Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 17:46
Behavioral task
behavioral1
Sample
Creal.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
General
-
Target
Creal.exe
-
Size
13.2MB
-
MD5
709bfa6c20f38aa909f80c0eca2d624c
-
SHA1
48cef5ce3cdfbb9f3cddffb0647b2d80ced6ad13
-
SHA256
2a332f209daa3b58df34483be1ac792f75f08d166e6c6f2f702538d17b5ef56b
-
SHA512
5a53983304b62c6ab065cffce08e97231ea52f1ea51ca3eb4da06c884019f414a4781dd65d7205b02b6f45abb61c9c58f808ddde21d4fb5630625e445cc68da0
-
SSDEEP
393216:dXGDn5nwW+eGQRIMTozGxu8C0ibfz6e575A8K5aWCuVl:d2DnRwW+e5R5oztZ026e5JxVuVl
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2624 Creal.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1340 wrote to memory of 2624 1340 Creal.exe 28 PID 1340 wrote to memory of 2624 1340 Creal.exe 28 PID 1340 wrote to memory of 2624 1340 Creal.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.7MB
MD548ebfefa21b480a9b0dbfc3364e1d066
SHA1b44a3a9b8c585b30897ddc2e4249dfcfd07b700a
SHA2560cc4e557972488eb99ea4aeb3d29f3ade974ef3bcd47c211911489a189a0b6f2
SHA5124e6194f1c55b82ee41743b35d749f5d92a955b219decacf9f1396d983e0f92ae02089c7f84a2b8296a3062afa3f9c220da9b7cd9ed01b3315ea4a953b4ecc6ce