File name:

SQLi Dumper v.9.8.2.zip

Full analysis: https://app.any.run/tasks/3195d6a8-cb84-4fd1-a354-33944f572b88
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: December 25, 2018, 10:05:36
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
opendir
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

74905570F4041CFB1E508041222B1B47

SHA1:

E8108FF1E95599CA69B932A7AD92C3B66C5E46A5

SHA256:

3B1B0D2BA1D5DD7A6745852BB8ECE92342477A105A57CDF94503AFFBF9FDD1C0

SSDEEP:

98304:lIVmMKjC/tQ/rnmMVNCW2CaSNucpuHUsfgddapId:lPMK+/E5v5l7+fiYpId

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • SQLi v.9.8.2.exe (PID: 3016)
      • svchost.exe (PID: 3844)
      • ~SQLi_v_9_8_2.exe (PID: 3364)
      • TempSetup.exe (PID: 2944)
      • svchost.exe (PID: 3064)
    • Changes the autorun value in the registry

      • TempSetup.exe (PID: 2944)
  • SUSPICIOUS

    • Creates files in the user directory

      • svchost.exe (PID: 3844)
      • TempSetup.exe (PID: 2944)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2952)
      • TempSetup.exe (PID: 2944)
      • SQLi v.9.8.2.exe (PID: 3016)
      • svchost.exe (PID: 3844)
    • Creates a software uninstall entry

      • svchost.exe (PID: 3844)
    • Creates executable files which already exist in Windows

      • TempSetup.exe (PID: 2944)
      • svchost.exe (PID: 3844)
    • Reads internet explorer settings

      • ~SQLi_v_9_8_2.exe (PID: 3364)
    • Reads Internet Cache Settings

      • ~SQLi_v_9_8_2.exe (PID: 3364)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2018:11:17 11:57:03
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: SQLi Dumper v.9.8.2/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
6
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start winrar.exe sqli v.9.8.2.exe tempsetup.exe ~sqli_v_9_8_2.exe svchost.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2944"C:\Users\admin\AppData\Local\TempSetup.exe" C:\Users\admin\AppData\Local\TempSetup.exe
SQLi v.9.8.2.exe
User:
admin
Company:
Intel Corporation
Integrity Level:
HIGH
Description:
hkcmd Module
Exit code:
0
Version:
8.1.1.7800
Modules
Images
c:\users\admin\appdata\local\tempsetup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2952"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\SQLi Dumper v.9.8.2.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3016"C:\Users\admin\Desktop\SQLi Dumper v.9.8.2\SQLi v.9.8.2.exe" C:\Users\admin\Desktop\SQLi Dumper v.9.8.2\SQLi v.9.8.2.exe
explorer.exe
User:
admin
Company:
SQLi Trush Corp
Integrity Level:
HIGH
Description:
SQLi Dumper v9.8.2
Exit code:
0
Version:
9.8.2.0
Modules
Images
c:\users\admin\desktop\sqli dumper v.9.8.2\sqli v.9.8.2.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3064"C:\Users\admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe" C:\Users\admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe
svchost.exe
User:
admin
Company:
Intel Corporation
Integrity Level:
HIGH
Description:
Host Process for Windows Services
Exit code:
0
Version:
8.1.1.7900
Modules
Images
c:\users\admin\appdata\roaming\microsoft\windows\8.1.7601.17587\svchost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3364"C:\Users\admin\Desktop\SQLi Dumper v.9.8.2\~SQLi_v_9_8_2.exe" C:\Users\admin\Desktop\SQLi Dumper v.9.8.2\~SQLi_v_9_8_2.exe
SQLi v.9.8.2.exe
User:
admin
Company:
SQLi Trush Corp
Integrity Level:
HIGH
Description:
SQLi Dumper v9.8
Exit code:
0
Version:
9.8.0.0
Modules
Images
c:\users\admin\desktop\sqli dumper v.9.8.2\~sqli_v_9_8_2.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3844"C:\Users\admin\AppData\Roaming\Intel Corporation\Intel(R) Common User Interface\8.1.1.7800\svchost.exe" C:\Users\admin\AppData\Roaming\Intel Corporation\Intel(R) Common User Interface\8.1.1.7800\svchost.exe
TempSetup.exe
User:
admin
Company:
Intel Corporation
Integrity Level:
HIGH
Description:
Host Process for Windows Services
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\users\admin\appdata\roaming\intel corporation\intel(r) common user interface\8.1.1.7800\svchost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
1 718
Read events
1 652
Write events
66
Delete events
0

Modification events

(PID) Process:(2952) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2952) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2952) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2952) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\SQLi Dumper v.9.8.2.zip
(PID) Process:(2952) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2952) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2952) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2952) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3016) SQLi v.9.8.2.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3016) SQLi v.9.8.2.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
5
Suspicious files
2
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
2944TempSetup.exeC:\Users\admin\AppData\Roaming\Intel Corporation\Intel(R) Common User Interface\8.1.1.7800\server.zip
MD5:
SHA256:
3844svchost.exeC:\Users\admin\AppData\Local\Temp\$inst\temp_0.tmp
MD5:
SHA256:
3016SQLi v.9.8.2.exeC:\Users\admin\AppData\Local\TempSetup.exeexecutable
MD5:
SHA256:
2952WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2952.36245\SQLi Dumper v.9.8.2\DIC\dic_admin.txttext
MD5:F4675FA366AAE47396F8CFB2F3EB1B9A
SHA256:826FBBAA5DE45C1238FC7B9F4436C1B87444F8103F4F65180F8547E3F271A413
2952WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2952.36245\SQLi Dumper v.9.8.2\SQLi v.9.8.2.exeexecutable
MD5:FEC5156D1A8A0D023E835403FCE004D9
SHA256:008EB1BDD700BC0638FC63CEA71E3A8EF8730AFD9E25C5CE24DCBDDF811D8F66
2952WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2952.36245\SQLi Dumper v.9.8.2\GeoIP.datbinary
MD5:CB9AD69965F9F4CFF8572983F60BE67C
SHA256:56C7079DC309168D9C41DD4A7A61033ACD264A120CA8D2E2182ABB5B9AE6B0A3
2952WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2952.36245\SQLi Dumper v.9.8.2\Settingsxml
MD5:6CADCD28429156CBC1D77447BBDDDF42
SHA256:88AD0488FE62D131F1CA29A7DE9470038E436F33F76CE1A83D6B41BDF3DC6C7C
2944TempSetup.exeC:\Users\admin\AppData\Roaming\Intel Corporation\Intel(R) Common User Interface\8.1.1.7800\svchost.exeexecutable
MD5:
SHA256:
3844svchost.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exeexecutable
MD5:
SHA256:
2952WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2952.36245\SQLi Dumper v.9.8.2\DIC\dic_file_dump.txttext
MD5:351CACFFC2884FCD4E69BB1FB04DDEB5
SHA256:C67BCC0B4ED5E5EF72AA1134C0838D9201A97C2BF462FDFF0AC9052A53B286A2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
2
DNS requests
4
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3364
~SQLi_v_9_8_2.exe
GET
404
104.20.209.21:80
http://pastebin.com/raw/3vsJLpWu
US
xml
345 b
malicious
3064
svchost.exe
GET
404
198.143.149.5:80
http://goldenshoponline.us/1/explorer.txt
US
xml
345 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3364
~SQLi_v_9_8_2.exe
104.20.209.21:80
pastebin.com
Cloudflare Inc
US
shared
3064
svchost.exe
198.143.149.5:80
goldenshoponline.us
SingleHop, Inc.
US
suspicious

DNS requests

Domain
IP
Reputation
pastebin.com
  • 104.20.209.21
  • 104.20.208.21
malicious
goldenshoponline.us
  • 198.143.149.5
malicious
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
3364
~SQLi_v_9_8_2.exe
Misc activity
SUSPICIOUS [PTsecurity] Minimal HTTP Header for Request to Pastebin
2 ETPRO signatures available at the full report
No debug info