Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3WC_CRACKA ...32.dll
windows7-x64
1WC_CRACKA ...32.dll
windows10-2004-x64
1WC_CRACKA ...V3.dll
windows7-x64
1WC_CRACKA ...V3.dll
windows10-2004-x64
1WC_CRACKA ...02.exe
windows7-x64
1WC_CRACKA ...02.exe
windows10-2004-x64
1WC_CRACKA ...PT.dll
windows7-x64
3WC_CRACKA ...PT.dll
windows10-2004-x64
3WC_CRACKA ...m-.url
windows7-x64
1WC_CRACKA ...m-.url
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 23:07
Static task
static1
Behavioral task
behavioral1
Sample
WC_CRACKA v0.02/COMDLG32.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
WC_CRACKA v0.02/COMDLG32.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
WC_CRACKA v0.02/QSOCKSV3.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
WC_CRACKA v0.02/QSOCKSV3.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
WC_CRACKA v0.02/WC_CRACKAV002.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
WC_CRACKA v0.02/WC_CRACKAV002.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
WC_CRACKA v0.02/YMSG12ENCRYPT.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
WC_CRACKA v0.02/YMSG12ENCRYPT.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
WC_CRACKA v0.02/http--www.blackwidow-softbytes.com-.url
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
WC_CRACKA v0.02/http--www.blackwidow-softbytes.com-.url
Resource
win10v2004-20240426-en
General
-
Target
WC_CRACKA v0.02/YMSG12ENCRYPT.dll
-
Size
88KB
-
MD5
a1ec2d8ee6658551afc14cb14b76d008
-
SHA1
b0878653c569909428178a357c4afc7a3e9c8c9c
-
SHA256
8345aef1ef0fe0127ca4a0fa16ef7d0305877f1919fe43c9a98624d2019af2da
-
SHA512
65d3e8f4b524fc0fa3de827386e2d8e7a37c2c738f5ee4b220c5cf07463bd5a09dfbff49a6d951aaf9cb1a7051b659164be552d882acec54f16137973fe82d7f
-
SSDEEP
768:xZ7eomeyXwJx5UXFPqhiJOjtZC6uIn3YAlAyQngc69YdQZNV7coGKeX7O:xZmC7UXFCh9PC5jhz+VxG17O
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2100 1816 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1816 2060 rundll32.exe 28 PID 2060 wrote to memory of 1816 2060 rundll32.exe 28 PID 2060 wrote to memory of 1816 2060 rundll32.exe 28 PID 2060 wrote to memory of 1816 2060 rundll32.exe 28 PID 2060 wrote to memory of 1816 2060 rundll32.exe 28 PID 2060 wrote to memory of 1816 2060 rundll32.exe 28 PID 2060 wrote to memory of 1816 2060 rundll32.exe 28 PID 1816 wrote to memory of 2100 1816 rundll32.exe 29 PID 1816 wrote to memory of 2100 1816 rundll32.exe 29 PID 1816 wrote to memory of 2100 1816 rundll32.exe 29 PID 1816 wrote to memory of 2100 1816 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\WC_CRACKA v0.02\YMSG12ENCRYPT.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\WC_CRACKA v0.02\YMSG12ENCRYPT.dll",#12⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 2363⤵
- Program crash
PID:2100
-
-