Analysis
-
max time kernel
8s -
max time network
2s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 12:34
Behavioral task
behavioral1
Sample
Celery.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Celery.exe
Resource
win10v2004-20240802-en
General
-
Target
Celery.exe
-
Size
38.9MB
-
MD5
1958d56ce89570d458ad70e205129d90
-
SHA1
366cc40327d36b79531e0df984c86a79b1c51858
-
SHA256
8caaad73fde7729f69f2b1eac55aaf7f3b04a5a16e6043eeeb1c4d13539979dc
-
SHA512
0afe2380faf8527bad4c2fa42210de99a69fa6e0e2b082e669b959629b3cea6aa41769244576b3a5e370432bbf13dfe43a90e9eec2ec9419687b9dcb20dfc663
-
SSDEEP
786432:u9Z9xbdQglp8+W8YM67vD7laO45zcY87HC5QlstXcWSK9v9UlQxrP:wvxZQgl3WLp7vwPE7hlgB9lUmr
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2728 Celery.exe -
resource yara_rule behavioral1/files/0x0003000000020a19-1157.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2728 2676 Celery.exe 30 PID 2676 wrote to memory of 2728 2676 Celery.exe 30 PID 2676 wrote to memory of 2728 2676 Celery.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5546cc5fe76abc35fdbf92f682124e23d
SHA15c1030752d32aa067b49125194befee7b3ee985a
SHA25643bff2416ddd123dfb15d23dc3e99585646e8df95633333c56d85545029d1e76
SHA512cb75334f2f36812f3a5efd500b2ad97c21033a7a7054220e58550e95c3408db122997fee70a319aef8db6189781a9f2c00a9c19713a89356038b87b036456720