Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23-12-2023 05:45
Behavioral task
behavioral1
Sample
Creal.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
General
-
Target
Creal.exe
-
Size
13.2MB
-
MD5
de187ac32be313bf36fd97135dc80ce0
-
SHA1
499f8136aa1ce67869fc2be3e2092d5f73647518
-
SHA256
3ef518f035a525cd9d5f788ab9c99defe644be284bb8d4dce5e01d518273d7dd
-
SHA512
a356d505ea9c1f4dda6d65fad65afed9438b83a45e1a4820b6539f40e2c4255a01da34d7f60f2068c05f4d554f80b9ad3808c0b6117d0fb0d090e0fa7e343dd7
-
SSDEEP
393216:6iIE7YoSD2nwW+eGQRIMTozGxu8C0ibfz6e57Z1bmXdWCUI:j7rSDawW+e5R5oztZ026e5DkVUI
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2708 Creal.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2708 2212 Creal.exe 28 PID 2212 wrote to memory of 2708 2212 Creal.exe 28 PID 2212 wrote to memory of 2708 2212 Creal.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.7MB
MD548ebfefa21b480a9b0dbfc3364e1d066
SHA1b44a3a9b8c585b30897ddc2e4249dfcfd07b700a
SHA2560cc4e557972488eb99ea4aeb3d29f3ade974ef3bcd47c211911489a189a0b6f2
SHA5124e6194f1c55b82ee41743b35d749f5d92a955b219decacf9f1396d983e0f92ae02089c7f84a2b8296a3062afa3f9c220da9b7cd9ed01b3315ea4a953b4ecc6ce