Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

07/01/2024, 17:46

240107-wcqwpsbedq 10

07/01/2024, 17:45

240107-wbsnxacdg6 10

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 17:46

General

  • Target

    Creal.exe

  • Size

    13.2MB

  • MD5

    709bfa6c20f38aa909f80c0eca2d624c

  • SHA1

    48cef5ce3cdfbb9f3cddffb0647b2d80ced6ad13

  • SHA256

    2a332f209daa3b58df34483be1ac792f75f08d166e6c6f2f702538d17b5ef56b

  • SHA512

    5a53983304b62c6ab065cffce08e97231ea52f1ea51ca3eb4da06c884019f414a4781dd65d7205b02b6f45abb61c9c58f808ddde21d4fb5630625e445cc68da0

  • SSDEEP

    393216:dXGDn5nwW+eGQRIMTozGxu8C0ibfz6e575A8K5aWCuVl:d2DnRwW+e5R5oztZ026e5JxVuVl

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Loads dropped DLL 42 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Creal.exe
    "C:\Users\Admin\AppData\Local\Temp\Creal.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2544
    • C:\Users\Admin\AppData\Local\Temp\Creal.exe
      "C:\Users\Admin\AppData\Local\Temp\Creal.exe"
      2⤵
      • Drops startup file
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3852
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "tasklist"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4260
        • C:\Windows\system32\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:892
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService
    1⤵
      PID:2036
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\CompareResolve.xlsm"
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:5260

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\VCRUNTIME140.dll

      Filesize

      116KB

      MD5

      be8dbe2dc77ebe7f88f910c61aec691a

      SHA1

      a19f08bb2b1c1de5bb61daf9f2304531321e0e40

      SHA256

      4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

      SHA512

      0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\VCRUNTIME140_1.dll

      Filesize

      48KB

      MD5

      f8dfa78045620cf8a732e67d1b1eb53d

      SHA1

      ff9a604d8c99405bfdbbf4295825d3fcbc792704

      SHA256

      a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5

      SHA512

      ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\_asyncio.pyd

      Filesize

      69KB

      MD5

      70fb0b118ac9fd3292dde530e1d789b8

      SHA1

      4adc8d81e74fc04bce64baf4f6147078eefbab33

      SHA256

      f8305023f6ad81ddc7124b311e500a58914b05a9b072bf9a6d079ea0f6257793

      SHA512

      1ab72ea9f96c6153b9b5d82b01354381b04b93b7d58c0b54a441b6a748c81cccd2fc27bb3b10350ab376ff5ada9d83af67cce17e21ccbf25722baf1f2aef3c98

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\_bz2.pyd

      Filesize

      82KB

      MD5

      90f58f625a6655f80c35532a087a0319

      SHA1

      d4a7834201bd796dc786b0eb923f8ec5d60f719b

      SHA256

      bd8621fcc901fa1de3961d93184f61ea71068c436794af2a4449738ccf949946

      SHA512

      b5bb1ecc195700ad7bea5b025503edd3770b1f845f9beee4b067235c4e63496d6e0b19bdd2a42a1b6591d1131a2dc9f627b2ae8036e294300bb6983ecd644dc8

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\_cffi_backend.cp312-win_amd64.pyd

      Filesize

      178KB

      MD5

      0572b13646141d0b1a5718e35549577c

      SHA1

      eeb40363c1f456c1c612d3c7e4923210eae4cdf7

      SHA256

      d8a76d1e31bbd62a482dea9115fc1a109cb39af4cf6d1323409175f3c93113a7

      SHA512

      67c28432ca8b389acc26e47eb8c4977fddd4af9214819f89df07fecbc8ed750d5f35807a1b195508dd1d77e2a7a9d7265049dcfbfe7665a7fd1ba45da1e4e842

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\_ctypes.pyd

      Filesize

      122KB

      MD5

      452305c8c5fda12f082834c3120db10a

      SHA1

      9bab7b3fd85b3c0f2bedc3c5adb68b2579daa6e7

      SHA256

      543ce9d6dc3693362271a2c6e7d7fc07ad75327e0b0322301dd29886467b0b0e

      SHA512

      3d52afdbc8da74262475abc8f81415a0c368be70dbf5b2bd87c9c29ca3d14c44770a5b8b2e7c082f3ece0fd2ba1f98348a04b106a48d479fa6bd062712be8f7c

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\_decimal.pyd

      Filesize

      247KB

      MD5

      f78f9855d2a7ca940b6be51d68b80bf2

      SHA1

      fd8af3dbd7b0ea3de2274517c74186cb7cd81a05

      SHA256

      d4ae192bbd4627fc9487a2c1cd9869d1b461c20cfd338194e87f5cf882bbed12

      SHA512

      6b68c434a6f8c436d890d3c1229d332bd878e5777c421799f84d79679e998b95d2d4a013b09f50c5de4c6a85fcceb796f3c486e36a10cbac509a0da8d8102b18

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\_hashlib.pyd

      Filesize

      64KB

      MD5

      8baeb2bd6e52ba38f445ef71ef43a6b8

      SHA1

      4132f9cd06343ef8b5b60dc8a62be049aa3270c2

      SHA256

      6c50c9801a5caf0bb52b384f9a0d5a4aa182ca835f293a39e8999cf6edf2f087

      SHA512

      804a4e19ea622646cea9e0f8c1e284b7f2d02f3620199fa6930dbdadc654fa137c1e12757f87c3a1a71ceff9244aa2f598ee70d345469ca32a0400563fe3aa65

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\_lzma.pyd

      Filesize

      155KB

      MD5

      cf8de1137f36141afd9ff7c52a3264ee

      SHA1

      afde95a1d7a545d913387624ef48c60f23cf4a3f

      SHA256

      22d10e2d6ad3e3ed3c49eb79ab69a81aaa9d16aeca7f948da2fe80877f106c16

      SHA512

      821985ff5bc421bd16b2fa5f77f1f4bf8472d0d1564bc5768e4dbe866ec52865a98356bb3ef23a380058acd0a25cd5a40a1e0dae479f15863e48c4482c89a03f

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\_multiprocessing.pyd

      Filesize

      34KB

      MD5

      c0a06aebbd57d2420037162fa5a3142b

      SHA1

      1d82ba750128eb51070cdeb0c69ac75117e53b43

      SHA256

      5673b594e70d1fdaad3895fc8c3676252b7b675656fb88ef3410bc93bb0e7687

      SHA512

      ddf2c4d22b2371a8602601a05418ef712e03def66e2d8e8814853cdd989ed457efbd6032f4a4a3e9ecca9915d99c249dfd672670046461a9fe510a94da085fbf

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\_overlapped.pyd

      Filesize

      54KB

      MD5

      54c021e10f9901bf782c24d648a82b96

      SHA1

      cf173cc0a17308d7d87b62c1169b7b99655458bc

      SHA256

      2e53cc1bfa6e10a4de7e1f4081c5b952746e2d4fa7f8b9929ad818ce20b2cc9f

      SHA512

      e451226ece8c34c73e5b31e06fdc1d99e073e6e0651a0c5e04b0cf011e79d0747da7a5b6c5e94aca44cfceb9e85ce3d85afff081a574d1f53f115e39e9d4ff6c

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\_queue.pyd

      Filesize

      31KB

      MD5

      5aa4b057ba2331eed6b4b30f4b3e0d52

      SHA1

      6b9db113c2882743984c3d8b70ec49fc4a136c23

      SHA256

      d43dca0e00c3c11329b68177e967cf5240495c4786f5afa76ac4f267c3a5cdb9

      SHA512

      aa5aa3285ea5c177eca055949c5f550dbd2d2699202a29efe2077213cbc95fff2a36d99eecce249ac04d95baf149b3d8c557a67fc39ead3229f0b329e83447b7

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\_socket.pyd

      Filesize

      81KB

      MD5

      439b3ad279befa65bb40ecebddd6228b

      SHA1

      d3ea91ae7cad9e1ebec11c5d0517132bbc14491e

      SHA256

      24017d664af20ee3b89514539345caac83eca34825fcf066a23e8a4c99f73e6d

      SHA512

      a335e1963bb21b34b21aef6b0b14ba8908a5343b88f65294618e029e3d4d0143ea978a5fd76d2df13a918ffab1e2d7143f5a1a91a35e0cc1145809b15af273bd

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\base_library.zip

      Filesize

      1.3MB

      MD5

      c55ad50db3ba71c56c6fb55e7b116550

      SHA1

      6699e6d9c6625634641bcabe01ed2e34eb923ded

      SHA256

      e599cf77eb7d4e4789d50f59ffb858389f3494438517e537e759bdb3e51c2a6b

      SHA512

      402de5d1ddfea29b3fb2bfcb1766afeaa6ea4a37a9ca24e94ed4b1312172dd7795b23c78156091e6a81dfe1c76363c0aea35d0d372b268daaa79d7bef719eb02

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\libcrypto-3.dll

      Filesize

      2.4MB

      MD5

      8b182d4986eae331c1fe53fa99cb552c

      SHA1

      ba84a16fb62b6d0794635a6083854fd028fa9a5d

      SHA256

      72b611888a76c0fd27be92ae73fd4d8755f914c704019f0cbf21a5d7015e7ee9

      SHA512

      b9934ec95f72bc4805c6bae364665999ddb4d53a3d25e1b6b769aa2e33981b66f061c3dbbad8ca7b9b4915b534adfe47a559bcf2bab05ebfa390b6c1a627ff68

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\libffi-8.dll

      Filesize

      38KB

      MD5

      0f8e4992ca92baaf54cc0b43aaccce21

      SHA1

      c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

      SHA256

      eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

      SHA512

      6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\libssl-3.dll

      Filesize

      771KB

      MD5

      bfc834bb2310ddf01be9ad9cff7c2a41

      SHA1

      fb1d601b4fcb29ff1b13b0d2ed7119bd0472205c

      SHA256

      41ad1a04ca27a7959579e87fbbda87c93099616a64a0e66260c983381c5570d1

      SHA512

      6af473c7c0997f2847ebe7cee8ef67cd682dee41720d4f268964330b449ba71398fda8954524f9a97cc4cdf9893b8bdc7a1cf40e9e45a73f4f35a37f31c6a9c3

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\pyexpat.pyd

      Filesize

      194KB

      MD5

      e2d1c738d6d24a6dd86247d105318576

      SHA1

      384198f20724e4ede9e7b68e2d50883c664eee49

      SHA256

      cdc09fbae2f103196215facd50d108be3eff60c8ee5795dcc80bf57a0f120cdf

      SHA512

      3f9cb64b4456438dea82a0638e977f233faf0a08433f01ca87ba65c7e80b0680b0ec3009fa146f02ae1fdcc56271a66d99855d222e77b59a1713caf952a807da

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\python312.dll

      Filesize

      3.4MB

      MD5

      7a1eed9e73777aadab73289a961a00f9

      SHA1

      9c8c9a5b64340e1dab6cb0a9012e3a6e2d9cc9d9

      SHA256

      689dae7c972069c8d2df41419476d8a1f2776a89d28c16a5ccfb8ccb2f260d4f

      SHA512

      1ded461fed1bd789e7db0fc04ae2ad2a3f85bfa8477c2136686d8d1f8230cc93464ded56f8c79b5996721d07816dd18d0162b2ac2b5fa737f861422d5131d8ee

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\python312.dll

      Filesize

      2.0MB

      MD5

      9fcc35ca8eb1e213e23a67e51578b07e

      SHA1

      90c863f0f7e42ed6cac8f6f41c362d1848da484a

      SHA256

      edb2788883049c2f70d1edf2844899780b5e4f072cf565b949001f6d6f8495ad

      SHA512

      82c09c3e4c0f3822d66705f610c615b48855965691db16b644c588731b2834dd4eaa02a5c2d614c63ef2e7e4ad496fe47fb3c239c9af76e08251964692f697ef

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\select.pyd

      Filesize

      29KB

      MD5

      e1604afe8244e1ce4c316c64ea3aa173

      SHA1

      99704d2c0fa2687997381b65ff3b1b7194220a73

      SHA256

      74cca85600e7c17ea6532b54842e26d3cae9181287cdf5a4a3c50af4dab785e5

      SHA512

      7bf35b1a9da9f1660f238c2959b3693b7d9d2da40cf42c6f9eba2164b73047340d0adff8995049a2fe14e149eba05a5974eee153badd9e8450f961207f0b3d42

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\sqlite3.dll

      Filesize

      1.4MB

      MD5

      31cd2695493e9b0669d7361d92d46d94

      SHA1

      19c1bc5c3856665eca5390a2f9cd59b564c0139b

      SHA256

      17d547994008f1626be2877497912687cb3ebd9a407396804310fd12c85aead4

      SHA512

      9dd8d1b900999e8cea91f3d5f3f72d510f9cc28d7c6768a4046a9d2aa9e78a6ace1248ec9574f5f6e53a6f1bdbfdf153d9bf73dba05788625b03398716c87e1c

    • C:\Users\Admin\AppData\Local\Temp\_MEI25442\unicodedata.pyd

      Filesize

      382KB

      MD5

      7875f95be2d418ddd98d6e1e08b5d8c1

      SHA1

      28efa33e13c9a4a5a67cd08866fa1b03ed6aa2d9

      SHA256

      04dd9258b0c742344eab316dbfe334e0f00f7913cbc18d44669a20337ce48015

      SHA512

      4ed4f433885f7ee4c8945e47777f69d74d204b1978d6ae0ad4848741baf5154edcd902ba82fe27daa55d743f555fbb9b327350d2aabc083658518b9399ed368c

    • C:\Users\Admin\AppData\Local\Temp\crcook.txt

      Filesize

      29B

      MD5

      155ea3c94a04ceab8bd7480f9205257d

      SHA1

      b46bbbb64b3df5322dd81613e7fa14426816b1c1

      SHA256

      445e2bcecaa0d8d427b87e17e7e53581d172af1b9674cf1a33dbe1014732108b

      SHA512

      3d47449da7c91fe279217a946d2f86e5d95d396f53b55607ec8aca7e9aa545cfaf9cb97914b643a5d8a91944570f9237e18eecec0f1526735be6ceee45ecba05

    • memory/5260-176-0x00007FFCC1110000-0x00007FFCC1120000-memory.dmp

      Filesize

      64KB

    • memory/5260-180-0x00007FFD01090000-0x00007FFD01285000-memory.dmp

      Filesize

      2.0MB

    • memory/5260-178-0x00007FFD01090000-0x00007FFD01285000-memory.dmp

      Filesize

      2.0MB

    • memory/5260-177-0x00007FFCC1110000-0x00007FFCC1120000-memory.dmp

      Filesize

      64KB

    • memory/5260-181-0x00007FFD01090000-0x00007FFD01285000-memory.dmp

      Filesize

      2.0MB

    • memory/5260-179-0x00007FFCC1110000-0x00007FFCC1120000-memory.dmp

      Filesize

      64KB

    • memory/5260-182-0x00007FFCC1110000-0x00007FFCC1120000-memory.dmp

      Filesize

      64KB

    • memory/5260-183-0x00007FFD01090000-0x00007FFD01285000-memory.dmp

      Filesize

      2.0MB

    • memory/5260-184-0x00007FFCC1110000-0x00007FFCC1120000-memory.dmp

      Filesize

      64KB

    • memory/5260-185-0x00007FFD01090000-0x00007FFD01285000-memory.dmp

      Filesize

      2.0MB

    • memory/5260-186-0x00007FFD01090000-0x00007FFD01285000-memory.dmp

      Filesize

      2.0MB

    • memory/5260-187-0x00007FFD01090000-0x00007FFD01285000-memory.dmp

      Filesize

      2.0MB

    • memory/5260-190-0x00007FFD01090000-0x00007FFD01285000-memory.dmp

      Filesize

      2.0MB

    • memory/5260-192-0x00007FFD01090000-0x00007FFD01285000-memory.dmp

      Filesize

      2.0MB

    • memory/5260-195-0x00007FFD01090000-0x00007FFD01285000-memory.dmp

      Filesize

      2.0MB

    • memory/5260-196-0x00007FFD01090000-0x00007FFD01285000-memory.dmp

      Filesize

      2.0MB

    • memory/5260-198-0x00007FFD01090000-0x00007FFD01285000-memory.dmp

      Filesize

      2.0MB

    • memory/5260-197-0x00007FFD01090000-0x00007FFD01285000-memory.dmp

      Filesize

      2.0MB

    • memory/5260-194-0x00007FFCBE7B0000-0x00007FFCBE7C0000-memory.dmp

      Filesize

      64KB

    • memory/5260-199-0x00007FFD01090000-0x00007FFD01285000-memory.dmp

      Filesize

      2.0MB

    • memory/5260-193-0x00007FFD01090000-0x00007FFD01285000-memory.dmp

      Filesize

      2.0MB

    • memory/5260-191-0x00007FFD01090000-0x00007FFD01285000-memory.dmp

      Filesize

      2.0MB

    • memory/5260-189-0x00007FFCBE7B0000-0x00007FFCBE7C0000-memory.dmp

      Filesize

      64KB

    • memory/5260-188-0x00007FFD01090000-0x00007FFD01285000-memory.dmp

      Filesize

      2.0MB

    • memory/5260-207-0x00007FFD01090000-0x00007FFD01285000-memory.dmp

      Filesize

      2.0MB

    • memory/5260-208-0x00007FFD01090000-0x00007FFD01285000-memory.dmp

      Filesize

      2.0MB