Overview
overview
10Static
static
10Creal-Stea...er.bat
windows7-x64
1Creal-Stea...er.bat
windows10-2004-x64
1Creal-Stea...er.pyw
windows7-x64
3Creal-Stea...er.pyw
windows10-2004-x64
6Creal-Stea...eal.py
windows7-x64
3Creal-Stea...eal.py
windows10-2004-x64
3Creal-Stea...ll.bat
windows7-x64
1Creal-Stea...ll.bat
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-02-2024 18:50
Behavioral task
behavioral1
Sample
Creal-Stealer-main/builder.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Creal-Stealer-main/builder.bat
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
Creal-Stealer-main/builder.pyw
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Creal-Stealer-main/builder.pyw
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
Creal-Stealer-main/creal.py
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Creal-Stealer-main/creal.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
Creal-Stealer-main/install.bat
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Creal-Stealer-main/install.bat
Resource
win10v2004-20240221-en
General
-
Target
Creal-Stealer-main/creal.py
-
Size
56KB
-
MD5
5b6c9e120ec540ba7f4ae0583cf2516d
-
SHA1
371ec01bee3ebde3db87a48a66fd414237a52a8e
-
SHA256
d2f58e2b23fcf0cad401b79ffce450671ec8cc8c4030ceb19021511da7419c93
-
SHA512
5af377c0b6b9d7891c49d2203b1978da4d3351d0b9af4c90f71f01a70a1eea89e4c93c0737a2f5c4b1248bcd086d829079a1b969c71b55070346875b37c36fd5
-
SSDEEP
768:QmWsYvpkylnnXeihOCS9DtiXLCezzj/VckjTPJPirqWR:QLnhhFS9Dt6LvLVdjTJWR
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2752 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2752 AcroRd32.exe 2752 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1284 wrote to memory of 2684 1284 cmd.exe 29 PID 1284 wrote to memory of 2684 1284 cmd.exe 29 PID 1284 wrote to memory of 2684 1284 cmd.exe 29 PID 2684 wrote to memory of 2752 2684 rundll32.exe 30 PID 2684 wrote to memory of 2752 2684 rundll32.exe 30 PID 2684 wrote to memory of 2752 2684 rundll32.exe 30 PID 2684 wrote to memory of 2752 2684 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Creal-Stealer-main\creal.py1⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Creal-Stealer-main\creal.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Creal-Stealer-main\creal.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD520f8e95fe279525aab6071cc865284b5
SHA1bbce4e7fd6b50108ccb8d9306bfbaf253e1b3ba9
SHA2565e4e4a609cae4af99d7986371cfd794f48b260e04a835fbccd5467a8c0656ae9
SHA512ac7a8ca90c8d679452b9e2f392eebe21241e43f4cd3aaceb56e9bcbe295659d1dc04abea84f737425377971bcb5ddb6aae8ef5dcb942648a95601595f431e1fb