Resubmissions

01-11-2021 12:31

211101-pp5r3ahha4 10

31-10-2021 09:03

211031-k1bwxacfaq 10

14-10-2021 01:44

211014-b6aflafeg4 10

Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows11_x64
  • resource
    win11
  • submitted
    01-11-2021 12:31

General

  • Target

    671f477c3039786c5f3553760377be03b91bfb66f31ba9370ed2193192cf5b4e.dll

  • Size

    334KB

  • MD5

    84a32095bcbc0ed694f09f1dd8f2a70f

  • SHA1

    23f7334db6979f04d5a2a9a846f82c526bfe6736

  • SHA256

    671f477c3039786c5f3553760377be03b91bfb66f31ba9370ed2193192cf5b4e

  • SHA512

    e3db14700e24210d1e2f1c19fcbb1b7074d73f5cdc4cbaf737b9a92a4f3b8d9b71efaa450aac9f7f4baef1ca8463f0668a3d72b888e0d39195e4c6115de5012a

Malware Config

Extracted

Family

squirrelwaffle

C2

http://spiritofprespa.com/9783Tci2SGF6

http://amjsys.com/RIZszf8vR

http://hrms.prodigygroupindia.com/SKyufGZV

http://centralfloridaasphalt.com/GCN0FChS

http://jhehosting.com/rUuKheB7

http://shoeclearanceoutlet.co.uk/46awDTJjI4l

http://kmslogistik.com/aS1mjTkJIy

http://bartek-lenart.pl/1bWJ57V9vx

http://voip.voipcallhub.com/ZVmfdGHs4T

http://mercyfoundationcio.org/XF9aQrXnakeG

http://key4net.com/a8A2kcc1J

http://chaturanga.groopy.com/mxN3lxZoVApc

http://voipcallhub.com/ilGht5r26

http://ems.prodigygroupindia.com/v5RvVJTz

http://novamarketing.com.pk/k8l36uus

http://lenartsa.webd.pro/fz16DjmKmHtl

http://lead.jhinfotech.co/YERjiAMaupaz

Attributes
  • blocklist

    94.46.179.80

    206.189.205.251

    88.242.66.45

    85.75.110.214

    87.104.3.136

    207.244.91.171

    49.230.88.160

    91.149.252.75

    91.149.252.88

    92.211.109.152

    178.0.250.168

    88.69.16.230

    95.223.77.160

    99.234.62.23

    2.206.105.223

    84.222.8.201

    89.183.239.142

    5.146.132.101

    77.7.60.154

    45.41.106.122

    45.74.72.13

    74.58.152.123

    88.87.68.197

    211.107.25.121

    109.70.100.25

    185.67.82.114

    207.102.138.19

    204.101.161.14

    193.128.108.251

    111.7.100.17

Signatures

  • SquirrelWaffle is a simple downloader written in C++.

    SquirrelWaffle.

  • Squirrelwaffle Payload 2 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Sets service image path in registry 2 TTPs
  • Drops file in Windows directory 8 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\671f477c3039786c5f3553760377be03b91bfb66f31ba9370ed2193192cf5b4e.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3408
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\671f477c3039786c5f3553760377be03b91bfb66f31ba9370ed2193192cf5b4e.dll,#1
      2⤵
      • Blocklisted process makes network request
      PID:3240
  • C:\Windows\System32\WaaSMedicAgent.exe
    C:\Windows\System32\WaaSMedicAgent.exe 7e0f7b2de35ebb627c1493d0762611a0 9IDtXk8kpE6GjoFleu8TmQ.0.1.0.3.0
    1⤵
    • Modifies data under HKEY_USERS
    PID:3984
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1372
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
    1⤵
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Windows\uus\AMD64\MoUsoCoreWorker.exe
      C:\Windows\uus\AMD64\MoUsoCoreWorker.exe
      2⤵
        PID:2424
    • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.100_none_04da31ff4c67c24a\TiWorker.exe
      C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.100_none_04da31ff4c67c24a\TiWorker.exe -Embedding
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2748
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe 7e0f7b2de35ebb627c1493d0762611a0 9IDtXk8kpE6GjoFleu8TmQ.0.1.0.3.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:5048
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe 7e0f7b2de35ebb627c1493d0762611a0 9IDtXk8kpE6GjoFleu8TmQ.0.1.0.3.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:1572

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1372-147-0x000001CF60F20000-0x000001CF60F30000-memory.dmp

      Filesize

      64KB

    • memory/1372-148-0x000001CF61160000-0x000001CF61170000-memory.dmp

      Filesize

      64KB

    • memory/1372-149-0x000001CF636A0000-0x000001CF636A4000-memory.dmp

      Filesize

      16KB

    • memory/3240-151-0x00000000749A0000-0x0000000074A02000-memory.dmp

      Filesize

      392KB

    • memory/3240-153-0x00000000749A0000-0x0000000074A02000-memory.dmp

      Filesize

      392KB

    • memory/3240-152-0x00000000749A0000-0x00000000749B1000-memory.dmp

      Filesize

      68KB

    • memory/3240-154-0x0000000003590000-0x0000000003591000-memory.dmp

      Filesize

      4KB