Analysis
-
max time kernel
166s -
max time network
183s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21-01-2022 23:19
Static task
static1
Behavioral task
behavioral1
Sample
aee5cf0bb757e2fabdeaecb30146e1e6e8d8ca84540099d34ead5ce85e9c2631.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
aee5cf0bb757e2fabdeaecb30146e1e6e8d8ca84540099d34ead5ce85e9c2631.dll
Resource
win10-en-20211208
General
-
Target
aee5cf0bb757e2fabdeaecb30146e1e6e8d8ca84540099d34ead5ce85e9c2631.dll
-
Size
309KB
-
MD5
1b249d3f102f8e7b438feb277d3129a7
-
SHA1
10fbf8934af0afa1fd231a38ec13002cad531cdf
-
SHA256
aee5cf0bb757e2fabdeaecb30146e1e6e8d8ca84540099d34ead5ce85e9c2631
-
SHA512
0083d2f20e782bef1643a7e705378ce1c35c6917fbd9e152c635f5b93b2dafe62f39412113b23c9c3fd0616c69b6d31faf3d364acb5f1d83d84a6ad7372dd7cb
Malware Config
Extracted
squirrelwaffle
http://atertreat.in/5iPPVRKPPX9
http://incentivaconsultores.com.co/55jHpKCc9DWy
http://cdelean.org/0qvbbmu9g
http://bazy.ps/M6SjrMSYC
http://sukmabali.com/ZXxcLYs3rzRQ
http://bugwilliam.tk/cbB56YrugdbW
http://bestbeatsgh.com/42D7OwuPen
http://krumaila.com/UZ4NdDoDh4Tu
http://razehub.com/NN70nExbtLO
http://arcb.ro/aHUUNxE3Me5
http://cfmi.tg/m40YS6gDO0
http://sweetlittle.mx/ZCXP0dT2h
http://alkimia-prod.com/nT0imyzmo
http://almexperts.co.za/fEoJ3pdWZbF
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 1 IoCs
resource yara_rule behavioral2/memory/4192-116-0x0000000010000000-0x000000001004D000-memory.dmp squirrelwaffle -
Blocklisted process makes network request 4 IoCs
flow pid Process 27 4192 rundll32.exe 29 4192 rundll32.exe 32 4192 rundll32.exe 34 4192 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4176 wrote to memory of 4192 4176 rundll32.exe 69 PID 4176 wrote to memory of 4192 4176 rundll32.exe 69 PID 4176 wrote to memory of 4192 4176 rundll32.exe 69
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aee5cf0bb757e2fabdeaecb30146e1e6e8d8ca84540099d34ead5ce85e9c2631.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aee5cf0bb757e2fabdeaecb30146e1e6e8d8ca84540099d34ead5ce85e9c2631.dll,#12⤵
- Blocklisted process makes network request
PID:4192
-