Overview
overview
8Static
static
1bCelery.gi...-c.zip
windows7-x64
1bCelery.gi...-c.zip
windows10-2004-x64
1bCelery.gi...ICENSE
windows7-x64
1bCelery.gi...ICENSE
windows10-2004-x64
1bCelery.gi...ig.yml
windows7-x64
3bCelery.gi...ig.yml
windows10-2004-x64
3bCelery.gi.../a.ps1
windows7-x64
3bCelery.gi.../a.ps1
windows10-2004-x64
8bCelery.gi...ry.ico
windows7-x64
3bCelery.gi...ry.ico
windows10-2004-x64
3bCelery.gi...ry.png
windows7-x64
3bCelery.gi...ry.png
windows10-2004-x64
3bCelery.gi...b.html
windows7-x64
3bCelery.gi...b.html
windows10-2004-x64
3bCelery.gi...dex.md
windows7-x64
3bCelery.gi...dex.md
windows10-2004-x64
3bCelery.gi...ts.zip
windows7-x64
1bCelery.gi...ts.zip
windows10-2004-x64
1@ Games (b...er.lua
windows7-x64
1@ Games (b...er.lua
windows10-2004-x64
1@ Games (b...er.lua
windows7-x64
1@ Games (b...er.lua
windows10-2004-x64
1@ Games (b...ch.lua
windows7-x64
1@ Games (b...ch.lua
windows10-2004-x64
1@ Games (b...Hub.js
windows7-x64
3@ Games (b...Hub.js
windows10-2004-x64
3@ Games (b...GUI.js
windows7-x64
3@ Games (b...GUI.js
windows10-2004-x64
3@ Universa...Hub.js
windows7-x64
3@ Universa...Hub.js
windows10-2004-x64
3@ Universa...rt.lua
windows7-x64
1@ Universa...rt.lua
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07-08-2024 16:29
Static task
static1
Behavioral task
behavioral1
Sample
bCelery.github.io-1.0.5-c.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bCelery.github.io-1.0.5-c.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
bCelery.github.io-1.0.5-c/LICENSE
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
bCelery.github.io-1.0.5-c/LICENSE
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
bCelery.github.io-1.0.5-c/_config.yml
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
bCelery.github.io-1.0.5-c/_config.yml
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
bCelery.github.io-1.0.5-c/a.ps1
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
bCelery.github.io-1.0.5-c/a.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
bCelery.github.io-1.0.5-c/assets/betterCelery.ico
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
bCelery.github.io-1.0.5-c/assets/betterCelery.ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
bCelery.github.io-1.0.5-c/betterCelery.png
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
bCelery.github.io-1.0.5-c/betterCelery.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
bCelery.github.io-1.0.5-c/google294c7ccea849960b.html
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
bCelery.github.io-1.0.5-c/google294c7ccea849960b.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
bCelery.github.io-1.0.5-c/index.md
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
bCelery.github.io-1.0.5-c/index.md
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
bCelery.github.io-1.0.5-c/src/Scripts.zip
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
bCelery.github.io-1.0.5-c/src/Scripts.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
@ Games (bCelery)/Arsenal/Arsenal SanityLoader.lua
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
@ Games (bCelery)/Arsenal/Arsenal SanityLoader.lua
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
@ Games (bCelery)/Arsenal/Shallow's Attribute Changer.lua
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
@ Games (bCelery)/Arsenal/Shallow's Attribute Changer.lua
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
@ Games (bCelery)/Doors/Clutch.lua
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
@ Games (bCelery)/Doors/Clutch.lua
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
@ Games (bCelery)/Murder Mystery 2/NexusHub.js
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
@ Games (bCelery)/Murder Mystery 2/NexusHub.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
@ Games (bCelery)/Pressure/PressureGUI.js
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
@ Games (bCelery)/Pressure/PressureGUI.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
@ Universal & Hubs (bCelery)/CatHub.js
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
@ Universal & Hubs (bCelery)/CatHub.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
@ Universal & Hubs (bCelery)/Click Teleport.lua
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
@ Universal & Hubs (bCelery)/Click Teleport.lua
Resource
win10v2004-20240802-en
General
-
Target
bCelery.github.io-1.0.5-c/index.md
-
Size
11KB
-
MD5
8acf3036d0aa1870f01a5bbf22a1205d
-
SHA1
9a6ee2a96dc9d28e1bba8c94654cd13072169f02
-
SHA256
e32b5b7f532f6bd371f59f842976f0a7af2d9df12c738bc92ddfd9eab283bf81
-
SHA512
18a1fd34e59545bc39a2978638a8cf167057e3e1931d6835e09c920033ff69921bf85d172511c2c39992fb08dd4836a8d33e3e2a8b0cc7d3000ba50ce163e69b
-
SSDEEP
192:ny8gIcy8gIcy8gIcy8gIcy8gIcy8gIcy8gIcy8gIcy8gIcy8gIcy8gIcy8gIcy8I:ny8gIcy8gIcy8gIcy8gIcy8gIcy8gIcO
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\md_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\md_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\md_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.md rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.md\ = "md_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\md_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\md_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\md_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2944 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2944 AcroRd32.exe 2944 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2544 2564 cmd.exe 31 PID 2564 wrote to memory of 2544 2564 cmd.exe 31 PID 2564 wrote to memory of 2544 2564 cmd.exe 31 PID 2544 wrote to memory of 2944 2544 rundll32.exe 33 PID 2544 wrote to memory of 2944 2544 rundll32.exe 33 PID 2544 wrote to memory of 2944 2544 rundll32.exe 33 PID 2544 wrote to memory of 2944 2544 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\bCelery.github.io-1.0.5-c\index.md1⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bCelery.github.io-1.0.5-c\index.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bCelery.github.io-1.0.5-c\index.md"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2944
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD511a96b4ec818fe5354894fb6c4399166
SHA148da0b9221f85339700db56531020b7629814152
SHA256ec26f12b277567103cdcd10fbcb6ae9e5061be198de93a1131dc6d03cdba7fa8
SHA512f76881e17e6ec52e85c5cb849b967b3c1c1f3131599b53ba0ab2343348c6f482cc5550bc5ddaa69aa943740dfb67353f7523f240e18aa6a4c6daab7338ea4754