Resubmissions

22-09-2021 13:52

210922-q6gl8scha5 10

21-09-2021 15:58

210921-tekflacehq 10

Analysis

  • max time kernel
    143s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    21-09-2021 15:58

General

  • Target

    5582447866948a38cb3d1013759854142cbbdc812de3d821c5d4c151e4ebbe6f.dll

  • Size

    260KB

  • MD5

    6373e3b1950d7529d63262ebc9c76ea9

  • SHA1

    4a1e34488f21c336599dc7b576bdfda066f98522

  • SHA256

    5582447866948a38cb3d1013759854142cbbdc812de3d821c5d4c151e4ebbe6f

  • SHA512

    830e0a6c97afe0ab07a62abb55a89fa51ec793cab631d7f16a619921cc09e1d799db21e5bb9c1f89726f7d261fe1bd54a1030496ec4296bb3e47d0f15897803c

Malware Config

Extracted

Family

squirrelwaffle

C2

deanandwilconstruction.com/UXEvfuIlhws

arimeto.lv/Nm70oAfwB

gitamschool.com/oZbs0Oqw7uv

eresourcesmoneymarket.com/JbVwdgaV6l

flyershipmanager.com/SGAsORYsywt

Attributes
  • blocklist

    94.46.179.80

    206.189.205.251

    88.242.66.45

    85.75.110.214

    87.104.3.136

    207.244.91.171

    49.230.88.160

    91.149.252.75

    91.149.252.88

    92.211.109.152

    178.0.250.168

    88.69.16.230

    95.223.77.160

    99.234.62.23

    2.206.105.223

    84.222.8.201

    89.183.239.142

    5.146.132.101

    77.7.60.154

    45.41.106.122

    45.74.72.13

    74.58.152.123

    88.87.68.197

    109.70.100.25

    185.67.82.114

    207.102.138.19

    204.101.161.14

    193.128.108.251

    111.7.100.17

    111.7.100.16

Signatures

  • SquirrelWaffle is a simple downloader written in C++.

    SquirrelWaffle.

  • squirrelwaffle 1 IoCs

    Squirrelwaffle Payload

  • Blocklisted process makes network request 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\5582447866948a38cb3d1013759854142cbbdc812de3d821c5d4c151e4ebbe6f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\5582447866948a38cb3d1013759854142cbbdc812de3d821c5d4c151e4ebbe6f.dll,#1
      2⤵
      • Blocklisted process makes network request
      PID:860

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/860-116-0x0000000010000000-0x0000000010044000-memory.dmp

    Filesize

    272KB

  • memory/860-115-0x0000000000BE0000-0x0000000000BFE000-memory.dmp

    Filesize

    120KB