Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
17-01-2024 12:57
Behavioral task
behavioral1
Sample
Creal.exe
Resource
win7-20231129-en
General
-
Target
Creal.exe
-
Size
19.4MB
-
MD5
dd53ed3706c2430bc5e8a338871db91a
-
SHA1
93ab5025b0602b1d3b8e0ebf3a8a97457b2c639c
-
SHA256
4771e5eedbaf4e273902971498a98a0caf93c34117dae57576d31183144c8c4e
-
SHA512
b5d159d596493d6b555a963f351cf9e67c2145c6ff1af7a1621fc12fce00c3559be52b8cba984b3948fa3df215721374d988817356caa4ccfcec0b0a940c1d35
-
SSDEEP
393216:REkZQtsrr7M5livQETSrvJQnqOq/rx7zdCyd06:RhQtsX7M5lmQEWrhQAzi
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2748 Creal.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2748 2512 Creal.exe 28 PID 2512 wrote to memory of 2748 2512 Creal.exe 28 PID 2512 wrote to memory of 2748 2512 Creal.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD55ac4fd4412dcd3b8f7c7c5df3ed05412
SHA178e8f80d1bad655865ae804dc3ee47aaad16e083
SHA2563b892413c6cf9c08002e1978bd62209429ee698ae2bbb9beab205ea0a386ba77
SHA5120488c17fecb425576077d890064b48c96eb1d01439571b3303700f7ea2f031ee3d18d9cff4c9ea084bbdd19eaf08bf876d7adfee9a2ea3caa7ce4323b8a2843c
-
Filesize
617KB
MD50bf85d8c4cd1a108af5e1484183d5136
SHA1dcbca3fa72fdf308c7667e4712577950c35ad160
SHA256dac9cb0a69636d4c39279bc65c76a2de6fb4698cb34811c071474f9bd973f170
SHA5125b336479e41cd7dafe114be357e20304f40a52692b3aae43e5f15cd235ba2f9e7d0b70ccf2f048c252288e9bf579e3e0e86a3ec5f475429662cc333850c28b67