Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22/08/2023, 21:01
Behavioral task
behavioral1
Sample
Creal.exe
Resource
win7-20230712-en
General
-
Target
Creal.exe
-
Size
16.9MB
-
MD5
c43ece8537a08cdd41a6ba220d5df517
-
SHA1
d1323d3a382c7d70803737c087e4378251350224
-
SHA256
a30227ac705282ab7f4b59e726cb480ee28af1972ac0dfd8d750786a70b63219
-
SHA512
3063784011076bcba2026368ff8f077e1339694795e7c5783aadc40e2223fc41bc963839f27d13c2ef131dee357fb752e64d2a6662b7d3664f54ba574fdb3b5d
-
SSDEEP
196608:ew0sKYu/PaQts1q4FMIZETSRjPePdrQJM96KbABL9vQ8lc1pd4ilW39Bn4iyH6Rl:7QtswQETSRvJQnEvQ8g0iWNB4pVIT
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2948 Creal.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1512 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1512 vlc.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
pid Process 2948 Creal.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe 1512 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1512 vlc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2948 2212 Creal.exe 28 PID 2212 wrote to memory of 2948 2212 Creal.exe 28 PID 2212 wrote to memory of 2948 2212 Creal.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Creal.exe"C:\Users\Admin\AppData\Local\Temp\Creal.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\Creal.exe"C:\Users\Admin\AppData\Local\Temp\Creal.exe"2⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:2948
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\ShowReset.mpg"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1512
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1592
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD55a5dd7cad8028097842b0afef45bfbcf
SHA1e247a2e460687c607253949c52ae2801ff35dc4a
SHA256a811c7516f531f1515d10743ae78004dd627eba0dc2d3bc0d2e033b2722043ce
SHA512e6268e4fad2ce3ef16b68298a57498e16f0262bf3531539ad013a66f72df471569f94c6fcc48154b7c3049a3ad15cbfcbb6345dacb4f4ed7d528c74d589c9858
-
Filesize
5.5MB
MD55a5dd7cad8028097842b0afef45bfbcf
SHA1e247a2e460687c607253949c52ae2801ff35dc4a
SHA256a811c7516f531f1515d10743ae78004dd627eba0dc2d3bc0d2e033b2722043ce
SHA512e6268e4fad2ce3ef16b68298a57498e16f0262bf3531539ad013a66f72df471569f94c6fcc48154b7c3049a3ad15cbfcbb6345dacb4f4ed7d528c74d589c9858