Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21-01-2022 23:19
Static task
static1
Behavioral task
behavioral1
Sample
aee5cf0bb757e2fabdeaecb30146e1e6e8d8ca84540099d34ead5ce85e9c2631.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
aee5cf0bb757e2fabdeaecb30146e1e6e8d8ca84540099d34ead5ce85e9c2631.dll
Resource
win10-en-20211208
General
-
Target
aee5cf0bb757e2fabdeaecb30146e1e6e8d8ca84540099d34ead5ce85e9c2631.dll
-
Size
309KB
-
MD5
1b249d3f102f8e7b438feb277d3129a7
-
SHA1
10fbf8934af0afa1fd231a38ec13002cad531cdf
-
SHA256
aee5cf0bb757e2fabdeaecb30146e1e6e8d8ca84540099d34ead5ce85e9c2631
-
SHA512
0083d2f20e782bef1643a7e705378ce1c35c6917fbd9e152c635f5b93b2dafe62f39412113b23c9c3fd0616c69b6d31faf3d364acb5f1d83d84a6ad7372dd7cb
Malware Config
Extracted
squirrelwaffle
http://atertreat.in/5iPPVRKPPX9
http://incentivaconsultores.com.co/55jHpKCc9DWy
http://cdelean.org/0qvbbmu9g
http://bazy.ps/M6SjrMSYC
http://sukmabali.com/ZXxcLYs3rzRQ
http://bugwilliam.tk/cbB56YrugdbW
http://bestbeatsgh.com/42D7OwuPen
http://krumaila.com/UZ4NdDoDh4Tu
http://razehub.com/NN70nExbtLO
http://arcb.ro/aHUUNxE3Me5
http://cfmi.tg/m40YS6gDO0
http://sweetlittle.mx/ZCXP0dT2h
http://alkimia-prod.com/nT0imyzmo
http://almexperts.co.za/fEoJ3pdWZbF
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 1 IoCs
resource yara_rule behavioral1/memory/948-56-0x0000000010000000-0x000000001004D000-memory.dmp squirrelwaffle -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1536 wrote to memory of 948 1536 rundll32.exe 27 PID 1536 wrote to memory of 948 1536 rundll32.exe 27 PID 1536 wrote to memory of 948 1536 rundll32.exe 27 PID 1536 wrote to memory of 948 1536 rundll32.exe 27 PID 1536 wrote to memory of 948 1536 rundll32.exe 27 PID 1536 wrote to memory of 948 1536 rundll32.exe 27 PID 1536 wrote to memory of 948 1536 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aee5cf0bb757e2fabdeaecb30146e1e6e8d8ca84540099d34ead5ce85e9c2631.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aee5cf0bb757e2fabdeaecb30146e1e6e8d8ca84540099d34ead5ce85e9c2631.dll,#12⤵PID:948
-