Overview
overview
3Static
static
3WC_CRACKA ...32.dll
windows7-x64
1WC_CRACKA ...32.dll
windows10-2004-x64
1WC_CRACKA ...V3.dll
windows7-x64
1WC_CRACKA ...V3.dll
windows10-2004-x64
1WC_CRACKA ...02.exe
windows7-x64
1WC_CRACKA ...02.exe
windows10-2004-x64
1WC_CRACKA ...PT.dll
windows7-x64
3WC_CRACKA ...PT.dll
windows10-2004-x64
3WC_CRACKA ...m-.url
windows7-x64
1WC_CRACKA ...m-.url
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 23:07
Static task
static1
Behavioral task
behavioral1
Sample
WC_CRACKA v0.02/COMDLG32.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
WC_CRACKA v0.02/COMDLG32.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
WC_CRACKA v0.02/QSOCKSV3.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
WC_CRACKA v0.02/QSOCKSV3.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
WC_CRACKA v0.02/WC_CRACKAV002.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
WC_CRACKA v0.02/WC_CRACKAV002.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
WC_CRACKA v0.02/YMSG12ENCRYPT.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
WC_CRACKA v0.02/YMSG12ENCRYPT.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
WC_CRACKA v0.02/http--www.blackwidow-softbytes.com-.url
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
WC_CRACKA v0.02/http--www.blackwidow-softbytes.com-.url
Resource
win10v2004-20240426-en
General
-
Target
WC_CRACKA v0.02/YMSG12ENCRYPT.dll
-
Size
88KB
-
MD5
a1ec2d8ee6658551afc14cb14b76d008
-
SHA1
b0878653c569909428178a357c4afc7a3e9c8c9c
-
SHA256
8345aef1ef0fe0127ca4a0fa16ef7d0305877f1919fe43c9a98624d2019af2da
-
SHA512
65d3e8f4b524fc0fa3de827386e2d8e7a37c2c738f5ee4b220c5cf07463bd5a09dfbff49a6d951aaf9cb1a7051b659164be552d882acec54f16137973fe82d7f
-
SSDEEP
768:xZ7eomeyXwJx5UXFPqhiJOjtZC6uIn3YAlAyQngc69YdQZNV7coGKeX7O:xZmC7UXFCh9PC5jhz+VxG17O
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4180 3176 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3480 wrote to memory of 3176 3480 rundll32.exe 83 PID 3480 wrote to memory of 3176 3480 rundll32.exe 83 PID 3480 wrote to memory of 3176 3480 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\WC_CRACKA v0.02\YMSG12ENCRYPT.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\WC_CRACKA v0.02\YMSG12ENCRYPT.dll",#12⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 6203⤵
- Program crash
PID:4180
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 3176 -ip 31761⤵PID:1592