Resubmissions

06/08/2024, 13:03

240806-qanexatepg 4

06/08/2024, 13:02

240806-p9z3batenh 3

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2024, 13:03

General

  • Target

    CeleryLogo.ico

  • Size

    4KB

  • MD5

    3246befa41923904f2963da9b19c2dd7

  • SHA1

    fdfec504286148eb258e87298df30fac0e1cb606

  • SHA256

    eabe2efbb4f11ff62c0fd16f8aa5e932a52d8f0603226b8b8320e00335bda70b

  • SHA512

    7e234fb730c67e233cac775feb793376fcd9a9548025867ffbf9420398fccc72287bc39162cdacfba6b43613fa54695a1c0b8a14b45f6a381959d3e4cb728185

  • SSDEEP

    48:4MR4sNF78zZHhU2fjhzoivJxBx9thQPvsFwz10C6u4N2y+AIXanZ2xuxh+7P:HmM8/WijFtYaQ0juXj/y56P

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\CeleryLogo.ico
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:1924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1924-0-0x0000000001D70000-0x0000000001D71000-memory.dmp

    Filesize

    4KB

  • memory/1924-1-0x0000000001D70000-0x0000000001D71000-memory.dmp

    Filesize

    4KB