Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10_x64 -
resource
win10-ja-20210920 -
submitted
23-09-2021 15:07
Static task
static1
Behavioral task
behavioral1
Sample
de7efe687330b83242dbd1dc00b380933b238b490ba6ba2617330bdf54d1a9ea.dll
Resource
win10-ja-20210920
General
-
Target
de7efe687330b83242dbd1dc00b380933b238b490ba6ba2617330bdf54d1a9ea.dll
-
Size
302KB
-
MD5
0a359f52ad35a8d335019332274d3c88
-
SHA1
3a2c847631d1d3592762c5c9abd7367e4d15cd1b
-
SHA256
de7efe687330b83242dbd1dc00b380933b238b490ba6ba2617330bdf54d1a9ea
-
SHA512
f9502c7ef0d25357b6ed3a62f834b10b695c03c99ccabff6cf40d0fb15eeed1a696ce3025f9d2af08e85a3446562ee2c96bdacbeae4015ef0a2ed2faaf6f4d13
Malware Config
Extracted
squirrelwaffle
atertreat.in/5iPPVRKPPX9
incentivaconsultores.com.co/55jHpKCc9DWy
cdelean.org/0qvbbmu9g
bazy.ps/M6SjrMSYC
sukmabali.com/ZXxcLYs3rzRQ
bugwilliam.tk/cbB56YrugdbW
bestbeatsgh.com/42D7OwuPen
krumaila.com/UZ4NdDoDh4Tu
razehub.com/NN70nExbtLO
arcb.ro/aHUUNxE3Me5
cfmi.tg/m40YS6gDO0
sweetlittle.mx/ZCXP0dT2h
alkimia-prod.com/nT0imyzmo
almexperts.co.za/fEoJ3pdWZbF
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
squirrelwaffle 1 IoCs
Squirrelwaffle Payload
resource yara_rule behavioral1/memory/3320-117-0x0000000010000000-0x000000001004D000-memory.dmp squirrelwaffle -
Blocklisted process makes network request 6 IoCs
flow pid Process 25 3320 rundll32.exe 34 3320 rundll32.exe 37 3320 rundll32.exe 39 3320 rundll32.exe 41 3320 rundll32.exe 42 3320 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2752 wrote to memory of 3320 2752 rundll32.exe 76 PID 2752 wrote to memory of 3320 2752 rundll32.exe 76 PID 2752 wrote to memory of 3320 2752 rundll32.exe 76
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de7efe687330b83242dbd1dc00b380933b238b490ba6ba2617330bdf54d1a9ea.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de7efe687330b83242dbd1dc00b380933b238b490ba6ba2617330bdf54d1a9ea.dll,#12⤵
- Blocklisted process makes network request
PID:3320
-