Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows11_x64
  • resource
    win11
  • submitted
    25-09-2021 00:05

General

  • Target

    test1.test.dll

  • Size

    309KB

  • MD5

    3d77d7a2e2697d35b281123afe4b030c

  • SHA1

    4087259179a6761e376dcfbf2e981e1c0cacc287

  • SHA256

    07c7cb49350bf3c6de4193fb2eeb8dd92d6662d60393ebd483a54bac80fb0b44

  • SHA512

    8c1645fa7bf81be88533e9aff8a308311f637e3d0b64244a4fa1679de53f706b9222d4bc9caa82f1340dea641d33feb3dfa3b67b2cd324a65bf570b18bf3a17c

Malware Config

Extracted

Family

squirrelwaffle

C2

hutraders.com/0eeUtmJf8O

goodartishard.com/0JXDM9kMwx

now.byteinsure.com/tnjUrmlhN

asceaub.com/Xl8UCLSU

colchonesmanzur.com/GjVgBnKaNIC

sistemasati.com/0SzGNkx6P

maldivehost.net/zLIisQRWZI9

lrdgon.org/l7r96tjAJ

binnawaz.com.pk/jhSZGWS76C

fhstorse.com/vJlgdjJnpIop

Signatures

  • SquirrelWaffle is a simple downloader written in C++.

    SquirrelWaffle.

  • suricata: ET MALWARE Possible SQUIRRELWAFFLE Server Response

    suricata: ET MALWARE Possible SQUIRRELWAFFLE Server Response

  • suricata: ET MALWARE SQUIRRELWAFFLE Loader Activity (POST)

    suricata: ET MALWARE SQUIRRELWAFFLE Loader Activity (POST)

  • suricata: ET MALWARE SQUIRRELWAFFLE Server Response

    suricata: ET MALWARE SQUIRRELWAFFLE Server Response

  • squirrelwaffle 2 IoCs

    Squirrelwaffle Payload

  • Blocklisted process makes network request 5 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\test1.test.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4736
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\test1.test.dll,#1
      2⤵
      • Blocklisted process makes network request
      PID:3024
  • C:\Windows\System32\sihclient.exe
    C:\Windows\System32\sihclient.exe /cv 92GwURs0+UOTl7UTHcO7Cw.0.2
    1⤵
    • Modifies data under HKEY_USERS
    PID:3560
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
    1⤵
    • Modifies data under HKEY_USERS
    PID:4868
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
    1⤵
      PID:4608

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3024-147-0x00000000753A0000-0x00000000753B0000-memory.dmp

      Filesize

      64KB

    • memory/3024-148-0x00000000753A0000-0x000000007547F000-memory.dmp

      Filesize

      892KB

    • memory/3024-149-0x0000000002C10000-0x0000000002C11000-memory.dmp

      Filesize

      4KB

    • memory/4868-150-0x000001587D060000-0x000001587D070000-memory.dmp

      Filesize

      64KB

    • memory/4868-151-0x000001587D0E0000-0x000001587D0F0000-memory.dmp

      Filesize

      64KB

    • memory/4868-152-0x000001587F6B0000-0x000001587F6B4000-memory.dmp

      Filesize

      16KB