Analysis
-
max time kernel
104s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 19:40
Behavioral task
behavioral1
Sample
Celestial/Celestial.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Celestial/Celestial.jar
Resource
win10v2004-20250314-en
General
-
Target
Celestial/Celestial.jar
-
Size
639KB
-
MD5
335e19f97c6bd6e1edd3e05b577a4b85
-
SHA1
d764d2645145bd2cb185fe53c3589e634b19b991
-
SHA256
2806e12d1f19ba55fc572cb9662c1bc6c81a2608c00085a198101e71f1c6c154
-
SHA512
e25f4f75a375d85a796496877cfce5b27983da4ad577602b1c0dd7593786f20881ac3cdc42c67301d1296e2954ef307eaf6198d0785f047db06f499efa60fef1
-
SSDEEP
12288:oXrrQn/RFjC9p4V30jSDgm/LR/+d1QNGDYgSB2RvG3ouk2ZkSUVDs7:oXfQ//Cn41zDgmFOQGDlIRou5Z3UVDs7
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1743018055546.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2232 java.exe 2232 java.exe 2232 java.exe 2232 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2232 wrote to memory of 4824 2232 java.exe 90 PID 2232 wrote to memory of 4824 2232 java.exe 90 PID 2232 wrote to memory of 4944 2232 java.exe 92 PID 2232 wrote to memory of 4944 2232 java.exe 92 PID 4944 wrote to memory of 4708 4944 cmd.exe 94 PID 4944 wrote to memory of 4708 4944 cmd.exe 94 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4824 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Celestial\Celestial.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1743018055546.tmp2⤵
- Views/modifies file attributes
PID:4824
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1743018055546.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1743018055546.tmp" /f3⤵
- Adds Run key to start application
PID:4708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5c270e6940d8591aa6bb199255965c4d3
SHA1957e3db92331dd0d37fb5e30404aaeef544519e9
SHA256c9751c46fa5fb74f106403064a5d0f9245e2dd4f37ee6aa72ee721e28227b1fa
SHA5122018b3db3992e4b4357382ee8f686a0b63ebca5b9fc9438d175e9006638add337b6b34d05759be4fe7b352516d59fe9083a50119c261e204cdd31d99b10682a3
-
Filesize
28KB
MD5546e3748dcb4c370dd85c50cb4a5b8a8
SHA16b760b7cfd223b64ea6a34561eaad1ddf822794a
SHA25694d49af64f6fb3d82c2bcdc902e10047e581e26fec6e006a346a931e77fc6a58
SHA512f6873ef42ab463fbda8f127805d8b7cbe925a39e50300ac16ff3c2be113764525811ecf1cd2ea448723f086c620e42ef0a7d42bc3c4984771122660b93c2a5ef
-
Filesize
28KB
MD554e03e04683e075fd71cb5dba2c04b4a
SHA1e8002fb04a03680224766367779c85b307ed6393
SHA256d151362c5d16edd9b386267c6495909368e4ad6809f49c9529c6a51114c4b4d6
SHA512c256e28fe11b6c9fdb8a00a8910d09599cd64fe86709d2e970bb968b95953af72d3c07bde8eebf91c7d0ed963dd5f82f5e9f8028b63d425df33daf72e1091d85
-
Filesize
639KB
MD5335e19f97c6bd6e1edd3e05b577a4b85
SHA1d764d2645145bd2cb185fe53c3589e634b19b991
SHA2562806e12d1f19ba55fc572cb9662c1bc6c81a2608c00085a198101e71f1c6c154
SHA512e25f4f75a375d85a796496877cfce5b27983da4ad577602b1c0dd7593786f20881ac3cdc42c67301d1296e2954ef307eaf6198d0785f047db06f499efa60fef1