Analysis
-
max time kernel
1s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 18:37
Behavioral task
behavioral1
Sample
Creal.exe
Resource
win7-20240705-en
windows7-x64
2 signatures
150 seconds
General
-
Target
Creal.exe
-
Size
20.6MB
-
MD5
83c2397d023c39a35250c4fa9d8ca703
-
SHA1
7f659595d1f45df3597e1ee14d60d3738bb1b8bc
-
SHA256
3e23409d7625e3cf675b5766e85b6e0ba0aa740a2825583d0bf7631817ebfce8
-
SHA512
d91d1e5d7ab86acb6f1fe3ea76c22cbc9a08cd1ad690f6e928d5c62b15bc591399a520a3363f2d939ab8be3fd970052999a5df38c792c0ab256e4aca7bdd62f3
-
SSDEEP
393216:XQtsTP8Hr7M5li8k3me+cGfd0NYMR8E76lCgdYB:XQtsL8L7M5lDaE5F0NYysu
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2376 Creal.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1016 wrote to memory of 2376 1016 Creal.exe 29 PID 1016 wrote to memory of 2376 1016 Creal.exe 29 PID 1016 wrote to memory of 2376 1016 Creal.exe 29
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD558e01abc9c9b5c885635180ed104fe95
SHA11c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081