Overview
overview
10Static
static
10Creal-Stea...eal.py
windows7-x64
3Creal-Stea...eal.py
windows10-2004-x64
3Creal-Stea...er.bat
windows7-x64
1Creal-Stea...er.bat
windows10-2004-x64
1Creal-Stea...der.py
windows7-x64
3Creal-Stea...der.py
windows10-2004-x64
3Creal-Stea...ll.bat
windows7-x64
1Creal-Stea...ll.bat
windows10-2004-x64
1Creal-Stea...on.bat
windows7-x64
1Creal-Stea...on.bat
windows10-2004-x64
8Creal-Stea...unk.py
windows7-x64
3Creal-Stea...unk.py
windows10-2004-x64
3Analysis
-
max time kernel
1556s -
max time network
1560s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-03-2024 05:41
Behavioral task
behavioral1
Sample
Creal-Stealer-main/Creal.py
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Creal-Stealer-main/Creal.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Creal-Stealer-main/builder.bat
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Creal-Stealer-main/builder.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Creal-Stealer-main/builder.py
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Creal-Stealer-main/builder.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Creal-Stealer-main/install.bat
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
Creal-Stealer-main/install.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Creal-Stealer-main/install_python.bat
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Creal-Stealer-main/install_python.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
Creal-Stealer-main/junk.py
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Creal-Stealer-main/junk.py
Resource
win10v2004-20231215-en
General
-
Target
Creal-Stealer-main/install_python.bat
-
Size
687B
-
MD5
821f007d1c56bb3f4511bab928ce8f63
-
SHA1
a22b0d76f5ef0e145629dded82e195486675774a
-
SHA256
434f9d4a2a7a5088aa393b47ad8e957a15481cd3078f10b3c0f7ec6fe5f497c2
-
SHA512
f1db8db20e25d8d06828ead22e70a28411bf32faa7dd14816ef833efe548a046e9383cb51aa100d49555f2cc9c1f74bf10aef871a0e6724da5f96c690770dd4d
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2348 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2348 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2056 wrote to memory of 1520 2056 cmd.exe 29 PID 2056 wrote to memory of 1520 2056 cmd.exe 29 PID 2056 wrote to memory of 1520 2056 cmd.exe 29 PID 1520 wrote to memory of 2348 1520 cmd.exe 30 PID 1520 wrote to memory of 2348 1520 cmd.exe 30 PID 1520 wrote to memory of 2348 1520 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Creal-Stealer-main\install_python.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "Invoke-WebRequest https://www.python.org/ftp/python/ -UseBasicParsing | Select-String -Pattern '3.10.[0-9]{1,2}' -AllMatches | Select-Object -ExpandProperty Matches | Select-Object -ExpandProperty Value | Sort-Object -Descending -Unique | Select-Object -First 1"2⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest https://www.python.org/ftp/python/ -UseBasicParsing | Select-String -Pattern '3.10.[0-9]{1,2}' -AllMatches | Select-Object -ExpandProperty Matches | Select-Object -ExpandProperty Value | Sort-Object -Descending -Unique | Select-Object -First 1"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-