Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
Cel3ry by Ryos.cc.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Cel3ry by Ryos.cc.zip
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
Celery.rar
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
Celery.rar
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
README.txt
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
README.txt
Resource
win10v2004-20240419-en
General
-
Target
Celery.rar
-
Size
9.7MB
-
MD5
83316acc525cdf7c4432352538cdd50d
-
SHA1
467eb79dc8170e18fed81ad698a6b68e345e752c
-
SHA256
30c1d515ab43c54747ff896b94c3562ea0557849339c59a11a18b578be7d0ac0
-
SHA512
5c043dac1327399e3638cff1385c1e2f89ba9c2741bd4923c0d260dc10984d47b3ca9b2557f6de515a2294a7f4b35e61b613f28d34294e512178253443ec3101
-
SSDEEP
196608:d7RkTfle3p6385wyzvhBmfS6ETlpULou/W3ihsO7t4xRrZwM9VMOQX:ZCTte3p48yybhBmfIppzqWSP7gdGOg
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2892 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2892 vlc.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2892 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2684 2244 cmd.exe 29 PID 2244 wrote to memory of 2684 2244 cmd.exe 29 PID 2244 wrote to memory of 2684 2244 cmd.exe 29 PID 2684 wrote to memory of 2892 2684 rundll32.exe 30 PID 2684 wrote to memory of 2892 2684 rundll32.exe 30 PID 2684 wrote to memory of 2892 2684 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Celery.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Celery.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Celery.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2892
-
-