Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
22/08/2024, 20:08
Behavioral task
behavioral1
Sample
SQLi_Dumper/ChilkatDotNet2.dll
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
SQLi_Dumper/ControlsGui.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
SQLi_Dumper/SQli-Dumper-cleaned.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
SQLi_Dumper/TXT/SQLi Dumper-cleaned.exe
Resource
win11-20240802-en
General
-
Target
SQLi_Dumper/ControlsGui.dll
-
Size
125KB
-
MD5
daab531d4c889ed79ddbd336d372eb40
-
SHA1
15abe481b84e247e7afa730b8c2cbc3ad48d4f94
-
SHA256
69310937c7635b9ffc67d65e33e56ee3ab54074327c7dbf971ab1b25810c45d6
-
SHA512
15a86684fa5f8fe284e3174ab28531f09951319ba1a4f2705889dc0af1c29ed535eaa9b2001b0407a499d0a61247e86e5b46e65ce47a404e2750d1811d3de607
-
SSDEEP
1536:+s4Ig5C9h+1+L/fs2Wg0Z6ZDWgN3IBnLr1SAuEcwlqmOhOMggV1:+XI7+8fs2Wz6Zq99usqmAxggV1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5004 wrote to memory of 3736 5004 rundll32.exe 79 PID 5004 wrote to memory of 3736 5004 rundll32.exe 79 PID 5004 wrote to memory of 3736 5004 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SQLi_Dumper\ControlsGui.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SQLi_Dumper\ControlsGui.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3736
-