Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-02-2024 10:38
Behavioral task
behavioral1
Sample
Creal.exe
Resource
win7-20231215-en
General
-
Target
Creal.exe
-
Size
16.8MB
-
MD5
239bfba14c38a806d521a130fdbadcb4
-
SHA1
76fc6573355941e73809ff3055a16bbc667410a1
-
SHA256
3aebbd7a53be06f3baad3a42d2479c63c6286b3cdf6a88e7fb5117bad15f7d82
-
SHA512
54adac83cbc7a574d12b85e3e886db7fb07f13f01821e35693057742620c81c73884965cf1cce3d1ce83cdf5b9b80ef2d31a469543e39fa6843809a4ccfe8834
-
SSDEEP
393216:eX7Qts2Y2pOeLLDfDllpfaMPgFRgjEflXfaGRu2:eLQts2Y2JPbhHf9PgFqmDQ
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2656 Creal.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1092 wrote to memory of 2656 1092 Creal.exe 28 PID 1092 wrote to memory of 2656 1092 Creal.exe 28 PID 1092 wrote to memory of 2656 1092 Creal.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD5e2bd5ae53427f193b42d64b8e9bf1943
SHA17c317aad8e2b24c08d3b8b3fba16dd537411727f
SHA256c4844b05e3a936b130adedb854d3c04d49ee54edb43e9d36f8c4ae94ccb78400
SHA512ae23a6707e539c619fd5c5b4fc6e4734edc91f89ebe024d25ff2a70168da6105ac0bd47cf6bf3715af6411963caf0acbb4632464e1619ca6361abf53adfe7036
-
Filesize
547KB
MD5b66ce9c538f2fdfbf05ab9be4f2d4661
SHA102c889b2c8819d96f3423c76041f4123e31111a9
SHA256f9e80210e1214a46933873cf7fa79e83f7bf8088446567fc806aa337ec3397dd
SHA512309198ba43b5b0ebc0cba6f9c8ac7d6f5b6b64f2797e047e921350bbaa2f74db2722ae0fb026fa03eddd797ae52840749a3fa0517b324605da8f44e96ca655d3