Analysis

  • max time kernel
    84s
  • max time network
    84s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240419-en
  • resource tags

    arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    30-04-2024 13:33

General

  • Target

    Celery/Celery V1.exe

  • Size

    800.0MB

  • MD5

    abdf485a5bc69f25b1874b5820cdc932

  • SHA1

    62a9f22f5dd232f9b75c8ca4fce4983c8c800aab

  • SHA256

    0748a1c46b6ff4d406b95cd07895e9cdc7721d2fb24d62ec10c4273258901765

  • SHA512

    066db062f466f0b593ccf539a4ccdb76b7202374e460d9bedad46c421d6aa3b83acba3dbfeef08682768de153f0d377d6478cc4bb16c989ee512fb58a0cddf28

  • SSDEEP

    24576:NXtOM33QyjO1IjZSKKBOJJK9UhKoZmM/geEpK7Twuj7zFQ76i:BpLjrjZZrKxoZjaw7T9j7q

Malware Config

Signatures

  • Detect ZGRat V1 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3328
      • C:\Users\Admin\AppData\Local\Temp\Celery\Celery V1.exe
        "C:\Users\Admin\AppData\Local\Temp\Celery\Celery V1.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3076
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k move Hormone Hormone.cmd & Hormone.cmd & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2056
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:2156
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa.exe opssvc.exe"
            4⤵
              PID:4912
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist
              4⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:4552
            • C:\Windows\SysWOW64\findstr.exe
              findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
              4⤵
                PID:252
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c md 55105125
                4⤵
                  PID:3308
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /V "BARRYDRIVENMEATLANKA" Occurrence
                  4⤵
                    PID:1612
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c copy /b Reviewed + Adventure + And + Spirituality + Proprietary + Rpg 55105125\u
                    4⤵
                      PID:3312
                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55105125\Molecules.pif
                      55105125\Molecules.pif 55105125\u
                      4⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of WriteProcessMemory
                      PID:4456
                    • C:\Windows\SysWOW64\PING.EXE
                      ping -n 5 127.0.0.1
                      4⤵
                      • Runs ping.exe
                      PID:1576
                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55105125\RegAsm.exe
                  C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55105125\RegAsm.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1176
                • C:\Users\Admin\AppData\Local\Temp\Celery\Celery V1.exe
                  "C:\Users\Admin\AppData\Local\Temp\Celery\Celery V1.exe"
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2724
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /k move Hormone Hormone.cmd & Hormone.cmd & exit
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1348
                    • C:\Windows\SysWOW64\tasklist.exe
                      tasklist
                      4⤵
                      • Enumerates processes with tasklist
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3736
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr /I "wrsa.exe opssvc.exe"
                      4⤵
                        PID:796
                      • C:\Windows\SysWOW64\tasklist.exe
                        tasklist
                        4⤵
                        • Enumerates processes with tasklist
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3844
                      • C:\Windows\SysWOW64\findstr.exe
                        findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
                        4⤵
                          PID:4128
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c md 55107535
                          4⤵
                            PID:2752
                          • C:\Windows\SysWOW64\findstr.exe
                            findstr /V "BARRYDRIVENMEATLANKA" Occurrence
                            4⤵
                              PID:3400
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c copy /b Reviewed + Adventure + And + Spirituality + Proprietary + Rpg 55107535\u
                              4⤵
                                PID:4368
                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55107535\Molecules.pif
                                55107535\Molecules.pif 55107535\u
                                4⤵
                                • Executes dropped EXE
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                PID:4684
                              • C:\Windows\SysWOW64\PING.EXE
                                ping -n 5 127.0.0.1
                                4⤵
                                • Runs ping.exe
                                PID:4712
                        • C:\Windows\System32\rundll32.exe
                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                          1⤵
                            PID:1628

                          Network

                          MITRE ATT&CK Matrix ATT&CK v13

                          Credential Access

                          Unsecured Credentials

                          2
                          T1552

                          Credentials In Files

                          2
                          T1552.001

                          Discovery

                          Query Registry

                          1
                          T1012

                          System Information Discovery

                          1
                          T1082

                          Process Discovery

                          1
                          T1057

                          Remote System Discovery

                          1
                          T1018

                          Collection

                          Data from Local System

                          2
                          T1005

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55105125\Molecules.pif
                            Filesize

                            872KB

                            MD5

                            6ee7ddebff0a2b78c7ac30f6e00d1d11

                            SHA1

                            f2f57024c7cc3f9ff5f999ee20c4f5c38bfc20a2

                            SHA256

                            865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4

                            SHA512

                            57d56de2bb882f491e633972003d7c6562ef2758c3731b913ff4d15379ada575062f4de2a48ca6d6d9241852a5b8a007f52792753fd8d8fee85b9a218714efd0

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55105125\RegAsm.exe
                            Filesize

                            63KB

                            MD5

                            42ab6e035df99a43dbb879c86b620b91

                            SHA1

                            c6e116569d17d8142dbb217b1f8bfa95bc148c38

                            SHA256

                            53195987d396986ebcb20425ac130e78ad308fdbd918f33f3fd92b99abda314b

                            SHA512

                            2e79de2d394ad33023d71611bb728b254aa4680b5a3a1ef5282b1155ddfaa2f3585c840a6700dfe0d1a276dac801298431f0187086d2e8f96b22f6c808fb97e5

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55105125\u
                            Filesize

                            588KB

                            MD5

                            467402743dd2623114ad4fed93843ff6

                            SHA1

                            05f54d31be9f3c6bab6d588369edfa1606d80bf7

                            SHA256

                            1bdbad9c9330955976daa2d6d2d00a94b5c6d8c66bc313e7eb2d8a0d3b2ccdf3

                            SHA512

                            54c20a2823e906be087e267c5b1f8d4915e1afbc3a540b0db2fb395d14fbd8b61a99138aa6e8df3cef80847a01ec5d223973e9958cfc0f4ff79061cdaf627a1b

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Adventure
                            Filesize

                            85KB

                            MD5

                            607d37a28e052b6a3c4704056b93fd72

                            SHA1

                            3d8bed7e30a08c933a236ecad87c10eb8cc70098

                            SHA256

                            997e31dac59b5eefaea4901b981ed1b0699e849376f8440ead6eecbf450d2ac3

                            SHA512

                            90e6a42a587de7c997102368ed1d98ab2daa789e8f4d1a8f99d0031697b0bca01e7d24245ac5384385a59c6181614ad2101e4faaea42faf14503eea38b6a76f8

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\And
                            Filesize

                            104KB

                            MD5

                            52ef794f8a37c32e26f7fe7c9a93479d

                            SHA1

                            0fba49275ef2cf68eb398540f6cad6b32452c656

                            SHA256

                            85364c627be59f1393fe15eeff1d7eb0c12fe48bf4374379e92ae3df240f459d

                            SHA512

                            06f3c0068894781a5094725d650e7a952f2ff8bcf6f2fa079d84faa3521221fc1b04c2e6aceef382a57796742174d17e451484d33f6a0b477b557b100fb4b2b5

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Curve
                            Filesize

                            291KB

                            MD5

                            b88f094a190f1ec96a75301857332100

                            SHA1

                            f78742eeee92c4598e03b26fae7c06f8afb5cce9

                            SHA256

                            1a36333113637ffadb22f400700abaab896b2633d041bf72471dee1a466fc39e

                            SHA512

                            e285371656e0b513f37fb50f2021a72543e5c2405604730611a0d95f850925d6342670713843af2ed724f1f58528bcfa723b30230812faf45283c0a58352f656

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Essence
                            Filesize

                            103KB

                            MD5

                            989668bcd752ccd5311db758eacd5879

                            SHA1

                            2dc11c1e56d5cff9717b4927c884774f8c48fc49

                            SHA256

                            f65fdcf542bd5d8c4f25c69ca2f5461ad473b873dcac5969977ed5c3488b7e15

                            SHA512

                            68982e6d2b95c99d84f00f6cc9f886157285d1aa4364fe851fcc4da67810b96b237e0008e92cce9fa5443f1f73e7761dd6b8998d2b040843f391958658d1c139

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Hormone
                            Filesize

                            24KB

                            MD5

                            924dc08c5ea1819adb3238301a40aeaf

                            SHA1

                            101c9f907bc770f4b3e526b1ec638d6fa5d9617d

                            SHA256

                            27ebc254bae189272ab946f52a44f5d0faf240a8c02aeb039e5d7aab05f3a244

                            SHA512

                            ccee76a6f4d3cc11e59cb09bf16d048f63e0a70d761390fe92a240cb784193117f97053b9694270371395b62943465e11ae2c4fe2e2ddc29dbffe99b09a7a08b

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Kinds
                            Filesize

                            267KB

                            MD5

                            ed8eec0cd0c783d40277993defca652a

                            SHA1

                            266215e6a72173004fced0f66b02b125c5b662eb

                            SHA256

                            b3cf65743cb0c4f6c8d16c873c3d956a74545f5a81107e38b09d055c97f9d01a

                            SHA512

                            1925645f02795e2ebf810bb68bf384ff7df28063632fcf03f95c847393eca60aa71a9a4e7e61f2d1bbc4177797b59a15a38b5dff7c441b822c876fff256abea6

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Medline
                            Filesize

                            169KB

                            MD5

                            1b37486aa580382857c5be68f90bc456

                            SHA1

                            0b1b0a27251c3b82f946ab6f24fd7f34afadef84

                            SHA256

                            e29fe0e88a607b1c390c4965d23666f88941ef969726bceb3f5584dfd9f9bd2b

                            SHA512

                            e5f8ccd9873c075e8ffd5f7ad0ef5c235d7a14ed516cd893a0aea4cd84743944f621d4c9cad1cb895665bdcc0811781721436a22ccddcbe0ccf6200adf8e628c

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Occurrence
                            Filesize

                            155B

                            MD5

                            d91bc77bb1d32b411cdc0094cc831039

                            SHA1

                            8cf67f88f7a5ac1563c9fd12e0605f76e23597cc

                            SHA256

                            cc36fa9ceabd9879e366d0a073ab1eca45ed10bd5848650185f8083d6c4ce067

                            SHA512

                            b82a016bfb6d498e8fefec616f6067711447ea7c46f907172171fdb14fc0a23cb3dfd70be673200d50dda6ab223ba0558213313a09ed40fdf5882d44893f5914

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Proprietary
                            Filesize

                            41KB

                            MD5

                            941fa8b8c391ac407b46f91b32305790

                            SHA1

                            1e1cd36e2714b823c212d26abec0d717552c2617

                            SHA256

                            59b6e82e5dfb2a7aafa1273157db6b3cc4295600d83700f82218cc5056970e46

                            SHA512

                            371af08ee59690667045cf68239eeaa9fbc0e2a5840c45852c84fd11c23faa2ae1c8baa5083e33b79d84dbc8476d633c359f23bf78e1c3b26e3e9103ef9efa95

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Reviewed
                            Filesize

                            48KB

                            MD5

                            a15c367162090d9b3bf4a4add6f32235

                            SHA1

                            f94f572b9901ce2d3740e1addc962e185f14d830

                            SHA256

                            bb53cfabb3b4c08b776bc16cd67f5326130b53c22b61479939f3b81a6d661e3d

                            SHA512

                            221d6f07e2fa8c1542a4425d2d57d83fbee993dbca0813acb06f4b3e2faff3aa5b8054e7da98174605c5cf1f0a5723fc485ba1441d52c28a702ec632761948db

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Rpg
                            Filesize

                            144KB

                            MD5

                            da09ca5a62b9a76e7d4d60919729a03a

                            SHA1

                            c41ae7d185c5d5a9fbddded1a09d4035cf62a034

                            SHA256

                            45a420e7c41346b52107eb47f58e423cfda3b9437910ec585e8edf53234c6d47

                            SHA512

                            04e52b2687d2d17bc19141817223515a515780097850678545ca4bcf44ca56f9601c6c01c35a178fac9d96f8ef1569d7205bd3871a5f17005bf2cefa131a6708

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Spirituality
                            Filesize

                            166KB

                            MD5

                            9c0009a72dd58619f00dd497fce85859

                            SHA1

                            2e56a3c785018ac40b0772fc2379540e1c154081

                            SHA256

                            4ad75e65d81fa4a63c6e761a482edc743f7446f8893abd35966e0280d2a59126

                            SHA512

                            f763dce6959bbaa38f101c8aa33dd545e6335f0357b3b23e76a334313bc88ee92f0958b3d2cb0b136a185185435c380ab4d7750becd1d9be32fe2a829fc3129e

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Tuesday
                            Filesize

                            42KB

                            MD5

                            b40715cfdce6d2555492ad9c86c4c2f9

                            SHA1

                            959db7f4b68b02514b25f19edb35d2d854c0bc68

                            SHA256

                            9174a007a19303faefacbcd80be8d1c1a9be2cdf13440b1827d0e0c27c1d3864

                            SHA512

                            1eb14b02fab454769f64b3a951f411abada7422b67801437ddb64ac1b5873c8cbe17d09ce48a2872922c6c7d456bec3892d808706d260f96a3b589570842fdd4

                          • memory/1176-42-0x0000000008320000-0x000000000842A000-memory.dmp
                            Filesize

                            1.0MB

                          • memory/1176-44-0x00000000082B0000-0x00000000082EC000-memory.dmp
                            Filesize

                            240KB

                          • memory/1176-39-0x0000000005170000-0x0000000005202000-memory.dmp
                            Filesize

                            584KB

                          • memory/1176-40-0x0000000005210000-0x000000000521A000-memory.dmp
                            Filesize

                            40KB

                          • memory/1176-41-0x00000000087F0000-0x0000000008E08000-memory.dmp
                            Filesize

                            6.1MB

                          • memory/1176-35-0x00000000009C0000-0x0000000000A42000-memory.dmp
                            Filesize

                            520KB

                          • memory/1176-43-0x0000000008250000-0x0000000008262000-memory.dmp
                            Filesize

                            72KB

                          • memory/1176-38-0x0000000005680000-0x0000000005C26000-memory.dmp
                            Filesize

                            5.6MB

                          • memory/1176-45-0x0000000008430000-0x000000000847C000-memory.dmp
                            Filesize

                            304KB

                          • memory/1176-46-0x00000000085A0000-0x0000000008606000-memory.dmp
                            Filesize

                            408KB

                          • memory/1176-47-0x0000000008F10000-0x0000000008F86000-memory.dmp
                            Filesize

                            472KB

                          • memory/1176-48-0x0000000008770000-0x000000000878E000-memory.dmp
                            Filesize

                            120KB

                          • memory/1176-49-0x0000000009950000-0x0000000009B12000-memory.dmp
                            Filesize

                            1.8MB

                          • memory/1176-50-0x000000000A050000-0x000000000A57C000-memory.dmp
                            Filesize

                            5.2MB