Analysis
-
max time kernel
139s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2024 11:37
Behavioral task
behavioral1
Sample
Creal.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Creal.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Creal.pyc
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
Creal.pyc
Resource
win10v2004-20231215-en
General
-
Target
Creal.exe
-
Size
16.8MB
-
MD5
239bfba14c38a806d521a130fdbadcb4
-
SHA1
76fc6573355941e73809ff3055a16bbc667410a1
-
SHA256
3aebbd7a53be06f3baad3a42d2479c63c6286b3cdf6a88e7fb5117bad15f7d82
-
SHA512
54adac83cbc7a574d12b85e3e886db7fb07f13f01821e35693057742620c81c73884965cf1cce3d1ce83cdf5b9b80ef2d31a469543e39fa6843809a4ccfe8834
-
SSDEEP
393216:eX7Qts2Y2pOeLLDfDllpfaMPgFRgjEflXfaGRu2:eLQts2Y2JPbhHf9PgFqmDQ
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Creal.exe Creal.exe -
Loads dropped DLL 46 IoCs
pid Process 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe 2260 Creal.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 33 IoCs
flow ioc 93 discord.com 38 discord.com 81 discord.com 85 discord.com 89 discord.com 41 discord.com 56 discord.com 86 discord.com 35 discord.com 36 discord.com 70 discord.com 74 discord.com 82 discord.com 91 discord.com 60 discord.com 72 discord.com 87 discord.com 88 discord.com 63 discord.com 78 discord.com 37 discord.com 52 discord.com 53 discord.com 55 discord.com 77 discord.com 40 discord.com 42 discord.com 43 discord.com 58 discord.com 32 discord.com 59 discord.com 80 discord.com 90 discord.com -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 api.ipify.org 14 api.ipify.org 22 api.ipify.org 48 api.ipify.org 64 api.ipify.org -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3652 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3652 tasklist.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4540 wrote to memory of 2260 4540 Creal.exe 84 PID 4540 wrote to memory of 2260 4540 Creal.exe 84 PID 2260 wrote to memory of 1248 2260 Creal.exe 85 PID 2260 wrote to memory of 1248 2260 Creal.exe 85 PID 2260 wrote to memory of 4524 2260 Creal.exe 87 PID 2260 wrote to memory of 4524 2260 Creal.exe 87 PID 4524 wrote to memory of 3652 4524 cmd.exe 89 PID 4524 wrote to memory of 3652 4524 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Creal.exe"C:\Users\Admin\AppData\Local\Temp\Creal.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\Creal.exe"C:\Users\Admin\AppData\Local\Temp\Creal.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵PID:1248
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD50095e5a32a49588b6ff78442adb08347
SHA186559f597acf74de5e155cd9e6bf144ac59663ae
SHA256e804a6a7cbf50e7dd64fce306ee73bfd1920a14b071003b9f5dd744e46d489b6
SHA51254079fe77efaf82aa20019e4ceadd531bc9e4e7f8b36a2c95aef6f11186f654929b581e1bf85c3d772f64997f25a323a3e614fdc8077ba01d7b3d6ed67509a22
-
Filesize
13KB
MD5313e5c587d7608b6552ad51aae677e5c
SHA1c14520214ab85c9d61fc2af5df299a8216c4d8ca
SHA256b7e02112998b9821e2cb29bd016a5671a826fe1364f8cd6ef6bb1bc9f0651bef
SHA5127aad2404f2c28b18609e27033863f19cef2f8b322103007ec5187e17b76e85e2150f9d6d97ee2d11e16904cffa16871660968e7569732118065ed85734a3595e
-
Filesize
10KB
MD5eac59b1c2fef8f6f07e3a9bcfe7f381b
SHA10e9c83b69f73a7f0922b067e6583cee893a0e81a
SHA25667e06bd6dd08638dcb5e33100ae6fc3e8daf7ebbb1482b528e221e7535e2cba6
SHA5120e1cf7ebbcfc8f2fc93db3751a41ce933a6dffc8bbedfab508dc2d8e467a276a2e1f959a8f2640372437c8e084ef36175e3fe7964d33655dd51a1167d9618ed9
-
Filesize
106KB
MD54585a96cc4eef6aafd5e27ea09147dc6
SHA1489cfff1b19abbec98fda26ac8958005e88dd0cb
SHA256a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736
SHA512d78260c66331fe3029d2cc1b41a5d002ec651f2e3bbf55076d65839b5e3c6297955afd4d9ab8951fbdc9f929dbc65eb18b14b59bce1f2994318564eb4920f286
-
Filesize
48KB
MD57e668ab8a78bd0118b94978d154c85bc
SHA1dbac42a02a8d50639805174afd21d45f3c56e3a0
SHA256e4b533a94e02c574780e4b333fcf0889f65ed00d39e32c0fbbda2116f185873f
SHA51272bb41db17256141b06e2eaeb8fc65ad4abdb65e4b5f604c82b9e7e7f60050734137d602e0f853f1a38201515655b6982f2761ee0fa77c531aa58591c95f0032
-
Filesize
63KB
MD561a5ae75f514b3ccbf1b939e06a5d451
SHA18154795e0f14415fb5802da65aafa91d7cbc57ec
SHA2562b772076c2dba91fb4f61182b929485cc6c660baab4bce6e08aa18e414c69641
SHA512bcd077d5d23fdab8427cc077b26626644b1b4b793c7f445e4f85094bd596c28319a854623b6e385f8e479b52726a9b843c4376bf288dc4f09edc30f332dbaf13
-
Filesize
82KB
MD5a62207fc33140de460444e191ae19b74
SHA19327d3d4f9d56f1846781bcb0a05719dea462d74
SHA256ebcac51449f323ae3ae961a33843029c34b6a82138ccd9214cf99f98dd2148c2
SHA51290f9db9ee225958cb3e872b79f2c70cb1fd2248ebaa8f3282afff9250285852156bf668f5cfec49a4591b416ce7ebaaac62d2d887152f5356512f2347e3762b7
-
Filesize
177KB
MD5210def84bb2c35115a2b2ac25e3ffd8f
SHA10376b275c81c25d4df2be4789c875b31f106bd09
SHA25659767b0918859beddf28a7d66a50431411ffd940c32b3e8347e6d938b60facdf
SHA512cd5551eb7afd4645860c7edd7b0abd375ee6e1da934be21a6099879c8ee3812d57f2398cad28fbb6f75bba77471d9b32c96c7c1e9d3b4d26c7fc838745746c7f
-
Filesize
120KB
MD59b344f8d7ce5b57e397a475847cc5f66
SHA1aff1ccc2608da022ecc8d0aba65d304fe74cdf71
SHA256b1214d7b7efd9d4b0f465ec3463512a1cbc5f59686267030f072e6ce4b2a95cf
SHA5122b0d9e1b550bf108fa842324ab26555f2a224aefff517fdb16df85693e05adaf0d77ebe49382848f1ec68dc9b5ae75027a62c33721e42a1566274d1a2b1baa41
-
Filesize
247KB
MD5692c751a1782cc4b54c203546f238b73
SHA1a103017afb7badaece8fee2721c9a9c924afd989
SHA256c70f05f6bc564fe400527b30c29461e9642fb973f66eec719d282d3d0b402f93
SHA5121b1ad0ca648bd50ce6e6af4be78ad818487aa336318b272417a2e955ead546c9e0864b515150cd48751a03ca8c62f9ec91306cda41baea52452e3fcc24d57d39
-
Filesize
63KB
MD5787b82d4466f393366657b8f1bc5f1a9
SHA1658639cddda55ac3bfc452db4ec9cf88851e606b
SHA256241322647ba9f94bdc3ae387413ffb57ae14c8cf88bd564a31fe193c6ca43e37
SHA512afcf66962958f38eec8b591aa30d380eb0e1b41028836058ff91b4d1472658de9fba3262f5c27ba688bd73da018e938f398e45911cd37584f623073067f575b6
-
Filesize
155KB
MD50c7ea68ca88c07ae6b0a725497067891
SHA1c2b61a3e230b30416bc283d1f3ea25678670eb74
SHA256f74aaf0aa08cf90eb1eb23a474ccb7cb706b1ede7f911daf7ae68480765bdf11
SHA512fd52f20496a12e6b20279646663d880b1354cffea10793506fe4560ed7da53e4efba900ae65c9996fbb3179c83844a9674051385e6e3c26fb2622917351846b9
-
Filesize
33KB
MD5b320ef859e079bcb5ff71ef645b2dad6
SHA1a392a5d74667c22211c50f4684e6b7948ed0e3b1
SHA256b49fe3b3efd833aaad131ce25706126b569d1a1f2eba4d470ec98ffdfa722767
SHA51209532b48b1502c50d0b8308064fe4a3f141354eb45dc84e7c400bf7ceb2d3a7dcb11b45d497013ad0c6e7698dd8b87c6577c1d67fea37f4046bca7d5e529b1de
-
Filesize
49KB
MD57db2b9d0fd06f7bd7e32b52bd626f1ce
SHA16756c6adf03d4887f8be371954ef9179b2df78cd
SHA25624f9971debbd864e3ba615a89d2c5b0e818f9ab2be4081499bc877761992c814
SHA5125b3f55c89056c0bf816c480ed7f8aad943a5ca07bd9b9948f0aa7163664d462c3c46d233ee11dd101ce46dc8a53b29e8341e227fe462e81d29e257a6897a5f3d
-
Filesize
31KB
MD506248702a6cd9d2dd20c0b1c6b02174d
SHA13f14d8af944fe0d35d17701033ff1501049e856f
SHA256ac177cd84c12e03e3a68bca30290bc0b8f173eee518ef1fa6a9dce3a3e755a93
SHA5125b22bbff56a8b48655332ebd77387d307f5c0a526626f3654267a34bc4863d8afaf08ff3946606f3cf00b660530389c37bdfac91843808dbebc7373040fec4c1
-
Filesize
77KB
MD526dd19a1f5285712068b9e41808e8fa0
SHA190c9a112dd34d45256b4f2ed38c1cbbc9f24dba5
SHA256eaabf6b78840daeaf96b5bdbf06adf0e4e2994dfeee5c5e27fefd824dbda5220
SHA512173e1eda05d297d7da2193e8566201f05428437adcac80aecefe80f82d46295b15ce10990b5c080325dc59a432a587eef84a15ec688a62b82493ad501a1e4520
-
Filesize
117KB
MD5ffb03c18ed0f340fe9d86abaa9eef835
SHA1d6295d7a100414ce76797c826d2d3c0b4df0c80e
SHA2561d4e17237a10b68d16634fc9698edf342b40478d92fa15d574d212c7a44b05bb
SHA512e911ce6e6b5de50696d7e7f14560c90b83c1179a946d2f5ddcf6fcf797c031dc65b42300685e97cfdc592bae5f974cc31c81d2e12994cd9c28d3f67df282dda5
-
Filesize
157KB
MD5ab0e4fbffb6977d0196c7d50bc76cf2d
SHA1680e581c27d67cd1545c810dbb175c2a2a4ef714
SHA256680ad2de8a6cff927822c1d7dd22112a3e8a824e82a7958ee409a7b9ce45ec70
SHA5122bff84a8ec7a26dde8d1bb09792ead8636009c8ef3fa68300a75420197cd7b6c8eaaf8db6a5f97442723e5228afa62961f002948e0eeee8c957c6517547dffba
-
Filesize
24KB
MD5aea6a82bfa35b61d86e8b6a5806f31d6
SHA17c21b7147b391b7195583ab695717e38fe971e3e
SHA25627b9545f5a510e71195951485d3c6a8b112917546fe5e8e46579b8ff6ce2acb0
SHA512133d11535dea4b40afeca37f1a0905854fc4d2031efe802f00dd72e97b1705ca7ffe461acf90a36e2077534fe4df94d9469e99c64dbd3f301e5bca5c327fdc65
-
Filesize
1.4MB
MD5ed3be1ac8f080c5a452bb43df75627af
SHA1e03430e3c5a4564bc97af86e1ffe55249fd13aa7
SHA256fc84d668ed7cd439b7710e8eee8e6217a21d51d486d79dd9dcc683d8d56817cd
SHA512ad6bedd64b423708df8c3ed2e70d26ce15057aaf511ecae452803c3ba06f96eadd1877e2f23a9b359a54510db578fdf3e384ed02840214e53dedf7a086596164
-
Filesize
10KB
MD5723ec2e1404ae1047c3ef860b9840c29
SHA18fc869b92863fb6d2758019dd01edbef2a9a100a
SHA256790a11aa270523c2efa6021ce4f994c3c5a67e8eaaaf02074d5308420b68bd94
SHA5122e323ae5b816adde7aaa14398f1fdb3efe15a19df3735a604a7db6cadc22b753046eab242e0f1fbcd3310a8fbb59ff49865827d242baf21f44fd994c3ac9a878
-
Filesize
116KB
MD59ea8098d31adb0f9d928759bdca39819
SHA1e309c85c1c8e6ce049eea1f39bee654b9f98d7c5
SHA2563d9893aa79efd13d81fcd614e9ef5fb6aad90569beeded5112de5ed5ac3cf753
SHA51286af770f61c94dfbf074bcc4b11932bba2511caa83c223780112bda4ffb7986270dc2649d4d3ea78614dbce6f7468c8983a34966fc3f2de53055ac6b5059a707
-
Filesize
3.3MB
MD59d7a0c99256c50afd5b0560ba2548930
SHA176bd9f13597a46f5283aa35c30b53c21976d0824
SHA2569b7b4a0ad212095a8c2e35c71694d8a1764cd72a829e8e17c8afe3a55f147939
SHA512cb39aa99b9d98c735fdacf1c5ed68a4d09d11f30262b91f6aa48c3f8520eff95e499400d0ce7e280ca7a90ff6d7141d2d893ef0b33a8803a1cadb28ba9a9e3e2
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
688KB
MD5bec0f86f9da765e2a02c9237259a7898
SHA13caa604c3fff88e71f489977e4293a488fb5671c
SHA256d74ce01319ae6f54483a19375524aa39d9f5fd91f06cf7df238ca25e043130fd
SHA512ffbc4e5ffdb49704e7aa6d74533e5af76bbe5db297713d8e59bd296143fe5f145fbb616b343eed3c48eceaccccc2431630470d8975a4a17c37eafcc12edd19f4
-
Filesize
194KB
MD548e6930e3095f5a2dcf9baa67098acfb
SHA1ddcd143f386e74e9820a3f838058c4caa7123a65
SHA256c1ed7017ce55119df27563d470e7dc3fb29234a7f3cd5fc82d317b6fe559300b
SHA512b50f42f6c7ddbd64bf0ff37f40b8036d253a235fb67693a7f1ed096f5c3b94c2bde67d0db63d84a8c710505a891b43f913e1b1044c42b0f5f333d0fe0386a62c
-
Filesize
5.5MB
MD5e2bd5ae53427f193b42d64b8e9bf1943
SHA17c317aad8e2b24c08d3b8b3fba16dd537411727f
SHA256c4844b05e3a936b130adedb854d3c04d49ee54edb43e9d36f8c4ae94ccb78400
SHA512ae23a6707e539c619fd5c5b4fc6e4734edc91f89ebe024d25ff2a70168da6105ac0bd47cf6bf3715af6411963caf0acbb4632464e1619ca6361abf53adfe7036
-
Filesize
654KB
MD5f98264f2dacfc8e299391ed1180ab493
SHA1849551b6d9142bf983e816fef4c05e639d2c1018
SHA2560fe49ec1143a0efe168809c9d48fe3e857e2ac39b19db3fd8718c56a4056696b
SHA5126bb3dbd9f4d3e6b7bd294f3cb8b2ef4c29b9eff85c0cfd5e2d2465be909014a7b2ecd3dc06265b1b58196892bb04d3e6b0aa4b2ccbf3a716e0ff950eb28db11c
-
Filesize
131KB
MD590b786dc6795d8ad0870e290349b5b52
SHA1592c54e67cf5d2d884339e7a8d7a21e003e6482f
SHA25689f2a5c6be1e70b3d895318fdd618506b8c0e9a63b6a1a4055dff4abdc89f18a
SHA512c6e1dbf25d260c723a26c88ec027d40d47f5e28fc9eb2dbc72a88813a1d05c7f75616b31836b68b87df45c65eef6f3eaed2a9f9767f9e2f12c45f672c2116e72
-
Filesize
29KB
MD5756c95d4d9b7820b00a3099faf3f4f51
SHA1893954a45c75fb45fe8048a804990ca33f7c072d
SHA25613e4d9a734a453a3613e11b6a518430099ad7e3d874ea407d1f9625b7f60268a
SHA5120f54f0262cf8d71f00bf5666eb15541c6ecc5246cd298efd3b7dd39cdd29553a8242d204c42cfb28c537c3d61580153200373c34a94769f102b3baa288f6c398
-
Filesize
1.4MB
MD535f55e2ad0ae11a273408cfeff75b1ab
SHA1672bff2dea4351e1245806e6af7f1be5da9dd055
SHA256919572560c314e46b1dba56418bbb50e1620c0af328aec394eaff580c58f2fc5
SHA512b84a42b42a710cd5fe91def37207200141a03a8e93488d05099115f16961255248aa74c3a9800a82a0c4eb79348b570ca1a2bfa4e3168b5359ce063a688d26a4
-
Filesize
1.1MB
MD558f7988b50cba7b793884f580c7083e1
SHA1d52c06b19861f074e41d8b521938dee8b56c1f2e
SHA256e36d14cf49ca2af44fae8f278e883341167bc380099dac803276a11e57c9cfa1
SHA512397fa46b90582f8a8cd7df23b722204c38544717bf546837c45e138b39112f33a1850be790e248fca5b5ecd9ed7c91cd1af1864f72717d9805c486db0505fb9c
-
Filesize
130KB
MD51d6762b494dc9e60ca95f7238ae1fb14
SHA1aa0397d96a0ed41b2f03352049dafe040d59ad5d
SHA256fae5323e2119a8f678055f4244177b5806c7b6b171b1945168f685631b913664
SHA5120b561f651161a34c37ff8d115f154c52202f573d049681f8cdd7bba2e966bb8203780c19ba824b4a693ef12ef1eeef6aeeef96eb369e4b6129f1deb6b26aaa00
-
Filesize
29B
MD5155ea3c94a04ceab8bd7480f9205257d
SHA1b46bbbb64b3df5322dd81613e7fa14426816b1c1
SHA256445e2bcecaa0d8d427b87e17e7e53581d172af1b9674cf1a33dbe1014732108b
SHA5123d47449da7c91fe279217a946d2f86e5d95d396f53b55607ec8aca7e9aa545cfaf9cb97914b643a5d8a91944570f9237e18eecec0f1526735be6ceee45ecba05