File name:

Celestial.exe

Full analysis: https://app.any.run/tasks/701c9f1d-a60c-4cc5-bf94-dda541a79f98
Verdict: Malicious activity
Analysis date: December 02, 2023, 12:54:47
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

D448A2DF6F29C91C23B0D482FDB6CA49

SHA1:

E533756132DA1916CB3B6217EDC066E72497BCA3

SHA256:

6EF6EF99E387801BBCB19F3295F0FA626FD2A0515A8F1947BCE5D1F43FA6F968

SSDEEP:

3072:y1zJQhGjtQmzAvpehGfSdcRCG28CdZC00mE1pt+x5qw24QxY8e11s+KvE6criTUK:npSdcX10cpt+x5n2a8e1mVMEaR/aEfD

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the Internet Settings

      • Celestial.exe (PID: 844)
      • WMIC.exe (PID: 1924)
    • Reads settings of System Certificates

      • Celestial.exe (PID: 844)
    • Uses WMIC.EXE to obtain Windows Installer data

      • Celestial.exe (PID: 844)
    • Accesses product unique identifier via WMI (SCRIPT)

      • WMIC.exe (PID: 1924)
    • Checks for external IP

      • Celestial.exe (PID: 844)
  • INFO

    • Reads the computer name

      • Celestial.exe (PID: 844)
      • wmpnscfg.exe (PID: 2632)
    • Checks supported languages

      • Celestial.exe (PID: 844)
      • wmpnscfg.exe (PID: 2632)
    • Reads Environment values

      • Celestial.exe (PID: 844)
    • Reads the machine GUID from the registry

      • Celestial.exe (PID: 844)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 2632)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2053:02:19 19:54:36+01:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 48
CodeSize: 229888
InitializedDataSize: 39936
UninitializedDataSize: -
EntryPoint: 0x3a1de
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: Payload for Umbral Stealer
CompanyName: Celestial
FileDescription: RBX External
FileVersion: 1.0.0.0
InternalName: celestial
LegalCopyright: 2023 Celestial Inc.
LegalTrademarks: Celestial is a trademark of heavenzone
OriginalFileName: celestialrbx
ProductName: Celestial
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start celestial.exe wmic.exe no specs wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
844"C:\Users\admin\AppData\Local\Temp\Celestial.exe" C:\Users\admin\AppData\Local\Temp\Celestial.exe
explorer.exe
User:
admin
Company:
Celestial
Integrity Level:
MEDIUM
Description:
RBX External
Exit code:
1
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\celestial.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1924"wmic.exe" csproduct get uuidC:\Windows\System32\wbem\WMIC.exeCelestial.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2632"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
3 171
Read events
3 159
Write events
12
Delete events
0

Modification events

(PID) Process:(844) Celestial.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
6
DNS requests
2
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
844
Celestial.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
text
5 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1080
svchost.exe
224.0.0.252:5355
unknown
844
Celestial.exe
142.250.186.67:443
gstatic.com
GOOGLE
US
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
844
Celestial.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
unknown
2588
svchost.exe
239.255.255.250:1900
whitelisted

DNS requests

Domain
IP
Reputation
gstatic.com
  • 142.250.186.67
whitelisted
ip-api.com
  • 208.95.112.1
shared

Threats

PID
Process
Class
Message
844
Celestial.exe
Potential Corporate Privacy Violation
AV POLICY Internal Host Retrieving External IP Address (ip-api. com)
844
Celestial.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
844
Celestial.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
No debug info