Analysis
-
max time kernel
11s -
max time network
21s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-01-2024 15:33
Behavioral task
behavioral1
Sample
Creal-Stealer-main/builder.bat
Resource
win11-20231215-en
windows11-21h2-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
Creal-Stealer-main/creal.py
Resource
win11-20231215-en
windows11-21h2-x64
3 signatures
150 seconds
Behavioral task
behavioral3
Sample
Creal-Stealer-main/install.bat
Resource
win11-20231215-en
windows11-21h2-x64
0 signatures
150 seconds
General
-
Target
Creal-Stealer-main/builder.bat
-
Size
57B
-
MD5
c856a1995fa86d5bf3dde2a2de732d93
-
SHA1
21de21d0ea29ffb9f3061b5d81116408dd228cb8
-
SHA256
23fb3df8dca77c02ab3d76013b6e12a2a1fda1a93ef675211c77df9ec6ce39bd
-
SHA512
793fb9e4d8b146a4e8d6e0dfa2d756ade17143420215f6b10646758bff39df964f6fa29761b4c6755dac7d1f8aea81152ac615d5b91bcea6018f997d0ecb5715
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2600 2872 cmd.exe 82 PID 2872 wrote to memory of 2600 2872 cmd.exe 82 PID 2872 wrote to memory of 2600 2872 cmd.exe 82
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Creal-Stealer-main\builder.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.42251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exepython builder.pyw2⤵PID:2600
-