHE/Requests
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
$INTERNET_CACHE/Somebody
Resource
win10v2004-20240412-en
Behavioral task
behavioral20
Sample
$INTERNET_CACHE/Suited
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
$INTERNET_CACHE/Temple
Resource
win10v2004-20240412-en
Behavioral task
behavioral22
Sample
$INTERNET_CACHE/Vbulletin
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
Celery/dll/VMProtectSDK32.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral24
Sample
Celery/dll/VMProtectSDK32.lib
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
Celery/dll/autoexec/HOW_TO_USE.txt
Resource
win10v2004-20240412-en
Behavioral task
behavioral26
Sample
Celery/dll/celeryuwp.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
Celery/dll/celeryuwpver
Resource
win10v2004-20240412-en
Behavioral task
behavioral28
Sample
Celery/dll/uwpoff.bin
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
Celery/dll/uwpoffver
Resource
win10v2004-20240412-en
Behavioral task
behavioral30
Sample
Celery/dll/uwpversion.txt
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
Celery/scripts/scripts.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral32
Sample
README.txt
Resource
win10v2004-20240412-en
General
-
Target
Celery/scripts/scripts.dll
-
Size
18.7MB
-
MD5
88fd7dbf04bcf75123d02009aea3f7f7
-
SHA1
cecf16bdad71e54afc941179ea2b7438a04efa1d
-
SHA256
01481b9a862936fbc090bda4033f22d7ffa5a7bfe5dc32f47c7794332b34eec4
-
SHA512
2c6298b5adf91b51f0042d48e0846f5b196d52a588fd4fc577bf19ec26ad8e547382279a15f8bf131b08b0d7c140534aff25f82d5e8998818b812e72c9493917
-
SSDEEP
393216:hqA/D2IIyzg8DolBo6i0KoI6Di42sC1/syU3DXNs6hq8:hqcaZyV0fC1JOpjhq8
Malware Config
Signatures
-
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB70-AE6D-11cf-96B8-444553540000} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB70-AE6D-11cf-96B8-444553540000}\Compatibility Flags = "65536" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\NAVIGATORPLUGINSLIST\SHOCKWAVE FLASH regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\NavigatorPluginsList\Shockwave Flash regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\NavigatorPluginsList\Shockwave Flash\application/futuresplash regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\NavigatorPluginsList\Shockwave Flash\application/x-shockwave-flash regsvr32.exe -
Modifies registry class 64 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.3 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.12\ = "Shockwave Flash Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.13 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{57A0E746-3863-4D20-A811-950C84F1DB9B}\1.1\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{57A0E746-3863-4D20-A811-950C84F1DB9B}\1.1\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{307F64C0-621D-4D56-BBC6-91EFC13CE40D}\ = "ISimpleTextSelection" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FlashFactory.FlashFactory.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.7 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{307F64C0-621D-4D56-BBC6-91EFC13CE40D}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Celery\\scripts\\scripts.dll, 1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.5 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.22 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.spl regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{307F64C0-621D-4D56-BBC6-91EFC13CE40D}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.10\ = "Shockwave Flash Object" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FlashFactory.FlashFactory\ = "Macromedia Flash Factory Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/futuresplash\CLSID = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.17\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\EnableFullPage\.mfp regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Implemented Categories\{31CAF6E4-D6AA-4090-A050-A5AC8972E9EF} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}\TypeLib\ = "{D27CDB6B-AE6D-11CF-96B8-444553540000}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{57A0E747-3863-4D20-A811-950C84F1DB9B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{307F64C0-621D-4D56-BBC6-91EFC13CE40D}\TypeLib\ = "{57A0E746-3863-4D20-A811-950C84F1DB9B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.18\ = "Shockwave Flash Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.21\ = "Shockwave Flash Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.22\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{307F64C0-621D-4D56-BBC6-91EFC13CE40D}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.3\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.16\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.22\ = "Shockwave Flash Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.9 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.11 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.17 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash\CurVer\ = "ShockwaveFlash.ShockwaveFlash.23" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\EnableFullPage\.swf regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.5\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.8\ = "Shockwave Flash Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sol\Content Type = "text/plain" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{86230738-D762-4C50-A2DE-A753E5B1686F}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{57A0E747-3863-4D20-A811-950C84F1DB9B}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FlashFactory.FlashFactory.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.18\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.6 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.9\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.11\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.12\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{307F64C0-621D-4D56-BBC6-91EFC13CE40D}\TypeLib\Version = "1.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.3\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.5\ = "Shockwave Flash Object" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Programmable regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 2736 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
regsvr32.exepid process 4364 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1192 wrote to memory of 4364 1192 regsvr32.exe regsvr32.exe PID 1192 wrote to memory of 4364 1192 regsvr32.exe regsvr32.exe PID 1192 wrote to memory of 4364 1192 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\Celery\scripts\scripts.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\Celery\scripts\scripts.dll2⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2736-0-0x000001BF11340000-0x000001BF11350000-memory.dmpFilesize
64KB
-
memory/2736-16-0x000001BF11440000-0x000001BF11450000-memory.dmpFilesize
64KB
-
memory/2736-32-0x000001BF19740000-0x000001BF19741000-memory.dmpFilesize
4KB
-
memory/2736-34-0x000001BF19770000-0x000001BF19771000-memory.dmpFilesize
4KB
-
memory/2736-35-0x000001BF19770000-0x000001BF19771000-memory.dmpFilesize
4KB
-
memory/2736-36-0x000001BF19880000-0x000001BF19881000-memory.dmpFilesize
4KB