Analysis
-
max time kernel
134s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
16-01-2024 17:24
Behavioral task
behavioral1
Sample
Creal.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Creal.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Creal.pyc
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Creal.pyc
Resource
win10v2004-20231215-en
General
-
Target
Creal.exe
-
Size
14.4MB
-
MD5
546e3843cb31f296158474211d62afaf
-
SHA1
bddddb4336f777a8135fff8cc93f7cb45227a49a
-
SHA256
dc5fee5594cd71992651a98980398c14807b8b595e69499b5741832d90240d82
-
SHA512
8a8f173be9ff33512047c230dabdeb3b0c08a494b33cad7947c0bead1979454279df3e828789e78e49708a85c1465eba588d5990cbc0e7533e497644b9db2b5d
-
SSDEEP
196608:OktGX180pr0sKYu/PaQ+DuhfldidQmRJ8dA6lSuqaycBIGpE2o6hTOv+QKfwJpax:kX7QJidQuslSq99oWOv+9fgpazD0RZb
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2200 Creal.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2200 2184 Creal.exe 20 PID 2184 wrote to memory of 2200 2184 Creal.exe 20 PID 2184 wrote to memory of 2200 2184 Creal.exe 20
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
611KB
MD5536a6928f0e0b41d8a3e94a275141ef5
SHA1c9ada4a632c98439185144fd8a63f65758e208fb
SHA256f3363011f1d02f5356cf4f546b3dcea7099eeb18a337bab292dea42efddb126f
SHA51219cb33ca325927ebabd14b62b496a0e9e90c3d1c078244223e4133b710b7aa1b8885251690fc7ff27d0f3dd6c755030757da3c0ea7cf5f430ea652df9a590158
-
Filesize
124KB
MD59960128d8540398791f448d835308447
SHA16904ee81bcd3d193fb45dee4452dd7838b1e80fc
SHA25655df184c18030247b5b36bea779f926304ca277c7efd1261f6893551376e8c25
SHA5125b1a6a89a76c471aaca8f9512257b71578915d6e1be7d9f67efcd6218c1956b2ad70cc6645722b93edb2bebb133d9a5d62f8636621fe6019041614af58e7f8e1