Overview
overview
10Static
static
10Creal-Stea...in.zip
windows11-21h2-x64
1Creal-Stea...ICENSE
windows11-21h2-x64
1Creal-Stea...DME.md
windows11-21h2-x64
3Creal-Stea...er.bat
windows11-21h2-x64
1Creal-Stea...er.pyw
windows11-21h2-x64
3Creal-Stea...eal.py
windows11-21h2-x64
3Creal-Stea...l1.png
windows11-21h2-x64
3Creal-Stea...l2.png
windows11-21h2-x64
3Creal-Stea...l3.png
windows11-21h2-x64
3Creal-Stea...rr.png
windows11-21h2-x64
3Creal-Stea...xd.ico
windows11-21h2-x64
3Creal-Stea...xd.jpg
windows11-21h2-x64
Creal-Stea...ll.bat
windows11-21h2-x64
1Creal-Stea...ts.txt
windows11-21h2-x64
3Analysis
-
max time kernel
85s -
max time network
96s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-02-2024 20:42
Behavioral task
behavioral1
Sample
Creal-Stealer-main.zip
Resource
win11-20240214-en
Behavioral task
behavioral2
Sample
Creal-Stealer-main/LICENSE
Resource
win11-20240214-en
Behavioral task
behavioral3
Sample
Creal-Stealer-main/README.md
Resource
win11-20240214-en
Behavioral task
behavioral4
Sample
Creal-Stealer-main/builder.bat
Resource
win11-20240214-en
Behavioral task
behavioral5
Sample
Creal-Stealer-main/builder.pyw
Resource
win11-20240214-en
Behavioral task
behavioral6
Sample
Creal-Stealer-main/creal.py
Resource
win11-20240214-en
Behavioral task
behavioral7
Sample
Creal-Stealer-main/img/Creal1.png
Resource
win11-20240214-en
Behavioral task
behavioral8
Sample
Creal-Stealer-main/img/Creal2.png
Resource
win11-20240214-en
Behavioral task
behavioral9
Sample
Creal-Stealer-main/img/Creal3.png
Resource
win11-20240214-en
Behavioral task
behavioral10
Sample
Creal-Stealer-main/img/builderr.png
Resource
win11-20240214-en
Behavioral task
behavioral11
Sample
Creal-Stealer-main/img/xd.ico
Resource
win11-20240214-en
Behavioral task
behavioral12
Sample
Creal-Stealer-main/img/xd.jpg
Resource
win11-20240214-en
Behavioral task
behavioral13
Sample
Creal-Stealer-main/install.bat
Resource
win11-20240214-en
Behavioral task
behavioral14
Sample
Creal-Stealer-main/requirements.txt
Resource
win11-20240214-en
General
-
Target
Creal-Stealer-main/builder.bat
-
Size
57B
-
MD5
c856a1995fa86d5bf3dde2a2de732d93
-
SHA1
21de21d0ea29ffb9f3061b5d81116408dd228cb8
-
SHA256
23fb3df8dca77c02ab3d76013b6e12a2a1fda1a93ef675211c77df9ec6ce39bd
-
SHA512
793fb9e4d8b146a4e8d6e0dfa2d756ade17143420215f6b10646758bff39df964f6fa29761b4c6755dac7d1f8aea81152ac615d5b91bcea6018f997d0ecb5715
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3120 wrote to memory of 764 3120 cmd.exe 80 PID 3120 wrote to memory of 764 3120 cmd.exe 80 PID 3120 wrote to memory of 764 3120 cmd.exe 80
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Creal-Stealer-main\builder.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.42251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exepython builder.pyw2⤵PID:764
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2404