analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

SQLi Dumper v.8.0.rar

Full analysis: https://app.any.run/tasks/c6e243e0-8dab-491d-b297-4ca8298f0bdd
Verdict: Malicious activity
Analysis date: April 15, 2019, 02:32:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32
MD5:

A248BED1A043BE09D6A39C2429DEEDD4

SHA1:

41F83A7D85D1BDC1E5A42B9F50D6D1D309D86CD1

SHA256:

97A35FE7953EC05C1AE408F6F3CE19286987D9887FFCE114A8E33AEB82471ED6

SSDEEP:

98304:/uYeOJic6BUfmfZaRqv1Eod8+N6jqnrmjyJH7vIdYWSJG:/uJK6BQmagEP+NmWXxs

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • SQLi Dumper v.8.0.exe (PID: 1628)
      • SQLi ask v.8.0.exe (PID: 3804)
      • SQLi Dumper v.8.0.exe (PID: 3156)
    • Changes the autorun value in the registry

      • SQLi Dumper v.8.0.exe (PID: 3156)
    • Changes settings of System certificates

      • SQLi ask v.8.0.exe (PID: 3804)
  • SUSPICIOUS

    • Creates files in the program directory

      • SQLi Dumper v.8.0.exe (PID: 3156)
    • Executable content was dropped or overwritten

      • SQLi Dumper v.8.0.exe (PID: 3156)
      • WinRAR.exe (PID: 3024)
    • Reads internet explorer settings

      • SQLi ask v.8.0.exe (PID: 3804)
    • Adds / modifies Windows certificates

      • SQLi ask v.8.0.exe (PID: 3804)
  • INFO

    • Reads settings of System Certificates

      • SQLi ask v.8.0.exe (PID: 3804)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

ArchivedFileName: SQLi Dumper v.8.0.exe
PackingMethod: Normal
ModifyDate: 2015:04:18 00:08:19
OperatingSystem: Win32
UncompressedSize: 4200448
CompressedSize: 1875715
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start winrar.exe sqli dumper v.8.0.exe no specs sqli dumper v.8.0.exe sqli ask v.8.0.exe

Process information

PID
CMD
Path
Indicators
Parent process
3024"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\SQLi Dumper v.8.0.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1628"C:\Users\admin\AppData\Local\Temp\Rar$EXa3024.8675\SQLi Dumper v.8.0.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3024.8675\SQLi Dumper v.8.0.exeWinRAR.exe
User:
admin
Company:
SQLi Dumper v.8.0
Integrity Level:
MEDIUM
Description:
SQLi Dumper v.8.0
Exit code:
3221226540
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3024.8675\sqli dumper v.8.0.exe
c:\systemroot\system32\ntdll.dll
3156"C:\Users\admin\AppData\Local\Temp\Rar$EXa3024.8675\SQLi Dumper v.8.0.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3024.8675\SQLi Dumper v.8.0.exe
WinRAR.exe
User:
admin
Company:
SQLi Dumper v.8.0
Integrity Level:
HIGH
Description:
SQLi Dumper v.8.0
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3024.8675\sqli dumper v.8.0.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3804"C:\Users\admin\AppData\Local\Temp\Rar$EXa3024.8675\SQLi ask v.8.0\SQLi ask v.8.0.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3024.8675\SQLi ask v.8.0\SQLi ask v.8.0.exe
SQLi Dumper v.8.0.exe
User:
admin
Company:
Integrity Level:
HIGH
Description:
SQLi Dumper
Version:
7.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3024.8675\sqli ask v.8.0\sqli ask v.8.0.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
966
Read events
918
Write events
48
Delete events
0

Modification events

(PID) Process:(3024) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3024) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3024) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3024) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\SQLi Dumper v.8.0.rar
(PID) Process:(3024) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3024) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3024) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3024) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3024) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3024) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
5
Suspicious files
2
Text files
7
Unknown types
2

Dropped files

PID
Process
Filename
Type
3156SQLi Dumper v.8.0.exeC:\Program Files\Mozilla Firefox\Ask Toolbar Firefox.lnklnk
MD5:8F799D1F778F73D0800828C41D9D1C60
SHA256:2ABE97BF9D478EB55DCBE32A0FA88B72F1A19D84504808A14F2CBDF0511F7B50
3024WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3024.8675\SQLi ask v.8.0\Settingsxml
MD5:1B17DE3CE85D92D0DE568556A87227F8
SHA256:88AB60C265A2966766B7D914A2E57D36023877EB24EA86DEB1EB4600D9AE4FE7
3156SQLi Dumper v.8.0.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3024.8675\SQLi ask v.8.0\ErrLog.txttext
MD5:F9103C4A4C8B9D1207558867E5E02426
SHA256:22506505FB138E35B712A7DB37D8342BEDD87E6D568A576399294CD79144B5E4
3156SQLi Dumper v.8.0.exeC:\Program Files\Google\Chrome\Application\Ask Toolbar Chrome.lnklnk
MD5:5ACEDCBC1559513BD85DF3D108302605
SHA256:F42DF2B0199D1FAC003AD23B02D92E04ACD49EE3FDBF2A917AC835ABC6990D5C
3024WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3024.8675\SQLi Dumper v.8.0.exeexecutable
MD5:925FBFF2922B4C3DB86D74081DA16042
SHA256:ADA3F7924E51055E0D27EF17BC78D8AC7898A89487C29ACB25985F1B3E975E47
3156SQLi Dumper v.8.0.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3024.8675\SQLi ask v.8.0\Settingsxml
MD5:1B17DE3CE85D92D0DE568556A87227F8
SHA256:88AB60C265A2966766B7D914A2E57D36023877EB24EA86DEB1EB4600D9AE4FE7
3156SQLi Dumper v.8.0.exeC:\Program Files\Google\Chrome\Application\Ask Toolbar Chrome.exeexecutable
MD5:64E1AFA6FB8E0223CBA7E91BBE98900C
SHA256:E4536059749871614ABC0970FFC4910483AECE65563E37EA3F6E2EF91F74E8B5
3024WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3024.8675\SQLi ask v.8.0\Settings.xmlxml
MD5:B7497045CF6DE20131B3CB512A310480
SHA256:27F668F0265A280657A47D3FBFAB80BA6B13C0BDB0CBCEDD65E8B43B9F8A5B10
3024WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3024.8675\SQLi ask v.8.0\ErrLog.txttext
MD5:F9103C4A4C8B9D1207558867E5E02426
SHA256:22506505FB138E35B712A7DB37D8342BEDD87E6D568A576399294CD79144B5E4
3156SQLi Dumper v.8.0.exeC:\Program Files\Mozilla Firefox\Ask Toolbar Firefox.exeexecutable
MD5:64E1AFA6FB8E0223CBA7E91BBE98900C
SHA256:E4536059749871614ABC0970FFC4910483AECE65563E37EA3F6E2EF91F74E8B5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
109
TCP/UDP connections
60
DNS requests
10
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3804
SQLi ask v.8.0.exe
GET
301
151.101.2.114:80
http://www.ask.com/web?q=%3fitem_id%3d
US
whitelisted
3804
SQLi ask v.8.0.exe
GET
504
52.17.173.115:80
http://www.webcrawler.com/search/web?q=%3fitem_id%3d
IE
whitelisted
3804
SQLi ask v.8.0.exe
GET
302
2.18.232.251:80
http://search.mywebsearch.com/mywebsearch/GGmain.jhtml?searchfor=%3fitem_id%3d
unknown
whitelisted
3804
SQLi ask v.8.0.exe
GET
200
213.13.145.10:80
http://pesquisa.sapo.pt/?q=%3fitem_id%3d
PT
xml
17.8 Kb
malicious
3804
SQLi ask v.8.0.exe
GET
151.101.2.114:80
http://www.ask.com/web?q=%3fitem_id%3d
US
whitelisted
3804
SQLi ask v.8.0.exe
GET
200
2.18.232.251:80
http://search.mywebsearch.com/assets/accessdenied/default.htm
unknown
html
550 b
whitelisted
3804
SQLi ask v.8.0.exe
GET
200
213.180.204.62:80
http://www.yandex.com/showcaptcha?cc=1&retpath=http%3A//www.yandex.com/yandsearch%3Ftext%3Darticle%2B%253fid%253d_bafab230d87f794ce18359f6665d2099&t=0/1555295622/fa08dbcebc25147c4138abb5512556de&s=51d07f4fe65eaf24a8ae155a388466d6
RU
html
14.6 Kb
whitelisted
3804
SQLi ask v.8.0.exe
GET
200
204.79.197.200:80
http://www.bing.com/search?q=%3fitem_id%3d&first=50&count=50
US
html
110 Kb
whitelisted
3804
SQLi ask v.8.0.exe
GET
200
204.79.197.200:80
http://www.bing.com/search?q=%3fitem_id%3d&count=50
US
html
110 Kb
whitelisted
3804
SQLi ask v.8.0.exe
GET
301
212.82.100.137:80
http://www.wow.com/search?q=%3fitem_id%3d
CH
text
25 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3804
SQLi ask v.8.0.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3804
SQLi ask v.8.0.exe
212.82.100.137:80
www.wow.com
Yahoo! UK Services Limited
CH
shared
3804
SQLi ask v.8.0.exe
151.101.2.114:80
www.ask.com
Fastly
US
suspicious
3804
SQLi ask v.8.0.exe
2.18.232.251:80
search.mywebsearch.com
Akamai International B.V.
whitelisted
3804
SQLi ask v.8.0.exe
216.58.205.228:443
www.google.com
Google Inc.
US
whitelisted
3804
SQLi ask v.8.0.exe
213.180.204.62:80
www.yandex.com
YANDEX LLC
RU
whitelisted
3804
SQLi ask v.8.0.exe
213.13.145.10:80
pesquisa.sapo.pt
Servicos De Comunicacoes E Multimedia S.A.
PT
malicious
3804
SQLi ask v.8.0.exe
52.17.173.115:80
www.webcrawler.com
Amazon.com, Inc.
IE
unknown
151.101.2.114:443
www.ask.com
Fastly
US
suspicious
3804
SQLi ask v.8.0.exe
151.101.2.114:443
www.ask.com
Fastly
US
suspicious

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
search.mywebsearch.com
  • 2.18.232.251
whitelisted
www.google.com
  • 216.58.205.228
whitelisted
www.yandex.com
  • 213.180.204.62
whitelisted
www.wow.com
  • 212.82.100.137
whitelisted
pesquisa.sapo.pt
  • 213.13.145.10
malicious
search.aol.com
  • 212.82.100.137
whitelisted
www.webcrawler.com
  • 52.17.173.115
  • 34.241.67.236
  • 63.33.80.171
whitelisted
www.ask.com
  • 151.101.2.114
  • 151.101.66.114
  • 151.101.130.114
  • 151.101.194.114
whitelisted
search.yahoo.com
  • 212.82.100.137
whitelisted

Threats

No threats detected
No debug info