Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
16-01-2024 17:24
Behavioral task
behavioral1
Sample
Creal.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Creal.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Creal.pyc
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Creal.pyc
Resource
win10v2004-20231215-en
General
-
Target
Creal.pyc
-
Size
98KB
-
MD5
0cc4110b88ba4d8ca23d144bc5047de1
-
SHA1
ca7bca883d7163eea8915107e4a7acb2c6c6e95a
-
SHA256
cd637a3df1be8100a4ef685311201a4b04bd3227a4b5afdc5835a1d7af3484e5
-
SHA512
3895b9f9697e47ec375a98a935b96565bad4b0dec4d264b167fd4273d6330e8a3007cc072ddb4f09a8fbfa08e752ff949dfd4eb3a2dc01390550fb0168c90fdc
-
SSDEEP
1536:WuuDrDe3uzTZMB7aK1hY6YITSM8K28PCQus5mIbVtX/RiOV//OgrszpX1cKgKZI4:RuDfe3uz0BoM8B8Pzm2tXZiOW
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2812 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2812 2256 cmd.exe 29 PID 2256 wrote to memory of 2812 2256 cmd.exe 29 PID 2256 wrote to memory of 2812 2256 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Creal.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Creal.pyc2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2812
-