Resubmissions

28-04-2024 17:10

240428-vp2nascg6x 7

28-04-2024 17:07

240428-vne3xace45 7

Analysis

  • max time kernel
    49s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    28-04-2024 17:07

General

  • Target

    Celery/Celery Bootstrapper.exe

  • Size

    17.9MB

  • MD5

    ee549f861f00948e1c7d27d90e4b1451

  • SHA1

    168333c44730a78364cf5a53e1e1aa4417015e95

  • SHA256

    b8a94ec520ce7ff4f23827f1898317de865c8f3f8b46b955209b2295d071e48a

  • SHA512

    48e3fdaa3c3d8f2ebd3fa3f57d7c2c6dca51e6ec8e7692118604f2ba4d88d426e43d96059d8aff939cfd49a834b58223f50d110330578642c089736a2545f6ad

  • SSDEEP

    393216:UEklQR+Tfk9dM/ISpInEroXq14S2Mn8MKNLPnGuMsMbXu:U9Q4TfkT6ISKErUlqFeLPnWsku

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Celery\Celery Bootstrapper.exe
    "C:\Users\Admin\AppData\Local\Temp\Celery\Celery Bootstrapper.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Local\Temp\Celery\Celery Bootstrapper.exe
      "C:\Users\Admin\AppData\Local\Temp\Celery\Celery Bootstrapper.exe"
      2⤵
      • Loads dropped DLL
      PID:2300

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI23162\api-ms-win-core-file-l1-2-0.dll
    Filesize

    22KB

    MD5

    2083c4c18b0b2d501995bf1af79bbcf1

    SHA1

    9cbd7dd86fba3f1829d2f9614caa83958f690e99

    SHA256

    01b61d57ba1290bf2640ecee28de3d240eeb09e9c664c0f4d0f9402cd1da5eaf

    SHA512

    5eb5455989e1dbc8655c510d2b596d422078ecef8342d9d10797eba2d8aa1562b9037ede35f00222c3cfb6f46e003bd4bd1e17faa2d19e0aeb63e970c978da23

  • C:\Users\Admin\AppData\Local\Temp\_MEI23162\api-ms-win-core-file-l2-1-0.dll
    Filesize

    22KB

    MD5

    aaf93ef5c6eca9434286274ef91794dd

    SHA1

    b68cd2f56e5c840346e3ad52255a6061c1797a7b

    SHA256

    4413208101061038455b7e0752fb37d4108b3ec4642d10cbaddf835b3843888e

    SHA512

    04a30769851b829e71ba0ab3f1a76eceae565dd639047b4c6ff9952bc4d6502d117eec81e151843dfaa147894e3046a333e39d2dae2ae65effd7dc1b91368541

  • C:\Users\Admin\AppData\Local\Temp\_MEI23162\api-ms-win-core-localization-l1-2-0.dll
    Filesize

    22KB

    MD5

    9e1e3021560384db14b76243df9604e4

    SHA1

    f79a3241314f18db0b979af8e114c191d499a7c9

    SHA256

    197b29ba3989e8d974e29f81fbddd0731051399dc40763bda998a1e36d1c3ab4

    SHA512

    3187122bd3e20dc74efac802b86c612573682370a8b24c3ec7769e67de525b68c91506b85df3ea2d028d4018d14833c980ab2b220aee41b96e2dd9c9d0a67914

  • C:\Users\Admin\AppData\Local\Temp\_MEI23162\api-ms-win-core-processthreads-l1-1-1.dll
    Filesize

    22KB

    MD5

    bf87834418025b5894d2130668352125

    SHA1

    ef15f9b1ae6fb271549dd2cef8fb11ba5633c865

    SHA256

    408081a4655ee846c1067aaafe462a62fa3a562341e681d0dbbf3400362f5cf7

    SHA512

    b115687e542fc1a7f342cf610c450dc726d79e7b8e63bb2d5761a47464796fbf8c880ed811149443734f0d47c4cf8b2694a3703004d69cbd62fbf2a96d9667ec

  • C:\Users\Admin\AppData\Local\Temp\_MEI23162\api-ms-win-core-timezone-l1-1-0.dll
    Filesize

    22KB

    MD5

    80bd4ecd52c736047b21f0c4c6bdaa95

    SHA1

    8ac491285818f19485351253129889839d97aedf

    SHA256

    04f932559f3e5eec0d929d60ab501fc0f6037e97b241e2b3ddd3ad16fedaa23c

    SHA512

    3f79a2c1635eec05c7a9e561842e2bed227d1d3db72b6cc34e121bfeb29755d51db707bee955a1d1e24e4faea8ef8426283b8c0820a528001851600ab20cf7e3

  • C:\Users\Admin\AppData\Local\Temp\_MEI23162\python310.dll
    Filesize

    4.2MB

    MD5

    384349987b60775d6fc3a6d202c3e1bd

    SHA1

    701cb80c55f859ad4a31c53aa744a00d61e467e5

    SHA256

    f281c2e252ed59dd96726dbb2de529a2b07b818e9cc3799d1ffa9883e3028ed8

    SHA512

    6bf3ef9f08f4fc07461b6ea8d9822568ad0a0f211e471b990f62c6713adb7b6be28b90f206a4ec0673b92bae99597d1c7785381e486f6091265c7df85ff0f9b5

  • C:\Users\Admin\AppData\Local\Temp\_MEI23162\ucrtbase.dll
    Filesize

    1.1MB

    MD5

    8f53604f28132832353c099fadb2a54c

    SHA1

    7679e25d80e7d551c390e6ac6f7561bf2368f734

    SHA256

    5d652e1ba943587035b573e0dbcdc8a2f114030ac5cae4894805cc228dda3d22

    SHA512

    5b7e3775a0eca8ade32e092287342f20c80ba3f96ce2008eff5a68e0ac952087f4a19ca5f6a7bf1e3a8add8aed49ec8168238461f777445104bae9d89b99a43a