Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 10:23
Static task
static1
Behavioral task
behavioral1
Sample
betterCelery.cmd
Resource
win7-20240705-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
betterCelery.cmd
Resource
win10v2004-20240802-en
6 signatures
150 seconds
General
-
Target
betterCelery.cmd
-
Size
284B
-
MD5
45e547f49ab08f7338db979d204ec556
-
SHA1
2982f18c709b9917e61ef8dac2c1dd9166159c97
-
SHA256
3df18879572f6ec21e99c4726ec1884e9fac816cf18ca5454d2f23332f71977b
-
SHA512
413ab5af66ccc4ef86232376f860c698a26826d9f688a575583853579425e8add6f27e8ee1ac075ee1b3d89b8548abb44c80b4db0c2bf5243727199931b4b2c9
Score
3/10
Malware Config
Signatures
-
pid Process 2408 powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2408 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2408 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2152 2412 cmd.exe 31 PID 2412 wrote to memory of 2152 2412 cmd.exe 31 PID 2412 wrote to memory of 2152 2412 cmd.exe 31 PID 2152 wrote to memory of 2056 2152 net.exe 32 PID 2152 wrote to memory of 2056 2152 net.exe 32 PID 2152 wrote to memory of 2056 2152 net.exe 32 PID 2412 wrote to memory of 2408 2412 cmd.exe 33 PID 2412 wrote to memory of 2408 2412 cmd.exe 33 PID 2412 wrote to memory of 2408 2412 cmd.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\betterCelery.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\system32\net.exenet session2⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:2056
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "irm bcelery.github.io/src/gui.ps1 | iex"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408
-