Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2023 12:10
Behavioral task
behavioral1
Sample
Crealspoofer.exe
Resource
win10v2004-20231127-en
Behavioral task
behavioral2
Sample
Crealspoofer.exe
Resource
win11-20231128-en
Behavioral task
behavioral3
Sample
Creal.pyc
Resource
win10v2004-20231127-en
Behavioral task
behavioral4
Sample
Creal.pyc
Resource
win11-20231128-en
General
-
Target
Creal.pyc
-
Size
48KB
-
MD5
fb62930e6ae9cc02a24ef99eb2b7c875
-
SHA1
b174779c7c41cddd82179c844a5491cd7ae04f5b
-
SHA256
b9d4528820c46ac5e412a20d928bb7b69bf1306ba0654bbd621a558c8bc6a17a
-
SHA512
3c80c371a2f3cbb1c6a1f381ae9f667180e6712fb551ba29791e67358e3b78ad595af6110954fe41593325ec119fa299f83fc3ef95c8469e43b0760f6fa9e9b7
-
SSDEEP
768:PpFnrdEya7K+aTMdcmrVWwzO/phReWdXEXuGtz07VOZZ4GQmGw8jt4xMao3Q1:/r1aqMamgphoWdUeOPZZ4GQmGwWaoA
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2598572287-1024438387-935107970-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2598572287-1024438387-935107970-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1564 OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2268 svchost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe 1564 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Creal.pyc1⤵
- Modifies registry class
PID:3756
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1564
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2104
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2268