Analysis

  • max time kernel
    27s
  • max time network
    30s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-08-2024 11:45

General

  • Target

    CeleryInject.exe

  • Size

    5.0MB

  • MD5

    a219324612da6da115423f2118ed7d60

  • SHA1

    e25653239651637604e1b6e65fdd719aee2917ec

  • SHA256

    b3f9cdae756e9cf1f5b8a823648395ed68d82c6a62d606fd0c6eb9a0be10d51f

  • SHA512

    9958ca39f43c7754e6a5586e5cb1a40963a4ec9db898051c327198c31708beb067944d1581355f2bb04e69de62e69de8a6a708213d60d571f74c112b3d489187

  • SSDEEP

    49152:HBAPhbBL8IjBDC0J0S27DGjyclWb53PppOPxjfsRdn6dnndn+dnT0Uf:HnIRZJ

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CeleryInject.exe
    "C:\Users\Admin\AppData\Local\Temp\CeleryInject.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4140

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads