Analysis

  • max time kernel
    146s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 15:43

General

  • Target

    SQLi Dumper v.9.7 [Cracked By PC-RET].exe

  • Size

    3.0MB

  • MD5

    1f121b5cd0526ce9b1a3ddf3414693c0

  • SHA1

    1091a21b1cbb670e9a9a3c7add5239e53659159e

  • SHA256

    ef2cdcef2ad200acb11aa28ff753ac53bad2559e01b4c15022ce0265dc1107b8

  • SHA512

    ea044a01a4f29a2f76626c4f2680ce26d9f4b7453d557c95604305854969a2caa0f029bdc832984851978a8c156bee879589d80e46951a1844fb3180467a073b

  • SSDEEP

    49152:XTH0TmAiumuCcLeYomvrveaULQ0Gi1ltdpEPU4aZn:XTH0TmAiumuC7YvrveaeQdYTniU/

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SQLi Dumper v.9.7 [Cracked By PC-RET].exe
    "C:\Users\Admin\AppData\Local\Temp\SQLi Dumper v.9.7 [Cracked By PC-RET].exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://bhf.io/
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2500
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba0ad46f8,0x7ffba0ad4708,0x7ffba0ad4718
        3⤵
          PID:3868
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1784,11449111978821531689,5980795091265295384,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:2
          3⤵
            PID:5116
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1784,11449111978821531689,5980795091265295384,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:5992
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1784,11449111978821531689,5980795091265295384,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:8
            3⤵
              PID:1100
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1784,11449111978821531689,5980795091265295384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
              3⤵
                PID:3968
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1784,11449111978821531689,5980795091265295384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:1
                3⤵
                  PID:2988
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1784,11449111978821531689,5980795091265295384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:1
                  3⤵
                    PID:5944
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1784,11449111978821531689,5980795091265295384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:1
                    3⤵
                      PID:1460
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1784,11449111978821531689,5980795091265295384,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4140 /prefetch:8
                      3⤵
                        PID:4152
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1784,11449111978821531689,5980795091265295384,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4140 /prefetch:8
                        3⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4572
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1784,11449111978821531689,5980795091265295384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:1
                        3⤵
                          PID:4740
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1784,11449111978821531689,5980795091265295384,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:1
                          3⤵
                            PID:5880
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1784,11449111978821531689,5980795091265295384,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:1
                            3⤵
                              PID:5664
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1784,11449111978821531689,5980795091265295384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:1
                              3⤵
                                PID:4652
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1784,11449111978821531689,5980795091265295384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2096 /prefetch:1
                                3⤵
                                  PID:1796
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1784,11449111978821531689,5980795091265295384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:1
                                  3⤵
                                    PID:6052
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1784,11449111978821531689,5980795091265295384,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1964 /prefetch:2
                                    3⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2632
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:64
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:2168

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    b704c9ca0493bd4548ac9c69dc4a4f27

                                    SHA1

                                    a3e5e54e630dabe55ca18a798d9f5681e0620ba7

                                    SHA256

                                    2ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411

                                    SHA512

                                    69c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    477462b6ad8eaaf8d38f5e3a4daf17b0

                                    SHA1

                                    86174e670c44767c08a39cc2a53c09c318326201

                                    SHA256

                                    e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d

                                    SHA512

                                    a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    bbc0c985e12dad0577eda2ae26937dc3

                                    SHA1

                                    569fbe7bfe6ea89a6c200dcba779ea22b19c7497

                                    SHA256

                                    a5aa74a6733fdddc9f0898d926555083ea270cf405faa4117ccc66fcaa135bab

                                    SHA512

                                    c700a565db0df970bae9100ba7d45ccd947dcb916428767af596f6da46ee711473424c31b987c0f698b40e01c59eaa200287e3f048a023a972cc2d540962f24b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    fb5afe23cb653bcb9a04c3908cbdc852

                                    SHA1

                                    8564e30e80ba2e2115619a001b913a07059c5a09

                                    SHA256

                                    0ad07b406f6954c97c0319dbf2b78d8e4b8593a6a64a46b384206ccaa2f7730e

                                    SHA512

                                    e79aeab563492ff8e35e44e2d8c2999437a80b263b828585407357bcb6bf93d56856087b786fb854208ed62621260636729e5a54b54a3aae4a25f89b45fc823f

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    350a7e6a61a21134c2b6461956f4af29

                                    SHA1

                                    ff80396e420eaa4448cb5a38d7dffa3e4eaae531

                                    SHA256

                                    c40e533b4def88035e10f9165665606b5e78e382420b41002a54257ef6cc02e9

                                    SHA512

                                    899cef987384394556be7dc1ada5309d051904f6920173c962229185988f42c1f2f0278121980651df58976a986364f701606b29bff0bc481f4d3a0dbd4bee6e

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    5ff4c58703f3558b947b3f05d8f3ff0d

                                    SHA1

                                    947d5399143b3c71afda6267bcdd2edbd7d620b8

                                    SHA256

                                    868570fa24312baec8740650b8c2a41a5982abafefc35d9a9dc7a6c50c67e095

                                    SHA512

                                    25540207c552755ecec76381c44ce7e119dbdf9854af199080e2257338bc6ab6bb113d84a4e0cb9f5a51d50e3ca8bc2f1e44a412d1b608dc6d06b3052796ff4e

                                  • C:\Users\Admin\AppData\Local\SkinSoft\VisualStyler\2.4.0.0\x64\ssapihook.dll

                                    Filesize

                                    67KB

                                    MD5

                                    8b003c3f98f8d08968ac5d3c1cc90a60

                                    SHA1

                                    68f8d418638a81839a2ad665909916cda8efe625

                                    SHA256

                                    d52a9c53f510237a194211aa3dc7d0f22f80fcc0593d9d77e0827ba6681b47e9

                                    SHA512

                                    429e97c74b8e45a43d09618972f04ba46a8075867a631543eb7b7cbbb55a719cbe2e0412f3b63b989741e3807d733b2a6f3ecb735278adc5e734e18e297c4015

                                  • memory/1140-46-0x00007FFB42A50000-0x00007FFB42A51000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1140-52-0x00007FFB42A40000-0x00007FFB42A41000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1140-41-0x00007FFB429C0000-0x00007FFB429C1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1140-42-0x00007FFB429B0000-0x00007FFB429B1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1140-43-0x00007FFB41940000-0x00007FFB41941000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1140-44-0x00007FFB429D0000-0x00007FFB429D1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1140-45-0x00007FFB429E0000-0x00007FFB429E1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1140-0-0x00007FFBA5743000-0x00007FFBA5745000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1140-47-0x00007FFB429F0000-0x00007FFB429F1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1140-48-0x00007FFB42A00000-0x00007FFB42A01000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1140-49-0x00007FFB42A20000-0x00007FFB42A21000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1140-50-0x00007FFB42A30000-0x00007FFB42A31000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1140-51-0x00007FFB42A10000-0x00007FFB42A11000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1140-27-0x000001E969D10000-0x000001E969E12000-memory.dmp

                                    Filesize

                                    1.0MB

                                  • memory/1140-54-0x00007FFB3ED30000-0x00007FFB3ED31000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1140-53-0x00007FFB42A60000-0x00007FFB42A61000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1140-55-0x00007FFB3ED80000-0x00007FFB3ED81000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1140-57-0x00007FFB3ED90000-0x00007FFB3ED91000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1140-56-0x00007FFB3ED40000-0x00007FFB3ED41000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1140-15-0x00007FFBA5740000-0x00007FFBA6201000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1140-14-0x000001E968180000-0x000001E9689D5000-memory.dmp

                                    Filesize

                                    8.3MB

                                  • memory/1140-7-0x00007FFBA5740000-0x00007FFBA6201000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1140-89-0x00007FFBA5743000-0x00007FFBA5745000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1140-1-0x000001E94D7E0000-0x000001E94DADC000-memory.dmp

                                    Filesize

                                    3.0MB

                                  • memory/1140-108-0x00007FFBA5740000-0x00007FFBA6201000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1140-109-0x00007FFBA5740000-0x00007FFBA6201000-memory.dmp

                                    Filesize

                                    10.8MB