Analysis
-
max time kernel
37s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:27
Static task
static1
Behavioral task
behavioral1
Sample
SQLi Dumper v8.3.exe
Resource
win7-20231215-en
General
-
Target
SQLi Dumper v8.3.exe
-
Size
7.0MB
-
MD5
d3c358f1785594fb5619cda521b9ff04
-
SHA1
9c4a88b66da3fab2bc1b8fe2d2d4bc12903d7603
-
SHA256
4879007515fc16fd0b22156852f2af0424c947f8cf543f5f4cccf1aed52bc97d
-
SHA512
3ad1c58d7ba5b509ba4dd292ac62efa9e1f8f39660d3b55a5853b15e55ff6a15a3f8c7fed3b6dac4a5a00987e4ef6052829071342edb182916409819e9b21ee8
-
SSDEEP
196608:sDKjAQxVBnZwfZ1l6yYrWOVr62bXfwvZR8T3WkYoZx8n:vjAOVBZwfQWyWAfwaG4Gn
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 1888 SQLi Dumper v8.3.exe 1888 SQLi Dumper v8.3.exe 1888 SQLi Dumper v8.3.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TypedURLs SQLi Dumper v8.3.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main SQLi Dumper v8.3.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1888 SQLi Dumper v8.3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1888 SQLi Dumper v8.3.exe 1888 SQLi Dumper v8.3.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.7MB
MD56990f5076eb51ee135492ba5ba619b72
SHA1a8d4941d4ece23faafa231e53d2a1f34a6dc0302
SHA2566733f1b7daf40076ffe88dc8a88e23181d1ba449d6e5bb36a5325b4353849460
SHA512d1d3ab75a7be7e56116a0ff5d9b98f51ec3fc3ac1056f5ae6c526ef742bd5a209c587389a7ab857b882d656c7e812d684baf3b126b99161b0b8593f5f764c747