Analysis
-
max time kernel
155s -
max time network
161s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
13-11-2021 17:35
Static task
static1
Behavioral task
behavioral1
Sample
4120428744e228ae5db9e0f26962a9bc0f8063932166150c2b378c671eed7c39.dll
Resource
win7-en-20211104
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
4120428744e228ae5db9e0f26962a9bc0f8063932166150c2b378c671eed7c39.dll
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
4120428744e228ae5db9e0f26962a9bc0f8063932166150c2b378c671eed7c39.dll
-
Size
76KB
-
MD5
49ac7a4410744c212c19a2d168506597
-
SHA1
6ae9dcce8616ef5cb4969bf1126b81370b411672
-
SHA256
4120428744e228ae5db9e0f26962a9bc0f8063932166150c2b378c671eed7c39
-
SHA512
d0004774c73e7ec7245f25a2b0c95dba13e7f5c8c32f2566ae1cb85215e6570e21b11376e542481ac929715c19196afde2f10ae250accc4349bbd917dc319b01
Score
10/10
Malware Config
Signatures
-
suricata: ET MALWARE SQUIRRELWAFFLE Loader Activity (POST)
suricata: ET MALWARE SQUIRRELWAFFLE Loader Activity (POST)
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4076 wrote to memory of 2928 4076 regsvr32.exe 68 PID 4076 wrote to memory of 2928 4076 regsvr32.exe 68 PID 4076 wrote to memory of 2928 4076 regsvr32.exe 68
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\4120428744e228ae5db9e0f26962a9bc0f8063932166150c2b378c671eed7c39.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\4120428744e228ae5db9e0f26962a9bc0f8063932166150c2b378c671eed7c39.dll2⤵PID:2928
-