Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
1bCelery.gi...-c.zip
windows7-x64
1bCelery.gi...-c.zip
windows10-2004-x64
1bCelery.gi...ICENSE
windows7-x64
1bCelery.gi...ICENSE
windows10-2004-x64
1bCelery.gi...ig.yml
windows7-x64
3bCelery.gi...ig.yml
windows10-2004-x64
3bCelery.gi.../a.ps1
windows7-x64
3bCelery.gi.../a.ps1
windows10-2004-x64
8bCelery.gi...ry.ico
windows7-x64
3bCelery.gi...ry.ico
windows10-2004-x64
3bCelery.gi...ry.png
windows7-x64
3bCelery.gi...ry.png
windows10-2004-x64
3bCelery.gi...b.html
windows7-x64
3bCelery.gi...b.html
windows10-2004-x64
3bCelery.gi...dex.md
windows7-x64
3bCelery.gi...dex.md
windows10-2004-x64
3bCelery.gi...ts.zip
windows7-x64
1bCelery.gi...ts.zip
windows10-2004-x64
1@ Games (b...er.lua
windows7-x64
1@ Games (b...er.lua
windows10-2004-x64
1@ Games (b...er.lua
windows7-x64
1@ Games (b...er.lua
windows10-2004-x64
1@ Games (b...ch.lua
windows7-x64
1@ Games (b...ch.lua
windows10-2004-x64
1@ Games (b...Hub.js
windows7-x64
3@ Games (b...Hub.js
windows10-2004-x64
3@ Games (b...GUI.js
windows7-x64
3@ Games (b...GUI.js
windows10-2004-x64
3@ Universa...Hub.js
windows7-x64
3@ Universa...Hub.js
windows10-2004-x64
3@ Universa...rt.lua
windows7-x64
1@ Universa...rt.lua
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/08/2024, 16:29
Static task
static1
Behavioral task
behavioral1
Sample
bCelery.github.io-1.0.5-c.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bCelery.github.io-1.0.5-c.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
bCelery.github.io-1.0.5-c/LICENSE
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
bCelery.github.io-1.0.5-c/LICENSE
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
bCelery.github.io-1.0.5-c/_config.yml
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
bCelery.github.io-1.0.5-c/_config.yml
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
bCelery.github.io-1.0.5-c/a.ps1
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
bCelery.github.io-1.0.5-c/a.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
bCelery.github.io-1.0.5-c/assets/betterCelery.ico
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
bCelery.github.io-1.0.5-c/assets/betterCelery.ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
bCelery.github.io-1.0.5-c/betterCelery.png
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
bCelery.github.io-1.0.5-c/betterCelery.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
bCelery.github.io-1.0.5-c/google294c7ccea849960b.html
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
bCelery.github.io-1.0.5-c/google294c7ccea849960b.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
bCelery.github.io-1.0.5-c/index.md
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
bCelery.github.io-1.0.5-c/index.md
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
bCelery.github.io-1.0.5-c/src/Scripts.zip
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
bCelery.github.io-1.0.5-c/src/Scripts.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
@ Games (bCelery)/Arsenal/Arsenal SanityLoader.lua
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
@ Games (bCelery)/Arsenal/Arsenal SanityLoader.lua
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
@ Games (bCelery)/Arsenal/Shallow's Attribute Changer.lua
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
@ Games (bCelery)/Arsenal/Shallow's Attribute Changer.lua
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
@ Games (bCelery)/Doors/Clutch.lua
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
@ Games (bCelery)/Doors/Clutch.lua
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
@ Games (bCelery)/Murder Mystery 2/NexusHub.js
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
@ Games (bCelery)/Murder Mystery 2/NexusHub.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
@ Games (bCelery)/Pressure/PressureGUI.js
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
@ Games (bCelery)/Pressure/PressureGUI.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
@ Universal & Hubs (bCelery)/CatHub.js
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
@ Universal & Hubs (bCelery)/CatHub.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
@ Universal & Hubs (bCelery)/Click Teleport.lua
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
@ Universal & Hubs (bCelery)/Click Teleport.lua
Resource
win10v2004-20240802-en
General
-
Target
bCelery.github.io-1.0.5-c/_config.yml
-
Size
160B
-
MD5
c66a84a7578995d8c1f48640b358f346
-
SHA1
5c36aeb2536b0097f933ac4948c8b3bc3f11abb1
-
SHA256
0f7e03c437276a10096a0f306b07bcd6dc15860eaa28861e1d208f8def8e7c6c
-
SHA512
a36b71dfcd138eeb2a19da7e8929479aa502ebddc0589d6b87d4fae788097ed0b03172eee5bfdef6fda0cdf4ae65834938cce00605ea1070b375b6aaa5e6e0df
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.yml rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.yml\ = "yml_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\yml_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\yml_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\yml_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\yml_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\yml_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\yml_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1972 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1972 AcroRd32.exe 1972 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2320 2200 cmd.exe 29 PID 2200 wrote to memory of 2320 2200 cmd.exe 29 PID 2200 wrote to memory of 2320 2200 cmd.exe 29 PID 2320 wrote to memory of 1972 2320 rundll32.exe 32 PID 2320 wrote to memory of 1972 2320 rundll32.exe 32 PID 2320 wrote to memory of 1972 2320 rundll32.exe 32 PID 2320 wrote to memory of 1972 2320 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\bCelery.github.io-1.0.5-c\_config.yml1⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bCelery.github.io-1.0.5-c\_config.yml2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bCelery.github.io-1.0.5-c\_config.yml"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ec85d02aee0491a38be4d8a707aa2fc3
SHA13bc1fb4bff7f109bcebd25ae7481dc82ef3a2420
SHA256aaff38ff9ee0477a552ab7e393fa9977d83e247e8c3a97e63025a3b896aa4b62
SHA5127cbaaa3646fe13f26f3ca799bf5246d087bba9c5b98022632cadc22965719996ee5dadf6ba1d014575a9c62ac1a13f8e3e6766b854e4cadac6022dab261b81d8