Analysis
-
max time kernel
48s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-02-2024 19:44
Behavioral task
behavioral1
Sample
creal.exe
Resource
win7-20231129-en
2 signatures
150 seconds
General
-
Target
creal.exe
-
Size
13.1MB
-
MD5
1037b622405037d28238b5e189babb37
-
SHA1
03dc2257f02ff9f080e0af7c426aa01da7cd2b88
-
SHA256
88f24437bea9f7828a404947fb5875feb3eccd94ee705067d2969f6bca5ca4c3
-
SHA512
a21fd47f11cde04c6764e7bfd3573021c55ec5a64853bcd09348fbbca99a552147248bd45d234de328f452d7a32c6421328ac34ebae50f77df15925fe135f844
-
SSDEEP
393216:AEk0DnonwW+eGQRIMTozGxu8C0ibfY6e5ZUt8S53WkaVcD:AMDnMwW+e5R5oztZ0R6e5ZBULaVcD
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2852 creal.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2852 2316 creal.exe 28 PID 2316 wrote to memory of 2852 2316 creal.exe 28 PID 2316 wrote to memory of 2852 2316 creal.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.7MB
MD548ebfefa21b480a9b0dbfc3364e1d066
SHA1b44a3a9b8c585b30897ddc2e4249dfcfd07b700a
SHA2560cc4e557972488eb99ea4aeb3d29f3ade974ef3bcd47c211911489a189a0b6f2
SHA5124e6194f1c55b82ee41743b35d749f5d92a955b219decacf9f1396d983e0f92ae02089c7f84a2b8296a3062afa3f9c220da9b7cd9ed01b3315ea4a953b4ecc6ce