Analysis
-
max time kernel
61s -
max time network
64s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/08/2024, 19:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/YaBoyTuesday/CeleryNewest/raw/main/CeleryRelease2.zip
Resource
win11-20240802-en
General
-
Target
https://github.com/YaBoyTuesday/CeleryNewest/raw/main/CeleryRelease2.zip
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 raw.githubusercontent.com 12 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\CeleryRelease2.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4100 msedge.exe 4100 msedge.exe 1340 msedge.exe 1340 msedge.exe 8 identity_helper.exe 8 identity_helper.exe 3624 msedge.exe 3624 msedge.exe 2568 msedge.exe 2568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe -
Suspicious use of FindShellTrayWindow 60 IoCs
pid Process 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1340 wrote to memory of 3588 1340 msedge.exe 81 PID 1340 wrote to memory of 3588 1340 msedge.exe 81 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 1236 1340 msedge.exe 82 PID 1340 wrote to memory of 4100 1340 msedge.exe 83 PID 1340 wrote to memory of 4100 1340 msedge.exe 83 PID 1340 wrote to memory of 3500 1340 msedge.exe 84 PID 1340 wrote to memory of 3500 1340 msedge.exe 84 PID 1340 wrote to memory of 3500 1340 msedge.exe 84 PID 1340 wrote to memory of 3500 1340 msedge.exe 84 PID 1340 wrote to memory of 3500 1340 msedge.exe 84 PID 1340 wrote to memory of 3500 1340 msedge.exe 84 PID 1340 wrote to memory of 3500 1340 msedge.exe 84 PID 1340 wrote to memory of 3500 1340 msedge.exe 84 PID 1340 wrote to memory of 3500 1340 msedge.exe 84 PID 1340 wrote to memory of 3500 1340 msedge.exe 84 PID 1340 wrote to memory of 3500 1340 msedge.exe 84 PID 1340 wrote to memory of 3500 1340 msedge.exe 84 PID 1340 wrote to memory of 3500 1340 msedge.exe 84 PID 1340 wrote to memory of 3500 1340 msedge.exe 84 PID 1340 wrote to memory of 3500 1340 msedge.exe 84 PID 1340 wrote to memory of 3500 1340 msedge.exe 84 PID 1340 wrote to memory of 3500 1340 msedge.exe 84 PID 1340 wrote to memory of 3500 1340 msedge.exe 84 PID 1340 wrote to memory of 3500 1340 msedge.exe 84 PID 1340 wrote to memory of 3500 1340 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/YaBoyTuesday/CeleryNewest/raw/main/CeleryRelease2.zip1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb37d73cb8,0x7ffb37d73cc8,0x7ffb37d73cd82⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,983208719833037645,17701814913101912194,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1812 /prefetch:22⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,983208719833037645,17701814913101912194,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,983208719833037645,17701814913101912194,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2416 /prefetch:82⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,983208719833037645,17701814913101912194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,983208719833037645,17701814913101912194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,983208719833037645,17701814913101912194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,983208719833037645,17701814913101912194,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,983208719833037645,17701814913101912194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1912,983208719833037645,17701814913101912194,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5808 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,983208719833037645,17701814913101912194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,983208719833037645,17701814913101912194,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,983208719833037645,17701814913101912194,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4024 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1912,983208719833037645,17701814913101912194,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4900
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8276eab0f8f0c0bb325b5b8c329f64f
SHA18ce681e4056936ca8ccd6f487e7cd7cccbae538b
SHA256847f60e288d327496b72dbe1e7aa1470a99bf27c0a07548b6a386a6188cd72da
SHA51242f91bf90e92220d0731fa4279cc5773d5e9057a9587f311bee0b3f7f266ddceca367bd0ee7f1438c3606598553a2372316258c05e506315e4e11760c8f13918
-
Filesize
152B
MD5058032c530b52781582253cb245aa731
SHA17ca26280e1bfefe40e53e64345a0d795b5303fab
SHA2561c3a7192c514ef0d2a8cf9115cfb44137ca98ec6daa4f68595e2be695c7ed67e
SHA51277fa3cdcd53255e7213bb99980049e11d6a2160f8130c84bd16b35ba9e821a4e51716371526ec799a5b4927234af99e0958283d78c0799777ab4dfda031f874f
-
Filesize
261B
MD52c2e6472d05e3832905f0ad4a04d21c3
SHA1007edbf35759af62a5b847ab09055e7d9b86ffcc
SHA256283d954fa21caa1f3b4aba941b154fab3e626ff27e7b8029f5357872c48cbe03
SHA5128c4ce1ea02da6ffb7e7041c50528da447d087d9ee3c9f4a8c525d2d856cf48e46f5dd9a1fedd23dd047634e719c8886457f7e7240aa3cc36f1a6216e4c00ee37
-
Filesize
5KB
MD545b2b1dd5613da464634815b7e590279
SHA18f43f06021c652d4e3783e9a4d34a5b04d24ab9a
SHA2568aa2d0d2a22a58b381cd6db620032fd2c66947f84f73b4c54cb44d2d3452e0af
SHA5124e95e40d07dca5680eec7a3dadd963d2e9d85ecc11e0e0975ca1322ab6e0f7525308239170c489feb376d51431cef85c907e6e1c019c29a1eb3932817d66c522
-
Filesize
6KB
MD5ba1e15ac390709bab4798e78fc230bf8
SHA175ef7e15af0974c1cf1781da03b6f903755de78f
SHA25609373a939b43fa303da3158861ca4854ac4ed039a204ebf269281f4c1250a224
SHA5127344a06bd17a96567e402f9a534febc1c17e7a6a58ee0ef83af79b216e9e809ab82c06b5999bfcf4627fcbab3101e606cb8f23204e1112422e34fd33f6bb1c74
-
Filesize
6KB
MD5dcc7f56ba9a7d254bc35962caec49b27
SHA15fe7d26782ee30d6662563833cb44e943dbb6e98
SHA25689916843195575b1bf3e4c2e524c21d2ecba4632f5f08340f1fe317cec3842b9
SHA51276ebbeb0437ffc2eae1fdddb52ef85923a472a3d85e445408fbf89e16508495d20700bc0f4ac2b9b709a2e4b3b18cb5921ff0a05da80c7e7a32bc4ff9eef3404
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5dad2128a4e6fca837570c6841bc42d79
SHA172d2f8ba787e934462ce8e30961a882ac1f79723
SHA256f40d41b2be2f0721353e7061bef2a17c00d441eb910acf511efa01b9b0399bc6
SHA5122b920f27897ee380de5920ce3ec7a8ab48a031626eba4732326fa22f25d39f58bbf2b60c2a153ef2e3d89809266b3e2c49111c33d1f2efe19e7d901eed4ce827
-
Filesize
11KB
MD5fb0c5d680767b1599d159462e8f590b2
SHA17ac39069011b23c3a566295838576fd108c02165
SHA2566ad1d8967769553444ce1c38724492fdad18c76b961c809360cb1f8141553f3a
SHA512232bbad3de8518e9b473bab253a9dcca5d4a7b536b5ba993f1475efe1a7aa4fc5787207ecc510bc3a30e1cc0b6b509b762a5c5a9dd3dfc20933a41eda6f1b968
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
18.6MB
MD516bbaad88653ff94e2deeacf3800bc1f
SHA1545fc3af43877cf9d0e901791ed9252c8218a07a
SHA25629116b97c992b8720d90c599c04ff7b9c15a46398e484f199d190b656cb29ebc
SHA512dc4af0460f869482628f5e5dc0e75642b7ff83ec3e78dec8d654c05028e9dd7357791a94cbd585007a4b15cddeb3743c35cc48888a6b4ab9f284a78634e60a9a