Resubmissions

10-11-2021 20:49

211110-zmgybsacc9 10

06-10-2021 12:48

211006-p1649sbdcp 10

Analysis

  • max time kernel
    83s
  • max time network
    839s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    10-11-2021 20:49

General

  • Target

    test1.test.dll

  • Size

    481KB

  • MD5

    24ffea9dc53b9ee9b1a6b20d1a23ef4c

  • SHA1

    25a5af3a4a40d40efbc73a4214e9bb6145141110

  • SHA256

    ce110445b2aa78f9c14ceaea9c37ddd46b6df35d35bc4b8f840c00db72ff31c9

  • SHA512

    447b6d1c72c39ddb03392094655d6d50192f85cb21f88a863e2f35237309ffd8e8c1b5a758ecfc07b1aba10aa2f18e69a6f6a202ebe5682c82f5ddc2612831ef

Malware Config

Extracted

Family

squirrelwaffle

C2

http://vodvarkasprings.com/Fbjb82DVZMzM

http://jm-fitness.com/O9ZYqWiWR

http://mayurinternationalindia.com/89dQbvkH

http://chanakyacoaching.com/LNuPHv4w

http://fundacionpesa.com/Am2dFkv4Xf6

http://swayamhandcraft.in/bizUBo8Ncl4

http://7xwelfare.com/u1jliJYBwgsK

http://jaihanumanenterprises.com/E6itIXiE

http://deekayagencies.com/m9y7jtFxH

Signatures

  • SquirrelWaffle is a simple downloader written in C++.

    SquirrelWaffle.

  • Squirrelwaffle Payload 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\test1.test.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3936
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\test1.test.dll,#1
      2⤵
        PID:3928
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 692
          3⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4184

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3928-119-0x0000000000850000-0x0000000000851000-memory.dmp

      Filesize

      4KB

    • memory/3928-121-0x0000000004590000-0x00000000045A0000-memory.dmp

      Filesize

      64KB

    • memory/3928-120-0x0000000004570000-0x0000000004581000-memory.dmp

      Filesize

      68KB