Resubmissions

01-11-2021 12:31

211101-pp5r3ahha4 10

31-10-2021 09:03

211031-k1bwxacfaq 10

14-10-2021 01:44

211014-b6aflafeg4 10

Analysis

  • max time kernel
    602s
  • max time network
    608s
  • platform
    windows11_x64
  • resource
    win11
  • submitted
    01-11-2021 12:31

General

  • Target

    6402b33d729c8bb44881747a8f397f4aec408bf5e18b9af6fd86cdfa3f96323b.dll

  • Size

    235KB

  • MD5

    8e37795097400f6a609525749d154cd0

  • SHA1

    8e1502c2aa56e6a8c7c1d2c75f3946332a5bb8c0

  • SHA256

    6402b33d729c8bb44881747a8f397f4aec408bf5e18b9af6fd86cdfa3f96323b

  • SHA512

    c7453b8f50e557a5990ac3708931845eeb6dc2992cd907d5534733524f523226d8d013be6e09bb2b5210f6f5ad2303625f8998a5111d3b0925bb4228b6c9152a

Malware Config

Extracted

Family

squirrelwaffle

C2

http://acdlimited.com/2u6aW9Pfe

http://jornaldasoficinas.com/ZF8GKIGVDupL

http://orldofjain.com/lMsTA7tSYpe

http://altayaralsudani.net/SSUsPgb7PHgC

http://hoteloaktree.com/QthLWsZsVgb

http://aterwellnessinc.com/U7D0sswwp

http://sirifinco.com/Urbhq9wO50j

http://ordpress17.com/5WG6Z62sKWo

http://mohsinkhanfoundation.com/pcQLeLMbur

http://lendbiz.vn/xj3BhHtMbf

http://geosever.rs/ObHP1CHt

http://nuevainfotech.com/xCNyTjzkoe

http://dadabhoy.pk/m6rQE94U

http://111

http://sjgrand.lk/zvMYuQqEZj

http://erogholding.com/GFM1QcCFk

http://armordetailing.rs/lgfrZb4Re6WO

http://lefrenchwineclub.com/eRUGdDox

Signatures

  • SquirrelWaffle is a simple downloader written in C++.

    SquirrelWaffle.

  • Squirrelwaffle Payload 2 IoCs
  • Blocklisted process makes network request 22 IoCs
  • Sets service image path in registry 2 TTPs
  • Drops file in Windows directory 8 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6402b33d729c8bb44881747a8f397f4aec408bf5e18b9af6fd86cdfa3f96323b.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3996
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6402b33d729c8bb44881747a8f397f4aec408bf5e18b9af6fd86cdfa3f96323b.dll,#1
      2⤵
      • Blocklisted process makes network request
      PID:800
  • C:\Windows\System32\WaaSMedicAgent.exe
    C:\Windows\System32\WaaSMedicAgent.exe bfdc34d7c1ee0bda183cb386fc7ee697 llqiexvWSEukRqw/O0OCUQ.0.1.0.3.0
    1⤵
    • Modifies data under HKEY_USERS
    PID:4308
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1872
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
    1⤵
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:952
    • C:\Windows\uus\AMD64\MoUsoCoreWorker.exe
      C:\Windows\uus\AMD64\MoUsoCoreWorker.exe
      2⤵
        PID:3032
    • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.100_none_04da31ff4c67c24a\TiWorker.exe
      C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.100_none_04da31ff4c67c24a\TiWorker.exe -Embedding
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2276
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe bfdc34d7c1ee0bda183cb386fc7ee697 llqiexvWSEukRqw/O0OCUQ.0.1.0.3.0
      1⤵
        PID:1620
      • C:\Windows\System32\WaaSMedicAgent.exe
        C:\Windows\System32\WaaSMedicAgent.exe bfdc34d7c1ee0bda183cb386fc7ee697 llqiexvWSEukRqw/O0OCUQ.0.1.0.3.0
        1⤵
        • Modifies data under HKEY_USERS
        PID:3312
      • C:\Windows\System32\WaaSMedicAgent.exe
        C:\Windows\System32\WaaSMedicAgent.exe bfdc34d7c1ee0bda183cb386fc7ee697 llqiexvWSEukRqw/O0OCUQ.0.1.0.3.0
        1⤵
        • Modifies data under HKEY_USERS
        PID:5072

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/800-146-0x0000000000000000-mapping.dmp
      • memory/800-160-0x0000000010000000-0x00000000100D6000-memory.dmp
        Filesize

        856KB

      • memory/800-159-0x0000000010000000-0x0000000010010000-memory.dmp
        Filesize

        64KB

      • memory/800-158-0x0000000002FE0000-0x0000000002FE1000-memory.dmp
        Filesize

        4KB

      • memory/800-157-0x0000000010000000-0x00000000100D6000-memory.dmp
        Filesize

        856KB

      • memory/1872-152-0x000001C0B97C0000-0x000001C0B97C1000-memory.dmp
        Filesize

        4KB

      • memory/1872-151-0x000001C0B97D0000-0x000001C0B97D4000-memory.dmp
        Filesize

        16KB

      • memory/1872-153-0x000001C0B9FB0000-0x000001C0B9FB4000-memory.dmp
        Filesize

        16KB

      • memory/1872-154-0x000001C0B9FA0000-0x000001C0B9FA1000-memory.dmp
        Filesize

        4KB

      • memory/1872-155-0x000001C0BA480000-0x000001C0BA484000-memory.dmp
        Filesize

        16KB

      • memory/1872-156-0x000001C0BA3D0000-0x000001C0BA3D1000-memory.dmp
        Filesize

        4KB

      • memory/1872-149-0x000001C0B9640000-0x000001C0B9644000-memory.dmp
        Filesize

        16KB

      • memory/1872-148-0x000001C0B70E0000-0x000001C0B70F0000-memory.dmp
        Filesize

        64KB

      • memory/1872-147-0x000001C0B6960000-0x000001C0B6970000-memory.dmp
        Filesize

        64KB

      • memory/3032-150-0x0000000000000000-mapping.dmp