General
-
Target
CeleryInstaller.exe
-
Size
828KB
-
Sample
241016-n6q5kasbkn
-
MD5
3c8603f5225052c1375f87ecb572690c
-
SHA1
9ad1026b68030bd1ec7bc6fd25e3a3a8f6be5ad7
-
SHA256
e0365edc35c855afe7ff301328f265b363d81afca23efa88bcb5f2f8f35c739b
-
SHA512
cbd0df325cad43c56847765d9327774c91fdb15a558ee93a75189a3d94465231c375d64bcd777d176734cc95c6d095cd25f3e27c37ae9361b9e63c1fa9973cec
-
SSDEEP
24576:3f0ZvkIP9VM9aexhgaBPbhhhchhhwSf8SDf0Z:+vkIP93F8SDu
Static task
static1
Behavioral task
behavioral1
Sample
CeleryInstaller.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
CeleryInstaller.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Program Files\7-Zip\DECRYPT_YOUR_FILES.HTML
Extracted
C:\Program Files\7-Zip\DECRYPT_YOUR_FILES.HTML
Targets
-
-
Target
CeleryInstaller.exe
-
Size
828KB
-
MD5
3c8603f5225052c1375f87ecb572690c
-
SHA1
9ad1026b68030bd1ec7bc6fd25e3a3a8f6be5ad7
-
SHA256
e0365edc35c855afe7ff301328f265b363d81afca23efa88bcb5f2f8f35c739b
-
SHA512
cbd0df325cad43c56847765d9327774c91fdb15a558ee93a75189a3d94465231c375d64bcd777d176734cc95c6d095cd25f3e27c37ae9361b9e63c1fa9973cec
-
SSDEEP
24576:3f0ZvkIP9VM9aexhgaBPbhhhchhhwSf8SDf0Z:+vkIP93F8SDu
-
Modifies WinLogon for persistence
-
Renames multiple (1023) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Pre-OS Boot
1Bootkit
1