Analysis

  • max time kernel
    125s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2024, 12:33

General

  • Target

    CeleryScript.bin

  • Size

    225KB

  • MD5

    cce7a3e2723d9f568952e5cf57c02171

  • SHA1

    646a1558aebfdff7eb3d3b9df6df4560848c171b

  • SHA256

    3903081514fec9c72cb33e4bbfb61986a67555deb1eb90ba82d3b46785454654

  • SHA512

    6dd8989e3d331f4b20c1594fc9b151292da193476eb181d8aea588944b402430d680da78f13451b84b3eccd77c2db80952d0add2baa08c89a8d1600d54292154

  • SSDEEP

    1536:LIwV7Al+RN0OzMa7Ja015BDEDD/p3sPH/tjuubLE9r8ZpZ+cstSMaiOMyg6lp3NK:0wODDR3sP1SubLE9oXMcstSTiOMy1dK

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\CeleryScript.bin
    1⤵
    • Modifies registry class
    PID:4788
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1716
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4116,i,1602949858158667699,12464335823361976127,262144 --variations-seed-version --mojo-platform-channel-handle=4448 /prefetch:8
    1⤵
      PID:2568

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads