Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Creal-Stea...in.zip
windows7-x64
1Creal-Stea...in.zip
windows10-2004-x64
1Creal-Stea...NG.yml
windows7-x64
3Creal-Stea...NG.yml
windows10-2004-x64
3Creal-Stea...eal.py
windows7-x64
3Creal-Stea...eal.py
windows10-2004-x64
3Creal-Stea...ted.md
windows7-x64
3Creal-Stea...ted.md
windows10-2004-x64
3Creal-Stea...ICENSE
windows7-x64
1Creal-Stea...ICENSE
windows10-2004-x64
1Creal-Stea...DME.md
windows7-x64
3Creal-Stea...DME.md
windows10-2004-x64
3Creal-Stea...er.bat
windows7-x64
1Creal-Stea...er.bat
windows10-2004-x64
1Creal-Stea...der.py
windows7-x64
3Creal-Stea...der.py
windows10-2004-x64
3Creal-Stea...l1.png
windows7-x64
3Creal-Stea...l1.png
windows10-2004-x64
3Creal-Stea...l2.png
windows7-x64
3Creal-Stea...l2.png
windows10-2004-x64
3Creal-Stea...l3.png
windows7-x64
3Creal-Stea...l3.png
windows10-2004-x64
3Creal-Stea...rr.png
windows7-x64
3Creal-Stea...rr.png
windows10-2004-x64
3Creal-Stea...yy.png
windows7-x64
3Creal-Stea...yy.png
windows10-2004-x64
3Creal-Stea...xd.jpg
windows7-x64
3Creal-Stea...xd.jpg
windows10-2004-x64
3Creal-Stea...ll.bat
windows7-x64
1Creal-Stea...ll.bat
windows10-2004-x64
1Creal-Stea...on.bat
windows7-x64
1Creal-Stea...on.bat
windows10-2004-x64
8Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20/12/2023, 16:58
Behavioral task
behavioral1
Sample
Creal-Stealer-main.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Creal-Stealer-main.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Creal-Stealer-main/.github/FUNDING.yml
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Creal-Stealer-main/.github/FUNDING.yml
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Creal-Stealer-main/Creal.py
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
Creal-Stealer-main/Creal.py
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Creal-Stealer-main/IfYouInfected.md
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Creal-Stealer-main/IfYouInfected.md
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Creal-Stealer-main/LICENSE
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Creal-Stealer-main/LICENSE
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
Creal-Stealer-main/README.md
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
Creal-Stealer-main/README.md
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
Creal-Stealer-main/builder.bat
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
Creal-Stealer-main/builder.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
Creal-Stealer-main/builder.py
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
Creal-Stealer-main/builder.py
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
Creal-Stealer-main/img/Creal1.png
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
Creal-Stealer-main/img/Creal1.png
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
Creal-Stealer-main/img/Creal2.png
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
Creal-Stealer-main/img/Creal2.png
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
Creal-Stealer-main/img/Creal3.png
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
Creal-Stealer-main/img/Creal3.png
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
Creal-Stealer-main/img/builderr.png
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
Creal-Stealer-main/img/builderr.png
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
Creal-Stealer-main/img/pyy.png
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
Creal-Stealer-main/img/pyy.png
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
Creal-Stealer-main/img/xd.jpg
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
Creal-Stealer-main/img/xd.jpg
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
Creal-Stealer-main/install.bat
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
Creal-Stealer-main/install.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
Creal-Stealer-main/install_python.bat
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
Creal-Stealer-main/install_python.bat
Resource
win10v2004-20231215-en
General
-
Target
Creal-Stealer-main/install_python.bat
-
Size
687B
-
MD5
821f007d1c56bb3f4511bab928ce8f63
-
SHA1
a22b0d76f5ef0e145629dded82e195486675774a
-
SHA256
434f9d4a2a7a5088aa393b47ad8e957a15481cd3078f10b3c0f7ec6fe5f497c2
-
SHA512
f1db8db20e25d8d06828ead22e70a28411bf32faa7dd14816ef833efe548a046e9383cb51aa100d49555f2cc9c1f74bf10aef871a0e6724da5f96c690770dd4d
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2660 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2660 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3052 wrote to memory of 1912 3052 cmd.exe 29 PID 3052 wrote to memory of 1912 3052 cmd.exe 29 PID 3052 wrote to memory of 1912 3052 cmd.exe 29 PID 1912 wrote to memory of 2660 1912 cmd.exe 30 PID 1912 wrote to memory of 2660 1912 cmd.exe 30 PID 1912 wrote to memory of 2660 1912 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Creal-Stealer-main\install_python.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "Invoke-WebRequest https://www.python.org/ftp/python/ -UseBasicParsing | Select-String -Pattern '3.10.[0-9]{1,2}' -AllMatches | Select-Object -ExpandProperty Matches | Select-Object -ExpandProperty Value | Sort-Object -Descending -Unique | Select-Object -First 1"2⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest https://www.python.org/ftp/python/ -UseBasicParsing | Select-String -Pattern '3.10.[0-9]{1,2}' -AllMatches | Select-Object -ExpandProperty Matches | Select-Object -ExpandProperty Value | Sort-Object -Descending -Unique | Select-Object -First 1"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-