Analysis
-
max time kernel
155s -
max time network
169s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
13-11-2021 17:36
Static task
static1
Behavioral task
behavioral1
Sample
aa9707a92f02c46e6ab8611c233b208506bc6a358a2e78a60b74d6859ddfd5e8.dll
Resource
win7-en-20211104
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
aa9707a92f02c46e6ab8611c233b208506bc6a358a2e78a60b74d6859ddfd5e8.dll
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
aa9707a92f02c46e6ab8611c233b208506bc6a358a2e78a60b74d6859ddfd5e8.dll
-
Size
68KB
-
MD5
35b95a6e1a9c965e3f169d6802a53280
-
SHA1
3b27f9e01d12d9433ec7afcc82ab45d6892b6a7c
-
SHA256
aa9707a92f02c46e6ab8611c233b208506bc6a358a2e78a60b74d6859ddfd5e8
-
SHA512
542a814fac99adcf4978a8e4695bdd023bfdb78937f100104e1ecad93a27e093f95e121e19b9bb3dbdd6a16f39bc80b782d477609a5783b551a3368cf81c4809
Score
10/10
Malware Config
Signatures
-
suricata: ET MALWARE SQUIRRELWAFFLE Loader Activity (POST)
suricata: ET MALWARE SQUIRRELWAFFLE Loader Activity (POST)
-
Blocklisted process makes network request 2 IoCs
flow pid Process 17 588 rundll32.exe 29 588 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1328 wrote to memory of 588 1328 rundll32.exe 68 PID 1328 wrote to memory of 588 1328 rundll32.exe 68 PID 1328 wrote to memory of 588 1328 rundll32.exe 68
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aa9707a92f02c46e6ab8611c233b208506bc6a358a2e78a60b74d6859ddfd5e8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aa9707a92f02c46e6ab8611c233b208506bc6a358a2e78a60b74d6859ddfd5e8.dll,#12⤵
- Blocklisted process makes network request
PID:588
-