Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
27-09-2021 18:10
Static task
static1
Behavioral task
behavioral1
Sample
803768a34f7e59b8a9a2f3969624c47e.dll
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
803768a34f7e59b8a9a2f3969624c47e.dll
Resource
win10-en-20210920
General
-
Target
803768a34f7e59b8a9a2f3969624c47e.dll
-
Size
506KB
-
MD5
803768a34f7e59b8a9a2f3969624c47e
-
SHA1
09a38940ef023929897fdc9c996de0b0f39116e2
-
SHA256
2a0a88a2e5f9cafa10a48d63bdfcdf965b72c25978ab46cf28e795dbedc9624a
-
SHA512
21e4aa621360a4ec4a0c73fad494e133f2584f92d058a72772e390c7bf1e1ad3e4d0778e95b590c663fe5efed3cfbecb08d5e78e1216c1bfbef729062806722f
Malware Config
Extracted
squirrelwaffle
acdlimited.com/2u6aW9Pfe
jornaldasoficinas.com/ZF8GKIGVDupL
orldofjain.com/lMsTA7tSYpe
altayaralsudani.net/SSUsPgb7PHgC
hoteloaktree.com/QthLWsZsVgb
aterwellnessinc.com/U7D0sswwp
sirifinco.com/Urbhq9wO50j
ordpress17.com/5WG6Z62sKWo
mohsinkhanfoundation.com/pcQLeLMbur
lendbiz.vn/xj3BhHtMbf
geosever.rs/ObHP1CHt
nuevainfotech.com/xCNyTjzkoe
dadabhoy.pk/m6rQE94U
111
sjgrand.lk/zvMYuQqEZj
erogholding.com/GFM1QcCFk
armordetailing.rs/lgfrZb4Re6WO
lefrenchwineclub.com/eRUGdDox
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
squirrelwaffle 2 IoCs
Squirrelwaffle Payload
resource yara_rule behavioral2/memory/2164-117-0x0000000004560000-0x0000000004571000-memory.dmp squirrelwaffle behavioral2/memory/2164-118-0x0000000004590000-0x00000000045A0000-memory.dmp squirrelwaffle -
Program crash 1 IoCs
pid pid_target Process procid_target 2612 2164 WerFault.exe 70 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2612 WerFault.exe 2612 WerFault.exe 2612 WerFault.exe 2612 WerFault.exe 2612 WerFault.exe 2612 WerFault.exe 2612 WerFault.exe 2612 WerFault.exe 2612 WerFault.exe 2612 WerFault.exe 2612 WerFault.exe 2612 WerFault.exe 2612 WerFault.exe 2612 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2612 WerFault.exe Token: SeBackupPrivilege 2612 WerFault.exe Token: SeDebugPrivilege 2612 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2164 2056 rundll32.exe 70 PID 2056 wrote to memory of 2164 2056 rundll32.exe 70 PID 2056 wrote to memory of 2164 2056 rundll32.exe 70
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\803768a34f7e59b8a9a2f3969624c47e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\803768a34f7e59b8a9a2f3969624c47e.dll,#12⤵PID:2164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 7003⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-