Overview
overview
3Static
static
3acf7fs.7z
windows11-21h2-x64
3Release/Be...er.dll
windows11-21h2-x64
1Release/CeleryApp.exe
windows11-21h2-x64
1Release/CeleryIn.dll
windows11-21h2-x64
1Release/Ce...ct.exe
windows11-21h2-x64
1Release/Costura.dll
windows11-21h2-x64
1Release/Dragablz.dll
windows11-21h2-x64
1Release/Ma...rs.dll
windows11-21h2-x64
1Release/Ma...ns.dll
windows11-21h2-x64
1Release/Mi...re.dll
windows11-21h2-x64
1Release/Mi...ms.dll
windows11-21h2-x64
1Release/Mi...pf.dll
windows11-21h2-x64
1Release/Mi...rs.dll
windows11-21h2-x64
1Release/Sy...ce.dll
windows11-21h2-x64
1Release/bi...x.html
windows11-21h2-x64
3Release/bi...ain.js
windows11-21h2-x64
3Release/bi...tes.js
windows11-21h2-x64
3Release/bi...lua.js
windows11-21h2-x64
3Release/bi...ion.js
windows11-21h2-x64
3Release/bi...ain.js
windows11-21h2-x64
3Release/bi...der.js
windows11-21h2-x64
3Release/ru...er.dll
windows11-21h2-x64
1Release/ru...er.dll
windows11-21h2-x64
3Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-08-2024 08:12
Static task
static1
Behavioral task
behavioral1
Sample
acf7fs.7z
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
Release/BetterFolderBrowser.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Release/CeleryApp.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
Release/CeleryIn.dll
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
Release/CeleryInject.exe
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
Release/Costura.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
Release/Dragablz.dll
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
Release/MaterialDesignColors.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
Release/MaterialDesignExtensions.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
Release/Microsoft.Web.WebView2.Core.dll
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
Release/Microsoft.Web.WebView2.WinForms.dll
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
Release/Microsoft.Web.WebView2.Wpf.dll
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
Release/Microsoft.Xaml.Behaviors.dll
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
Release/System.Diagnostics.DiagnosticSource.dll
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
Release/bin/Monaco/index.html
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
Release/bin/Monaco/vs/base/worker/workerMain.js
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
Release/bin/Monaco/vs/basic-languages/lua/autocompletes.js
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
Release/bin/Monaco/vs/basic-languages/lua/lua.js
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
Release/bin/Monaco/vs/basic-languages/monaco.contribution.js
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
Release/bin/Monaco/vs/editor/editor.main.js
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
Release/bin/Monaco/vs/loader.js
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
Release/runtimes/win-x64/native/WebView2Loader.dll
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
Release/runtimes/win-x86/native/WebView2Loader.dll
Resource
win11-20240802-en
General
-
Target
Release/bin/Monaco/index.html
-
Size
13KB
-
MD5
8132342ce4b039603cbb3b1a32ab859b
-
SHA1
66c46050a6e5b08758c00455ae26a6c66e94ce4c
-
SHA256
3818906ed429acd27aabad7ec8771893d60658ea31b8d0c92418b96de8ee94e6
-
SHA512
44d93118187e703af1fc1627de7e97c39072e666c9086b1b4c00a7eadce1913c84dc97e8f80e2b514154ef66b23baddbfd71a2faa250735ddf4d2bc12709cef4
-
SSDEEP
192:oL3bXRggAbYm/9mv2Oxr09VpDwFgBsK7u24FzTkcmc/VT+9taAc4dReigXN:2RggAbYmbD9V9wFgBs+SFN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 3540 msedge.exe 3540 msedge.exe 872 identity_helper.exe 872 identity_helper.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 656 wrote to memory of 1408 656 msedge.exe 81 PID 656 wrote to memory of 1408 656 msedge.exe 81 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 4156 656 msedge.exe 82 PID 656 wrote to memory of 1616 656 msedge.exe 83 PID 656 wrote to memory of 1616 656 msedge.exe 83 PID 656 wrote to memory of 3112 656 msedge.exe 84 PID 656 wrote to memory of 3112 656 msedge.exe 84 PID 656 wrote to memory of 3112 656 msedge.exe 84 PID 656 wrote to memory of 3112 656 msedge.exe 84 PID 656 wrote to memory of 3112 656 msedge.exe 84 PID 656 wrote to memory of 3112 656 msedge.exe 84 PID 656 wrote to memory of 3112 656 msedge.exe 84 PID 656 wrote to memory of 3112 656 msedge.exe 84 PID 656 wrote to memory of 3112 656 msedge.exe 84 PID 656 wrote to memory of 3112 656 msedge.exe 84 PID 656 wrote to memory of 3112 656 msedge.exe 84 PID 656 wrote to memory of 3112 656 msedge.exe 84 PID 656 wrote to memory of 3112 656 msedge.exe 84 PID 656 wrote to memory of 3112 656 msedge.exe 84 PID 656 wrote to memory of 3112 656 msedge.exe 84 PID 656 wrote to memory of 3112 656 msedge.exe 84 PID 656 wrote to memory of 3112 656 msedge.exe 84 PID 656 wrote to memory of 3112 656 msedge.exe 84 PID 656 wrote to memory of 3112 656 msedge.exe 84 PID 656 wrote to memory of 3112 656 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Release\bin\Monaco\index.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa46233cb8,0x7ffa46233cc8,0x7ffa46233cd82⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,13469110626163496355,2733525879973766291,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1944 /prefetch:22⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1936,13469110626163496355,2733525879973766291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1936,13469110626163496355,2733525879973766291,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,13469110626163496355,2733525879973766291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,13469110626163496355,2733525879973766291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1936,13469110626163496355,2733525879973766291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,13469110626163496355,2733525879973766291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,13469110626163496355,2733525879973766291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,13469110626163496355,2733525879973766291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,13469110626163496355,2733525879973766291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,13469110626163496355,2733525879973766291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,13469110626163496355,2733525879973766291,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50487ced0fdfd8d7a8e717211fcd7d709
SHA1598605311b8ef24b0a2ba2ccfedeecabe7fec901
SHA25676693c580fd4aadce2419a1b80795bb4ff78d70c1fd4330e777e04159023f571
SHA51216e1c6e9373b6d5155310f64bb71979601852f18ee3081385c17ffb943ab078ce27cd665fb8d6f3bcc6b98c8325b33403571449fad044e22aa50a3bf52366993
-
Filesize
152B
MD55578283903c07cc737a43625e2cbb093
SHA1f438ad2bef7125e928fcde43082a20457f5df159
SHA2567268c7d8375d50096fd5f773a0685ac724c6c2aece7dc273c7eb96b28e2935b2
SHA5123b29531c0bcc70bfc0b1af147fe64ce0a7c4d3cbadd2dbc58d8937a8291daae320206deb0eb2046c3ffad27e01af5aceca4708539389da102bff4680afaa1601
-
Filesize
6KB
MD5f201d2c0d92d1055358c6b26ef02a062
SHA107d977b36bcdb05a0ec6b879eba14329610b1e67
SHA2567061069a9a3c5b025523204ceb8fc73dceada8d74528f6256c8573fd20686315
SHA5128da65b744f271b102bf2f68afe00a7cdef08c5698541f9d5ec6f0b916c928f4e3f2f8ef791410c7b0825b7dc55aa85e80769d33c7f52469c0781fadd6d56fecb
-
Filesize
6KB
MD59b79c67157045097bcd6c62d38a4513e
SHA17ac49ccf35ed6f65417d6e7cba466794ecb81c4a
SHA2566345b733767dde204c95d6fe9e9bc8c685b6b951afdac24135027338b757b6d3
SHA512526512b23db4dc60c1aacb0ff5795d06ea8574d78aafd2820d75ef066dc071bea5c588abc3e918632836d424181a8fc124cc67bffd5996eb457120bce2807b40
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5518cedd7a70a4989235203d13a279225
SHA18985bead80346198630dff4b05ee9bc6a6a1dd2b
SHA256588d0c002655e7437dcafbad0e483aea8b5b01a409762b154bb0be634cbc2294
SHA512433c3cdd2e65ad90c245f00958249ba657512608272dd0d84d637a131f746d12aed9d3a9943dadcc2c5f1db7f2cf07491c0daffe43c9a5e1ebee77c91df9dd6e