File name:

SQLi Dumper v10.3.zip

Full analysis: https://app.any.run/tasks/d9d2f936-6d5f-4a58-9e2f-116e53301123
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: October 02, 2021, 17:36:37
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

4D5967D9EA97DA3B839B5E5BC92C654B

SHA1:

411F322D078441881F956178FE414A8A1D668D55

SHA256:

14B9D5D8F144FF98AE61215FDE38B09CD447AE6386B27DFCA976CE3CE6C532DF

SSDEEP:

98304:0jcqEF7+fP/l8nz5jDP9+dEBLN0Iu8XKBL/RArFFJwFByqY70TfKY6ryHD49f7S2:d7+HCnNjDNB6QKBRsWFBLozJpS2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 2992)
    • Drops executable file immediately after starts

      • SQLi Dumper v.10.3.exe (PID: 240)
      • Setup.exe (PID: 2488)
    • Actions looks like stealing of personal data

      • SQLi Dumper v.10.3.exe (PID: 240)
    • Application was dropped or rewritten from another process

      • SQLi Dumper v.10.3.exe (PID: 240)
      • svchost.exe (PID: 3484)
      • svchost.exe (PID: 3456)
      • Setup.exe (PID: 2488)
      • Setup.exe (PID: 2788)
      • explorer.exe (PID: 912)
      • explorer.exe (PID: 3260)
      • svchost.exe (PID: 1104)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 2964)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 3280)
    • Connects to CnC server

      • svchost.exe (PID: 3484)
      • svchost.exe (PID: 3456)
      • svchost.exe (PID: 1104)
    • Changes the autorun value in the registry

      • explorer.exe (PID: 3260)
  • SUSPICIOUS

    • Checks supported languages

      • WinRAR.exe (PID: 1784)
      • SQLi Dumper v.10.3.exe (PID: 240)
      • Setup.exe (PID: 2488)
      • Setup.exe (PID: 2788)
      • cmd.exe (PID: 2964)
      • svchost.exe (PID: 3456)
      • svchost.exe (PID: 3484)
      • explorer.exe (PID: 912)
      • explorer.exe (PID: 3260)
      • svchost.exe (PID: 1104)
    • Reads the computer name

      • WinRAR.exe (PID: 1784)
      • SQLi Dumper v.10.3.exe (PID: 240)
      • Setup.exe (PID: 2488)
      • Setup.exe (PID: 2788)
      • svchost.exe (PID: 3484)
      • svchost.exe (PID: 3456)
      • explorer.exe (PID: 912)
      • explorer.exe (PID: 3260)
      • svchost.exe (PID: 1104)
    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 1784)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1784)
      • SQLi Dumper v.10.3.exe (PID: 240)
      • Setup.exe (PID: 2488)
      • svchost.exe (PID: 3456)
      • explorer.exe (PID: 912)
    • Creates executable files which already exist in Windows

      • Setup.exe (PID: 2488)
      • svchost.exe (PID: 3456)
      • explorer.exe (PID: 912)
    • Creates files in the user directory

      • Setup.exe (PID: 2488)
      • explorer.exe (PID: 912)
    • Starts CMD.EXE for commands execution

      • Setup.exe (PID: 2488)
    • Reads Environment values

      • svchost.exe (PID: 3484)
      • svchost.exe (PID: 3456)
      • netsh.exe (PID: 3564)
      • explorer.exe (PID: 3260)
      • svchost.exe (PID: 1104)
    • Starts itself from another location

      • explorer.exe (PID: 912)
    • Uses NETSH.EXE for network configuration

      • explorer.exe (PID: 3260)
    • Executed via Task Scheduler

      • svchost.exe (PID: 1104)
  • INFO

    • Manual execution by user

      • SQLi Dumper v.10.3.exe (PID: 240)
    • Reads the computer name

      • schtasks.exe (PID: 3280)
      • netsh.exe (PID: 3564)
    • Checks supported languages

      • schtasks.exe (PID: 3280)
      • netsh.exe (PID: 3564)
    • Reads settings of System Certificates

      • svchost.exe (PID: 3456)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: TXT/
ZipUncompressedSize: -
ZipCompressedSize: -
ZipCRC: 0x00000000
ZipModifyDate: 2021:07:19 00:38:11
ZipCompression: None
ZipBitFlag: -
ZipRequiredVersion: 10
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
13
Malicious processes
5
Suspicious processes
4

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start winrar.exe searchprotocolhost.exe no specs sqli dumper v.10.3.exe setup.exe setup.exe no specs cmd.exe no specs schtasks.exe no specs svchost.exe svchost.exe explorer.exe explorer.exe netsh.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
240"C:\Users\admin\Desktop\SQLi Dumper v.10.3.exe" C:\Users\admin\Desktop\SQLi Dumper v.10.3.exe
Explorer.EXE
User:
admin
Company:
fLaSh
Integrity Level:
MEDIUM
Description:
SQLi Dumper
Exit code:
0
Version:
10.1.0.0
Modules
Images
c:\users\admin\desktop\sqli dumper v.10.3.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
912"C:\Users\admin\AppData\Local\Temp\explorer.exe" C:\Users\admin\AppData\Local\Temp\explorer.exe
svchost.exe
User:
admin
Company:
Intel Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7800.8900
Modules
Images
c:\users\admin\appdata\local\temp\explorer.exe
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1104C:\Users\admin\AppData\Roaming\Microsoft\Windows\svchost.exe C:\Users\admin\AppData\Roaming\Microsoft\Windows\svchost.exe
taskeng.exe
User:
admin
Company:
Intel Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Exit code:
0
Version:
8.1.1.7900
Modules
Images
c:\users\admin\appdata\roaming\microsoft\windows\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1784"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\SQLi Dumper v10.3.zip"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2488"C:\Users\admin\AppData\Local\Temp\Setup.exe" C:\Users\admin\AppData\Local\Temp\Setup.exe
SQLi Dumper v.10.3.exe
User:
admin
Company:
Intel Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\sechost.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
2788"C:\Users\admin\AppData\Local\Temp\Setup.exe" C:\Users\admin\AppData\Local\Temp\Setup.exeSQLi Dumper v.10.3.exe
User:
admin
Company:
Intel Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\rpcrt4.dll
2964"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn Security /tr C:\Users\admin\AppData\Roaming\Microsoft\Windows\svchost.exeC:\Windows\System32\cmd.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\cmd.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2992"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe5_ Global\UsGthrCtrlFltPipeMssGthrPipe5 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3260"C:\Users\admin\AppData\Roaming\Microsoft\Windows\explorer.exe" C:\Users\admin\AppData\Roaming\Microsoft\Windows\explorer.exe
explorer.exe
User:
admin
Company:
Intel Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7800.8900
Modules
Images
c:\users\admin\appdata\roaming\microsoft\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3280schtasks /create /sc minute /mo 1 /tn Security /tr C:\Users\admin\AppData\Roaming\Microsoft\Windows\svchost.exeC:\Windows\system32\schtasks.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
Total events
11 153
Read events
10 944
Write events
209
Delete events
0

Modification events

(PID) Process:(1784) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1784) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1784) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1784) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(1784) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\SQLi Dumper v10.3.zip
(PID) Process:(1784) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1784) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1784) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1784) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1784) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:@C:\Windows\System32\msxml3r.dll,-1
Value:
XML Document
Executable files
8
Suspicious files
0
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
1784WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1784.41080\SQLi Dumper v.10.3.exeexecutable
MD5:
SHA256:
1784WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1784.41080\LNG\English.xmlxml
MD5:E932EA4DD931CD9039EC0CEA098DDF85
SHA256:E4284B97BE769C04F1E49DD649F7116D364D72EAC74443A7CD2C46C13220D06B
1784WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1784.41080\Settings.xmlxml
MD5:75A5096A8D55E17102DF4580D915D6EE
SHA256:84EF09FA32AA6C8E1171ED02EF98B2F3FCB64BDA620E74BCBC9B4B4969038457
1784WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1784.41080\TXT\DicLoginFinder.txttext
MD5:AE4118C172D58469E180E5D0F74C2C2B
SHA256:2631153A5617725015F19817374985DCBD1E649F9F5D633269239C78639DB7B0
1784WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1784.41080\LNG\Portuguese.xmlxml
MD5:E1B7540D846CA89F57DE64305B94DBC9
SHA256:F6CDC1E33C9F9637B56FDAAB6AD47C8E72E9F384A9CFC9C2B356825C62531DCB
1784WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1784.41080\SkinSoft.VisualStyler.dllexecutable
MD5:D93366374B57B5A0FE3A1A8A1CA95F78
SHA256:14F231441DAD16EF046AB97415C33195056A61B0240D7D890971E5F626068925
1784WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1784.41080\LNG\French.xmlxml
MD5:A46FDB87ECF4E654CAC6348C542A6D2C
SHA256:A4A5086AB9BFC8755F199B0F1C80F70EBF660768D031727BF71A624FBF99D2D9
1784WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1784.41080\LNG\Persian.xmlxml
MD5:6BDC041287825A04B67895BB9111806C
SHA256:B947F3E9558296EEAEE767FFBF1CE4270DEFF8DBA8BC57EF648E1E86A1D55FB3
1784WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1784.41080\LNG\German.xmlxml
MD5:4A25B19B26DEF334C719E8D543F23486
SHA256:97BB355062589C2C89E139E8174B71A15FBE89F10E2C72DE1489AD3B9B035B91
1784WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1784.41080\LNG\Russian.xmlxml
MD5:4C3341A7BFC47F68E779A50F9E669900
SHA256:72515A8F2B7A29FC06E3A8FFD28D3D0DEA9E98D00CD9EB7B941703F7A3AFAB3E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
40
DNS requests
4
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3484
svchost.exe
GET
200
108.179.232.14:80
http://hosting.freetoolss.com/1/explorer.txt
US
text
42 b
malicious
1104
svchost.exe
GET
200
108.179.232.14:80
http://hosting.freetoolss.com/1/explorer.txt
US
text
42 b
malicious
3456
svchost.exe
GET
200
108.179.232.14:80
http://hosting.freetoolss.com/1/explorer.txt
US
text
42 b
malicious
3456
svchost.exe
GET
200
108.179.232.14:80
http://hosting.freetoolss.com/1/explorer.txt
US
text
42 b
malicious
3456
svchost.exe
GET
200
108.179.232.14:80
http://hosting.freetoolss.com/1/explorer.txt
US
text
42 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
108.179.232.14:80
hosting.freetoolss.com
CyrusOne LLC
US
malicious
3456
svchost.exe
108.179.232.14:80
hosting.freetoolss.com
CyrusOne LLC
US
malicious
3456
svchost.exe
142.250.186.129:443
shoponline123456789.blogspot.com
Google Inc.
US
whitelisted
147.135.21.144:1000
blog.freetoolss.com
OVH SAS
US
malicious
1104
svchost.exe
108.179.232.14:80
hosting.freetoolss.com
CyrusOne LLC
US
malicious
3260
explorer.exe
147.135.21.144:1000
blog.freetoolss.com
OVH SAS
US
malicious

DNS requests

Domain
IP
Reputation
hosting.freetoolss.com
  • 108.179.232.14
malicious
shoponline123456789.blogspot.com
  • 142.250.186.129
whitelisted
blog.freetoolss.com
  • 147.135.21.144
malicious

Threats

Found threats are available for the paid subscriptions
6 ETPRO signatures available at the full report
No debug info