Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06-02-2024 11:37
Behavioral task
behavioral1
Sample
Creal.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Creal.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Creal.pyc
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
Creal.pyc
Resource
win10v2004-20231215-en
General
-
Target
Creal.exe
-
Size
16.8MB
-
MD5
239bfba14c38a806d521a130fdbadcb4
-
SHA1
76fc6573355941e73809ff3055a16bbc667410a1
-
SHA256
3aebbd7a53be06f3baad3a42d2479c63c6286b3cdf6a88e7fb5117bad15f7d82
-
SHA512
54adac83cbc7a574d12b85e3e886db7fb07f13f01821e35693057742620c81c73884965cf1cce3d1ce83cdf5b9b80ef2d31a469543e39fa6843809a4ccfe8834
-
SSDEEP
393216:eX7Qts2Y2pOeLLDfDllpfaMPgFRgjEflXfaGRu2:eLQts2Y2JPbhHf9PgFqmDQ
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2544 Creal.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2544 2220 Creal.exe 28 PID 2220 wrote to memory of 2544 2220 Creal.exe 28 PID 2220 wrote to memory of 2544 2220 Creal.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD565cf61812fb05034ec9c2e328f724538
SHA1b51eefbd804e01f84c574a8b1a508938ad78d041
SHA2569ce4c8111b34a2373c9449fbb20ec3d5c4ddff677281a2b8d59b9d5a05c414d6
SHA512758c0774f3f1ee35ba00982c3df8622d28c4ae84763ec6e81200a15c84adf69ad4922c1199c66fa1c4f1c67026c698880fcb7a0aadcd83787a02b29cd4cdd2bf
-
Filesize
1.5MB
MD530f4890c61880eb3f01166c7ea2871a3
SHA143c59d9e3e532925c1e16aaa1985bb2d312fd394
SHA256f8c16e1ac40bb8a13100f003748fb11b0bdd0ec10e9f2870a800451d896124c7
SHA51259c723ce5aaea5055686dfaa526cf878e767f4393bfbf5685982cc2c8bf93c7a2d8b57e99bb12dcf2febe8cf1360deac85f41e86bde83d5617b4e87c57ceed7d