Analysis
-
max time kernel
19s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06-02-2024 23:58
Behavioral task
behavioral1
Sample
creal.exe
Resource
win7-20231215-en
General
-
Target
creal.exe
-
Size
15.8MB
-
MD5
0202d06ea52870cd5e8ae02c8bfa0157
-
SHA1
74a4c486075684ef20805ee5c7a979e9925e3a7d
-
SHA256
997bc2b7665781bc5162a4aa645b4afc4705e835a030ea4ef39b0189a7ccb3b7
-
SHA512
17dc78e5e89947bf9fa0c576d642f9e5a40ca356bf7b34e8b224976a6b547f024c28f3f3e4be4837df54e4d049d63a75fa315eb230469058ad3ccc27905c5085
-
SSDEEP
393216:koEkMD2ntpUTLfhJsW+eGQRCMTozGxu8C0ibfz6e57Y1bmXiWCUI:TUDaHUTLJSW+e5RLoztZ026e5WFVUI
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2792 creal.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2792 2164 creal.exe 28 PID 2164 wrote to memory of 2792 2164 creal.exe 28 PID 2164 wrote to memory of 2792 2164 creal.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.6MB
MD5f68863c11373d26b2c14a736b4c1e7ae
SHA14606a525fb31bf1dd3c75e8957d36be0361e6d44
SHA2560bdc342ed0c6ece9fc74fb8f1eb7b09d6980215c14198571d9e6aa8958da6a8a
SHA5126652b19227f9e2a561285a57929a351ae40949fbf5ae07f98cd0e7b2eb7488f5c6e6b0915a0a54bceccbb378b76338bf7c69a5e138987ad37b0fbfc65536206b
-
Filesize
1024KB
MD51121372fd7232cedadc4a8a6c912e127
SHA1303d61179e60268b6a9fcc7dd8633d9ff573dcf3
SHA2565ca63c76ee36472f507a3710f8df29ce1bb3c041b2af622ef29220dcc620dd7a
SHA512404786bbe11bcc18d0168b1fe1351b6197af1af97f5e8fa6bfbdfc403addbe2c42cedf5803b3e5a9d43d71fbfd52b9f6e90a6abbb77b37bb31f3183a978d74cc