Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
16/03/2025, 15:03
Behavioral task
behavioral1
Sample
Creal.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
Creal.exe
Resource
win10v2004-20250314-en
General
-
Target
Creal.exe
-
Size
10.8MB
-
MD5
e4692be030a3f7f1b23aa10425daaa4f
-
SHA1
9443fa19fb06721cfa772026939a5fed310704b6
-
SHA256
1a02d0b18d3225c47d3ac9ad4f0c24a889bcf24fc9d3ddff71842d78e4549d9b
-
SHA512
207921b5d0b3a7ca6238928db67a346515c61ba0b4fc5b5778150646ad837efe6c85b9425361066b221aba00d45412675caa249d7e86dbba261c18f7975f3242
-
SSDEEP
196608:e0uEqWQ3xfpTgdQmRJ8dA6lSuqaycBIGpEKo6hTOv+QKfFqTeKq/lVUwfW5UqKUd:013bgdQuslSq9foWOv+9fFG2Ve5Ftx
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2808 Creal.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2808 2488 Creal.exe 31 PID 2488 wrote to memory of 2808 2488 Creal.exe 31 PID 2488 wrote to memory of 2808 2488 Creal.exe 31
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989