Resubmissions

01-11-2021 12:31

211101-pp5r3ahha4 10

31-10-2021 09:03

211031-k1bwxacfaq 10

14-10-2021 01:44

211014-b6aflafeg4 10

Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows11_x64
  • resource
    win11
  • submitted
    01-11-2021 12:31

General

  • Target

    85d0b72fe822fd6c22827b4da1917d2c1f2d9faa838e003e78e533384ea80939.dll

  • Size

    316KB

  • MD5

    5ec89ea30af2cc38ae183d12ffacbcf7

  • SHA1

    bee82e104c1082442c7ff029b2781a04a3e80cd5

  • SHA256

    85d0b72fe822fd6c22827b4da1917d2c1f2d9faa838e003e78e533384ea80939

  • SHA512

    7e25703e68ec87d1da4b8d5f2bfe4e1e09b6bd88bb3e662b82cda77496badd5c6c1b3685ade9c4d4a100fb43972d3356bb22c7089a4edc2e1c174aa3fbf639cf

Malware Config

Extracted

Family

squirrelwaffle

C2

http://spiritofprespa.com/9783Tci2SGF6

http://amjsys.com/RIZszf8vR

http://hrms.prodigygroupindia.com/SKyufGZV

http://centralfloridaasphalt.com/GCN0FChS

http://jhehosting.com/rUuKheB7

http://shoeclearanceoutlet.co.uk/46awDTJjI4l

http://kmslogistik.com/aS1mjTkJIy

http://bartek-lenart.pl/1bWJ57V9vx

http://voip.voipcallhub.com/ZVmfdGHs4T

http://mercyfoundationcio.org/XF9aQrXnakeG

http://key4net.com/a8A2kcc1J

http://chaturanga.groopy.com/mxN3lxZoVApc

http://voipcallhub.com/ilGht5r26

http://ems.prodigygroupindia.com/v5RvVJTz

http://novamarketing.com.pk/k8l36uus

http://lenartsa.webd.pro/fz16DjmKmHtl

http://lead.jhinfotech.co/YERjiAMaupaz

Attributes
  • blocklist

    94.46.179.80

    206.189.205.251

    88.242.66.45

    85.75.110.214

    87.104.3.136

    207.244.91.171

    49.230.88.160

    91.149.252.75

    91.149.252.88

    92.211.109.152

    178.0.250.168

    88.69.16.230

    95.223.77.160

    99.234.62.23

    2.206.105.223

    84.222.8.201

    89.183.239.142

    5.146.132.101

    77.7.60.154

    45.41.106.122

    45.74.72.13

    74.58.152.123

    88.87.68.197

    211.107.25.121

    109.70.100.25

    185.67.82.114

    207.102.138.19

    204.101.161.14

    193.128.108.251

    111.7.100.17

Signatures

  • SquirrelWaffle is a simple downloader written in C++.

    SquirrelWaffle.

  • Squirrelwaffle Payload 2 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Sets service image path in registry 2 TTPs
  • Drops file in Windows directory 8 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\85d0b72fe822fd6c22827b4da1917d2c1f2d9faa838e003e78e533384ea80939.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3328
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\85d0b72fe822fd6c22827b4da1917d2c1f2d9faa838e003e78e533384ea80939.dll,#1
      2⤵
      • Blocklisted process makes network request
      PID:4624
  • C:\Windows\System32\WaaSMedicAgent.exe
    C:\Windows\System32\WaaSMedicAgent.exe c00a1e15b0fc29f64ed1aafa470ca6f3 BrLTgSq7+0mHBOkpFw5rHQ.0.1.0.3.0
    1⤵
    • Modifies data under HKEY_USERS
    PID:1012
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1804
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
    1⤵
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Windows\uus\AMD64\MoUsoCoreWorker.exe
      C:\Windows\uus\AMD64\MoUsoCoreWorker.exe
      2⤵
        PID:3948
    • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.100_none_04da31ff4c67c24a\TiWorker.exe
      C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.100_none_04da31ff4c67c24a\TiWorker.exe -Embedding
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2192
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe c00a1e15b0fc29f64ed1aafa470ca6f3 BrLTgSq7+0mHBOkpFw5rHQ.0.1.0.3.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:4420
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe c00a1e15b0fc29f64ed1aafa470ca6f3 BrLTgSq7+0mHBOkpFw5rHQ.0.1.0.3.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:4500

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1804-147-0x000001CF50320000-0x000001CF50330000-memory.dmp

      Filesize

      64KB

    • memory/1804-148-0x000001CF50560000-0x000001CF50570000-memory.dmp

      Filesize

      64KB

    • memory/1804-149-0x000001CF52A70000-0x000001CF52A74000-memory.dmp

      Filesize

      16KB

    • memory/4624-151-0x0000000075310000-0x0000000075372000-memory.dmp

      Filesize

      392KB

    • memory/4624-153-0x0000000075310000-0x0000000075372000-memory.dmp

      Filesize

      392KB

    • memory/4624-152-0x0000000075310000-0x0000000075321000-memory.dmp

      Filesize

      68KB

    • memory/4624-154-0x0000000000D40000-0x0000000000D41000-memory.dmp

      Filesize

      4KB