Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10-de-20210920
  • submitted
    25-09-2021 00:05

General

  • Target

    test1.test.dll

  • Size

    309KB

  • MD5

    3d77d7a2e2697d35b281123afe4b030c

  • SHA1

    4087259179a6761e376dcfbf2e981e1c0cacc287

  • SHA256

    07c7cb49350bf3c6de4193fb2eeb8dd92d6662d60393ebd483a54bac80fb0b44

  • SHA512

    8c1645fa7bf81be88533e9aff8a308311f637e3d0b64244a4fa1679de53f706b9222d4bc9caa82f1340dea641d33feb3dfa3b67b2cd324a65bf570b18bf3a17c

Malware Config

Extracted

Family

squirrelwaffle

C2

hutraders.com/0eeUtmJf8O

goodartishard.com/0JXDM9kMwx

now.byteinsure.com/tnjUrmlhN

asceaub.com/Xl8UCLSU

colchonesmanzur.com/GjVgBnKaNIC

sistemasati.com/0SzGNkx6P

maldivehost.net/zLIisQRWZI9

lrdgon.org/l7r96tjAJ

binnawaz.com.pk/jhSZGWS76C

fhstorse.com/vJlgdjJnpIop

Signatures

  • Registers COM server for autorun 1 TTPs
  • SquirrelWaffle is a simple downloader written in C++.

    SquirrelWaffle.

  • suricata: ET MALWARE Possible SQUIRRELWAFFLE Server Response

    suricata: ET MALWARE Possible SQUIRRELWAFFLE Server Response

  • suricata: ET MALWARE SQUIRRELWAFFLE Loader Activity (POST)

    suricata: ET MALWARE SQUIRRELWAFFLE Loader Activity (POST)

  • suricata: ET MALWARE SQUIRRELWAFFLE Server Response

    suricata: ET MALWARE SQUIRRELWAFFLE Server Response

  • squirrelwaffle 2 IoCs

    Squirrelwaffle Payload

  • Blocklisted process makes network request 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Modifies data under HKEY_USERS 23 IoCs
  • Modifies registry class 44 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\test1.test.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4268
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\test1.test.dll,#1
      2⤵
      • Blocklisted process makes network request
      PID:4100
  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.170.0822.0002\FileSyncConfig.exe
    "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.170.0822.0002\FileSyncConfig.exe"
    1⤵
    • Modifies registry class
    PID:1144
  • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe
    "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe" /frequentupdate SCHEDULEDTASK displaylevel=False
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:4076

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4100-116-0x0000000002B40000-0x0000000002C8A000-memory.dmp

    Filesize

    1.3MB

  • memory/4100-118-0x0000000074020000-0x00000000740FF000-memory.dmp

    Filesize

    892KB

  • memory/4100-117-0x0000000074020000-0x0000000074030000-memory.dmp

    Filesize

    64KB