Analysis
-
max time kernel
83s -
max time network
839s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
10-11-2021 20:49
Static task
static1
Behavioral task
behavioral1
Sample
test1.test.dll
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
test1.test.dll
Resource
win10-en-20211104
General
-
Target
test1.test.dll
-
Size
481KB
-
MD5
24ffea9dc53b9ee9b1a6b20d1a23ef4c
-
SHA1
25a5af3a4a40d40efbc73a4214e9bb6145141110
-
SHA256
ce110445b2aa78f9c14ceaea9c37ddd46b6df35d35bc4b8f840c00db72ff31c9
-
SHA512
447b6d1c72c39ddb03392094655d6d50192f85cb21f88a863e2f35237309ffd8e8c1b5a758ecfc07b1aba10aa2f18e69a6f6a202ebe5682c82f5ddc2612831ef
Malware Config
Extracted
squirrelwaffle
http://vodvarkasprings.com/Fbjb82DVZMzM
http://jm-fitness.com/O9ZYqWiWR
http://mayurinternationalindia.com/89dQbvkH
http://chanakyacoaching.com/LNuPHv4w
http://fundacionpesa.com/Am2dFkv4Xf6
http://swayamhandcraft.in/bizUBo8Ncl4
http://7xwelfare.com/u1jliJYBwgsK
http://jaihanumanenterprises.com/E6itIXiE
http://deekayagencies.com/m9y7jtFxH
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 2 IoCs
resource yara_rule behavioral2/memory/3928-121-0x0000000004590000-0x00000000045A0000-memory.dmp squirrelwaffle behavioral2/memory/3928-120-0x0000000004570000-0x0000000004581000-memory.dmp squirrelwaffle -
Program crash 1 IoCs
pid pid_target Process procid_target 4184 3928 WerFault.exe 69 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4184 WerFault.exe 4184 WerFault.exe 4184 WerFault.exe 4184 WerFault.exe 4184 WerFault.exe 4184 WerFault.exe 4184 WerFault.exe 4184 WerFault.exe 4184 WerFault.exe 4184 WerFault.exe 4184 WerFault.exe 4184 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 4184 WerFault.exe Token: SeBackupPrivilege 4184 WerFault.exe Token: SeDebugPrivilege 4184 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3936 wrote to memory of 3928 3936 rundll32.exe 69 PID 3936 wrote to memory of 3928 3936 rundll32.exe 69 PID 3936 wrote to memory of 3928 3936 rundll32.exe 69
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\test1.test.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\test1.test.dll,#12⤵PID:3928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 6923⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4184
-
-