Analysis

  • max time kernel
    1486s
  • max time network
    1509s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231215-en
  • resource tags

    arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20-12-2023 21:56

General

  • Target

    Creal.pyc

  • Size

    55KB

  • MD5

    918e51562ddd0e1a6c055a92abfab29b

  • SHA1

    4028ce469058e3b400f70d99bf6014fba7823489

  • SHA256

    67a3ca7b8769c9dd4d7a4b91e91a624937858f5eb3bdec20289fbce2a4e3a23d

  • SHA512

    a40e06c2b15a76ec0993c98aa8c957f8f6c7d9822dd1d5cdd809f2d02a8878e292b81bd299fdb311afe3be39f7cba3171d37b261ffaa9cf16bd1621ea953b9a4

  • SSDEEP

    768:s7WnrnpVIVzgN9+X6WYP1VxcwyWb5ttmPXFFYaoef8GM8ZKGeiq3+ee3eb3sO:DrDr+5IxcQKXFFYadzCiq3yeb3D

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 12 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Creal.pyc
    1⤵
    • Modifies registry class
    PID:1424
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5792
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Creal.pyc"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2196-9-0x00007FF6FA6C0000-0x00007FF6FA7B8000-memory.dmp

    Filesize

    992KB

  • memory/2196-10-0x00007FFA57B50000-0x00007FFA57B84000-memory.dmp

    Filesize

    208KB

  • memory/2196-11-0x00007FFA53FD0000-0x00007FFA54284000-memory.dmp

    Filesize

    2.7MB

  • memory/2196-12-0x00007FFA422A0000-0x00007FFA4334B000-memory.dmp

    Filesize

    16.7MB

  • memory/2196-13-0x00007FFA41A10000-0x00007FFA41B22000-memory.dmp

    Filesize

    1.1MB