Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 18:43
Behavioral task
behavioral1
Sample
creal.exe
Resource
win7-20240221-en
General
-
Target
creal.exe
-
Size
13.3MB
-
MD5
92e0670226c5248551d4f8ec43dca53b
-
SHA1
8afb4fb0dba912d033daf51ac5916a9e74df8a1e
-
SHA256
6c69c50fd7fa8d28dab06c677442eb9488118b0cecd6b02f9717c533b39691e3
-
SHA512
7f301e838e4542ca6c8d699e7d6946a53822da15fdc4c49ea6cc269a26a357786920f5993168a326a7550e26e02cbd874ceb18e8fe70142eda1a9d83d1d9348d
-
SSDEEP
393216:nEkZgf8iq1+TtIiFGvvB5IjWqn6eCz1TypX8Wjsaa:nRbiq1QtIZX3ILn6eayCesaa
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2552 creal.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2552 2200 creal.exe 28 PID 2200 wrote to memory of 2552 2200 creal.exe 28 PID 2200 wrote to memory of 2552 2200 creal.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD5e86cc853e2e8fd06dbb5ce6f0d250760
SHA1ff6de8f9b676dc7bbcd0a7a3ee06fd7a937a0316
SHA2567f9226665274eed41a0ede0561dd96966e377db8c37948e6cfadc02ad7def4a8
SHA51294a5e3614a33be972ed00bc6931f4a547d65cd32c6dcd1dfeb229d8e8098a97289c1dbcc41184f3f1a7025153b5c970c4c15969138556e56d02d0f08a4364eb9
-
Filesize
6.7MB
MD5550288a078dffc3430c08da888e70810
SHA101b1d31f37fb3fd81d893cc5e4a258e976f5884f
SHA256789a42ac160cef98f8925cb347473eeeb4e70f5513242e7faba5139ba06edf2d
SHA5127244432fc3716f7ef27630d4e8fbc8180a2542aa97a01d44dca260ab43966dd8ac98b6023400b0478a4809aace1a128f1f4d6e544f2e591a5b436fd4c8a9d723