Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
03-10-2023 20:35
Behavioral task
behavioral1
Sample
Creal.exe
Resource
win7-20230831-en
General
-
Target
Creal.exe
-
Size
10.7MB
-
MD5
58c1aa7d18894e2762d97f8f2997662d
-
SHA1
07d9c181bb0e00b7fd2dfc3806941ff2a8daf4ac
-
SHA256
c358eeda046271b9301c0036ad706a3fdb8d38c7c87d9d50108aa2fa4e301512
-
SHA512
53200e4a4468fafa9dffbfdee8c96989305e4478e1062d4ae4b669f71744e7f937a526e6b1776e74c156dbe62ce74a55a39ee76d2738b7230f4aa616df8a51ea
-
SSDEEP
196608:TAHiIE7SRpo8fy7IudQmRJ8dA6lSuqaycBIGpEKo6hTOv+QKfrOs6Telo49vLLj/:UiIE7YofDdQuslSq9foWOv+9frOna59j
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2504 Creal.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2504 2356 Creal.exe 28 PID 2356 wrote to memory of 2504 2356 Creal.exe 28 PID 2356 wrote to memory of 2504 2356 Creal.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989