Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
SQLi Dumper v8.3.exe
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
SQLi Dumper v8.3.exe
-
Size
7.0MB
-
MD5
d3c358f1785594fb5619cda521b9ff04
-
SHA1
9c4a88b66da3fab2bc1b8fe2d2d4bc12903d7603
-
SHA256
4879007515fc16fd0b22156852f2af0424c947f8cf543f5f4cccf1aed52bc97d
-
SHA512
3ad1c58d7ba5b509ba4dd292ac62efa9e1f8f39660d3b55a5853b15e55ff6a15a3f8c7fed3b6dac4a5a00987e4ef6052829071342edb182916409819e9b21ee8
-
SSDEEP
196608:sDKjAQxVBnZwfZ1l6yYrWOVr62bXfwvZR8T3WkYoZx8n:vjAOVBZwfQWyWAfwaG4Gn
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini SQLi Dumper v8.3.exe File opened for modification C:\Windows\assembly\Desktop.ini SQLi Dumper v8.3.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini SQLi Dumper v8.3.exe File opened for modification C:\Windows\assembly\Desktop.ini SQLi Dumper v8.3.exe File opened for modification C:\Windows\assembly SQLi Dumper v8.3.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5104 1992 WerFault.exe 86 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 436 dw20.exe Token: SeBackupPrivilege 436 dw20.exe Token: SeBackupPrivilege 436 dw20.exe Token: SeBackupPrivilege 436 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1992 wrote to memory of 436 1992 SQLi Dumper v8.3.exe 92 PID 1992 wrote to memory of 436 1992 SQLi Dumper v8.3.exe 92 PID 1992 wrote to memory of 436 1992 SQLi Dumper v8.3.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\SQLi Dumper v8.3.exe"C:\Users\Admin\AppData\Local\Temp\SQLi Dumper v8.3.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 12882⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 14282⤵
- Program crash
PID:5104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1992 -ip 19921⤵PID:4032