Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21-01-2022 23:11
Static task
static1
Behavioral task
behavioral1
Sample
c48540c91f7cafef33a0af7639cf033a3cdc9bf3735f9cd31f5325b1fcfa3f27.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
c48540c91f7cafef33a0af7639cf033a3cdc9bf3735f9cd31f5325b1fcfa3f27.dll
Resource
win10-en-20211208
General
-
Target
c48540c91f7cafef33a0af7639cf033a3cdc9bf3735f9cd31f5325b1fcfa3f27.dll
-
Size
295KB
-
MD5
38a01972ed52ed73f95098f55f780bb0
-
SHA1
d9901db760db3f3f22f7b4da3254fd5a1cb538ae
-
SHA256
c48540c91f7cafef33a0af7639cf033a3cdc9bf3735f9cd31f5325b1fcfa3f27
-
SHA512
0b03b0051b01c7cddddb44a1478d120827c60959d9f4dbdc64a8963ea67271c1d252afe09fafdc065ff59698357da5388d803131258cbd2e57c1661e4b9e9f47
Malware Config
Extracted
squirrelwaffle
http://atertreat.in/5iPPVRKPPX9
http://incentivaconsultores.com.co/55jHpKCc9DWy
http://cdelean.org/0qvbbmu9g
http://bazy.ps/M6SjrMSYC
http://sukmabali.com/ZXxcLYs3rzRQ
http://bugwilliam.tk/cbB56YrugdbW
http://bestbeatsgh.com/42D7OwuPen
http://krumaila.com/UZ4NdDoDh4Tu
http://razehub.com/NN70nExbtLO
http://arcb.ro/aHUUNxE3Me5
http://cfmi.tg/m40YS6gDO0
http://sweetlittle.mx/ZCXP0dT2h
http://alkimia-prod.com/nT0imyzmo
http://almexperts.co.za/fEoJ3pdWZbF
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 1 IoCs
resource yara_rule behavioral2/memory/3264-118-0x0000000010000000-0x000000001004D000-memory.dmp squirrelwaffle -
Blocklisted process makes network request 6 IoCs
flow pid Process 21 3264 rundll32.exe 25 3264 rundll32.exe 29 3264 rundll32.exe 31 3264 rundll32.exe 33 3264 rundll32.exe 35 3264 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2684 wrote to memory of 3264 2684 rundll32.exe 68 PID 2684 wrote to memory of 3264 2684 rundll32.exe 68 PID 2684 wrote to memory of 3264 2684 rundll32.exe 68
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c48540c91f7cafef33a0af7639cf033a3cdc9bf3735f9cd31f5325b1fcfa3f27.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c48540c91f7cafef33a0af7639cf033a3cdc9bf3735f9cd31f5325b1fcfa3f27.dll,#12⤵
- Blocklisted process makes network request
PID:3264
-