Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2024 16:29

General

  • Target

    bCelery.github.io-1.0.5-c/index.md

  • Size

    11KB

  • MD5

    8acf3036d0aa1870f01a5bbf22a1205d

  • SHA1

    9a6ee2a96dc9d28e1bba8c94654cd13072169f02

  • SHA256

    e32b5b7f532f6bd371f59f842976f0a7af2d9df12c738bc92ddfd9eab283bf81

  • SHA512

    18a1fd34e59545bc39a2978638a8cf167057e3e1931d6835e09c920033ff69921bf85d172511c2c39992fb08dd4836a8d33e3e2a8b0cc7d3000ba50ce163e69b

  • SSDEEP

    192:ny8gIcy8gIcy8gIcy8gIcy8gIcy8gIcy8gIcy8gIcy8gIcy8gIcy8gIcy8gIcy8I:ny8gIcy8gIcy8gIcy8gIcy8gIcy8gIcO

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\bCelery.github.io-1.0.5-c\index.md
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2564
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bCelery.github.io-1.0.5-c\index.md
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bCelery.github.io-1.0.5-c\index.md"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    11a96b4ec818fe5354894fb6c4399166

    SHA1

    48da0b9221f85339700db56531020b7629814152

    SHA256

    ec26f12b277567103cdcd10fbcb6ae9e5061be198de93a1131dc6d03cdba7fa8

    SHA512

    f76881e17e6ec52e85c5cb849b967b3c1c1f3131599b53ba0ab2343348c6f482cc5550bc5ddaa69aa943740dfb67353f7523f240e18aa6a4c6daab7338ea4754