Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21-01-2022 23:06
Static task
static1
Behavioral task
behavioral1
Sample
d41b920d8d5190fd8cefc8406e6a7ca169170fe4b75efddd88c39da2689cc350.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
d41b920d8d5190fd8cefc8406e6a7ca169170fe4b75efddd88c39da2689cc350.dll
Resource
win10-en-20211208
General
-
Target
d41b920d8d5190fd8cefc8406e6a7ca169170fe4b75efddd88c39da2689cc350.dll
-
Size
300KB
-
MD5
662b8f8a684918958dfa112dc1e351be
-
SHA1
a3fae1c3deeb3071b5e446d0a3546243d261e97c
-
SHA256
d41b920d8d5190fd8cefc8406e6a7ca169170fe4b75efddd88c39da2689cc350
-
SHA512
207ac0d2fdf90c84bd265fd9216110c48199663834242b2ea1091784d4b7d85df07c3ca8474f14b0a27039161452c3c108157c0d8bbddacae4dd406d2ac137bb
Malware Config
Extracted
squirrelwaffle
http://atertreat.in/5iPPVRKPPX9
http://incentivaconsultores.com.co/55jHpKCc9DWy
http://cdelean.org/0qvbbmu9g
http://bazy.ps/M6SjrMSYC
http://sukmabali.com/ZXxcLYs3rzRQ
http://bugwilliam.tk/cbB56YrugdbW
http://bestbeatsgh.com/42D7OwuPen
http://krumaila.com/UZ4NdDoDh4Tu
http://razehub.com/NN70nExbtLO
http://arcb.ro/aHUUNxE3Me5
http://cfmi.tg/m40YS6gDO0
http://sweetlittle.mx/ZCXP0dT2h
http://alkimia-prod.com/nT0imyzmo
http://almexperts.co.za/fEoJ3pdWZbF
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 1 IoCs
resource yara_rule behavioral1/memory/1068-56-0x0000000010000000-0x000000001004D000-memory.dmp squirrelwaffle -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 960 wrote to memory of 1068 960 rundll32.exe 27 PID 960 wrote to memory of 1068 960 rundll32.exe 27 PID 960 wrote to memory of 1068 960 rundll32.exe 27 PID 960 wrote to memory of 1068 960 rundll32.exe 27 PID 960 wrote to memory of 1068 960 rundll32.exe 27 PID 960 wrote to memory of 1068 960 rundll32.exe 27 PID 960 wrote to memory of 1068 960 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d41b920d8d5190fd8cefc8406e6a7ca169170fe4b75efddd88c39da2689cc350.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d41b920d8d5190fd8cefc8406e6a7ca169170fe4b75efddd88c39da2689cc350.dll,#12⤵PID:1068
-