Analysis

  • max time kernel
    9s
  • max time network
    14s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240704-en
  • resource tags

    arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08-07-2024 10:41

General

  • Target

    Release/CeleryApp.exe

  • Size

    8.8MB

  • MD5

    d2a7e4f3b8fdc023e6579c35e5e83769

  • SHA1

    43ce10ac8a1c9423cd70991bbb92c7ad9632cb2c

  • SHA256

    43f78f751afc09617b735d086c6855471e34d6ca78a6a862b6448bf67a8f0faf

  • SHA512

    d999132c597ff4c407b5de2c4aa9a39f95e92064680b370fb9e6966e1af0726fdd063d8e15e29fda370b163d71ead9da7d103fb36e37a2388432fb18ae47193a

  • SSDEEP

    98304:zQgLIRfyC7egWJ3iJzdjf4fwraOWcD9XdMPABIw/t6KHDicVwzUs7o:zQguhegD4fJOWs9XNBZ16M2cuU

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Release\CeleryApp.exe
    "C:\Users\Admin\AppData\Local\Temp\Release\CeleryApp.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3912
    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=CeleryApp.exe --webview-exe-version=1.0.0.0 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --mojo-named-platform-channel-pipe=3912.2160.4983591545596070024
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3056
      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0xe0,0x1b4,0x7ffd3dfd3cb8,0x7ffd3dfd3cc8,0x7ffd3dfd3cd8
        3⤵
          PID:4904
        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1876,12364254256923198784,12247144815265350052,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\EBWebView" --webview-exe-name=CeleryApp.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1940 /prefetch:2
          3⤵
            PID:1476
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1876,12364254256923198784,12247144815265350052,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\EBWebView" --webview-exe-name=CeleryApp.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2228 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2676
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1876,12364254256923198784,12247144815265350052,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\EBWebView" --webview-exe-name=CeleryApp.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2476 /prefetch:8
            3⤵
              PID:1268
            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1876,12364254256923198784,12247144815265350052,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\EBWebView" --webview-exe-name=CeleryApp.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3068 /prefetch:1
              3⤵
                PID:3000
          • C:\Windows\System32\CompPkgSrv.exe
            C:\Windows\System32\CompPkgSrv.exe -Embedding
            1⤵
              PID:1540
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:3648

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\EBWebView\Crashpad\settings.dat

                Filesize

                152B

                MD5

                c0bff035a817776b5713498fc8b847e3

                SHA1

                1f3105edf5f6a7bb5034977e841044f2bdb7cfc2

                SHA256

                aa4ffc55656ba0ca65a12d06dbac749bd67bc661add0d462f2b6e6ca4372b87a

                SHA512

                cfcbd7d9bd390419338baa65101d4260a8b9da756adc3656c1c67fc6bb298d689cbc04c0f1d8fc01e6662ab5715f8c4ea2ce9ff138b03e0aaeed49db7a634f17

              • C:\Users\Admin\AppData\Local\Temp\EBWebView\Crashpad\settings.dat

                Filesize

                152B

                MD5

                88efa95025be647c09bb35c3357db1b5

                SHA1

                82680e4e05c32c428947b9c672c8e43de6ef683e

                SHA256

                281fd6325efcebcdb3182520f0f7445df1a480a96719b8530714599f42719851

                SHA512

                0248ebfd32530ab6580ad1e8109cfdcdf577c770cc00a3f3ef7e674086d3a03497015fe1bd3e592e04ee136e2878e3c2e0286d8264f9f4c4a0913fd34fc87b8a

              • C:\Users\Admin\AppData\Local\Temp\EBWebView\Crashpad\throttle_store.dat

                Filesize

                20B

                MD5

                9e4e94633b73f4a7680240a0ffd6cd2c

                SHA1

                e68e02453ce22736169a56fdb59043d33668368f

                SHA256

                41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                SHA512

                193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

              • C:\Users\Admin\AppData\Local\Temp\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001

                Filesize

                41B

                MD5

                5af87dfd673ba2115e2fcf5cfdb727ab

                SHA1

                d5b5bbf396dc291274584ef71f444f420b6056f1

                SHA256

                f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                SHA512

                de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

              • C:\Users\Admin\AppData\Local\Temp\EBWebView\Default\Sync Data\LevelDB\CURRENT

                Filesize

                16B

                MD5

                46295cac801e5d4857d09837238a6394

                SHA1

                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                SHA256

                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                SHA512

                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

              • memory/1476-37-0x00007FFD65730000-0x00007FFD65731000-memory.dmp

                Filesize

                4KB

              • memory/3912-6-0x0000026FE9110000-0x0000026FE91CA000-memory.dmp

                Filesize

                744KB

              • memory/3912-20-0x00007FFD45520000-0x00007FFD45FE2000-memory.dmp

                Filesize

                10.8MB

              • memory/3912-9-0x0000026FE8DC0000-0x0000026FE8DC8000-memory.dmp

                Filesize

                32KB

              • memory/3912-11-0x0000026FE8DD0000-0x0000026FE8DDE000-memory.dmp

                Filesize

                56KB

              • memory/3912-10-0x0000026FE9450000-0x0000026FE9488000-memory.dmp

                Filesize

                224KB

              • memory/3912-12-0x00007FFD45520000-0x00007FFD45FE2000-memory.dmp

                Filesize

                10.8MB

              • memory/3912-13-0x00007FFD45520000-0x00007FFD45FE2000-memory.dmp

                Filesize

                10.8MB

              • memory/3912-18-0x0000026FEFD00000-0x0000026FEFD0A000-memory.dmp

                Filesize

                40KB

              • memory/3912-19-0x0000026FEFA00000-0x0000026FEFA0A000-memory.dmp

                Filesize

                40KB

              • memory/3912-8-0x0000026FE91D0000-0x0000026FE9244000-memory.dmp

                Filesize

                464KB

              • memory/3912-7-0x0000026FE8D90000-0x0000026FE8D9E000-memory.dmp

                Filesize

                56KB

              • memory/3912-0-0x00007FFD45523000-0x00007FFD45525000-memory.dmp

                Filesize

                8KB

              • memory/3912-26-0x00007FFD45520000-0x00007FFD45FE2000-memory.dmp

                Filesize

                10.8MB

              • memory/3912-5-0x0000026FE9780000-0x0000026FEA09E000-memory.dmp

                Filesize

                9.1MB

              • memory/3912-4-0x00007FFD45520000-0x00007FFD45FE2000-memory.dmp

                Filesize

                10.8MB

              • memory/3912-3-0x0000026FE8DE0000-0x0000026FE8E30000-memory.dmp

                Filesize

                320KB

              • memory/3912-2-0x0000026FD0450000-0x0000026FD0490000-memory.dmp

                Filesize

                256KB

              • memory/3912-1-0x0000026FCDED0000-0x0000026FCE796000-memory.dmp

                Filesize

                8.8MB

              • memory/3912-91-0x00007FFD45520000-0x00007FFD45FE2000-memory.dmp

                Filesize

                10.8MB

              • memory/3912-106-0x0000026FF0330000-0x0000026FF0858000-memory.dmp

                Filesize

                5.2MB