Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21-01-2022 23:04
Static task
static1
Behavioral task
behavioral1
Sample
dac99eb5c12e8dfac2b224423e9d0da884c81e13feea5a754a0cff8def5ca42a.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
dac99eb5c12e8dfac2b224423e9d0da884c81e13feea5a754a0cff8def5ca42a.dll
Resource
win10-en-20211208
General
-
Target
dac99eb5c12e8dfac2b224423e9d0da884c81e13feea5a754a0cff8def5ca42a.dll
-
Size
303KB
-
MD5
a0fe0f4c0fb7fb1e031bebdebb0a94b4
-
SHA1
121673d4974b2ada00e3dfa3cb6dbbadf23f74e0
-
SHA256
dac99eb5c12e8dfac2b224423e9d0da884c81e13feea5a754a0cff8def5ca42a
-
SHA512
02b46dcbbf7b385c8434c843810f7cd940002bf0181c8d35e06446d62d6da1a4ed65f08c9831ef1f0bc0f9f0ab6cff3db2676da5dddef7136f5ccae9905ad70f
Malware Config
Extracted
squirrelwaffle
http://atertreat.in/5iPPVRKPPX9
http://incentivaconsultores.com.co/55jHpKCc9DWy
http://cdelean.org/0qvbbmu9g
http://bazy.ps/M6SjrMSYC
http://sukmabali.com/ZXxcLYs3rzRQ
http://bugwilliam.tk/cbB56YrugdbW
http://bestbeatsgh.com/42D7OwuPen
http://krumaila.com/UZ4NdDoDh4Tu
http://razehub.com/NN70nExbtLO
http://arcb.ro/aHUUNxE3Me5
http://cfmi.tg/m40YS6gDO0
http://sweetlittle.mx/ZCXP0dT2h
http://alkimia-prod.com/nT0imyzmo
http://almexperts.co.za/fEoJ3pdWZbF
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 1 IoCs
resource yara_rule behavioral1/memory/740-56-0x0000000010000000-0x000000001004D000-memory.dmp squirrelwaffle -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 540 wrote to memory of 740 540 rundll32.exe 27 PID 540 wrote to memory of 740 540 rundll32.exe 27 PID 540 wrote to memory of 740 540 rundll32.exe 27 PID 540 wrote to memory of 740 540 rundll32.exe 27 PID 540 wrote to memory of 740 540 rundll32.exe 27 PID 540 wrote to memory of 740 540 rundll32.exe 27 PID 540 wrote to memory of 740 540 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dac99eb5c12e8dfac2b224423e9d0da884c81e13feea5a754a0cff8def5ca42a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dac99eb5c12e8dfac2b224423e9d0da884c81e13feea5a754a0cff8def5ca42a.dll,#12⤵PID:740
-