Analysis
-
max time kernel
151s -
max time network
165s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
13-11-2021 17:36
Static task
static1
Behavioral task
behavioral1
Sample
b0441bc63773e1719aac9acbd99f6e72bdd31017038e5e26af2646bef8c974f3.dll
Resource
win7-en-20211104
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
b0441bc63773e1719aac9acbd99f6e72bdd31017038e5e26af2646bef8c974f3.dll
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
b0441bc63773e1719aac9acbd99f6e72bdd31017038e5e26af2646bef8c974f3.dll
-
Size
58KB
-
MD5
e58e26b525a717c0f140fd3c56b768ad
-
SHA1
b8222a45ce2f24d098f0de9745a8852c66879888
-
SHA256
b0441bc63773e1719aac9acbd99f6e72bdd31017038e5e26af2646bef8c974f3
-
SHA512
98ba5b908ae378a580d1e4019258a7d512aa805016e33de79581884c2f9340059d68a6b5475a326f5734b665931215e5dbc69ce5a8f81bfd47c6268e74495857
Score
10/10
Malware Config
Signatures
-
suricata: ET MALWARE SQUIRRELWAFFLE Loader Activity (POST)
suricata: ET MALWARE SQUIRRELWAFFLE Loader Activity (POST)
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2716 2668 regsvr32.exe 68 PID 2668 wrote to memory of 2716 2668 regsvr32.exe 68 PID 2668 wrote to memory of 2716 2668 regsvr32.exe 68
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\b0441bc63773e1719aac9acbd99f6e72bdd31017038e5e26af2646bef8c974f3.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\b0441bc63773e1719aac9acbd99f6e72bdd31017038e5e26af2646bef8c974f3.dll2⤵PID:2716
-