Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21-01-2022 23:20
Static task
static1
Behavioral task
behavioral1
Sample
aa3ff385ea80149fddbc8dbec7b7a5cd4071da3dc6133dbe35efdc33a6db06b0.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
aa3ff385ea80149fddbc8dbec7b7a5cd4071da3dc6133dbe35efdc33a6db06b0.dll
Resource
win10-en-20211208
General
-
Target
aa3ff385ea80149fddbc8dbec7b7a5cd4071da3dc6133dbe35efdc33a6db06b0.dll
-
Size
318KB
-
MD5
18e015758c96c940e1303d0be78d7630
-
SHA1
b3548fedf1fe5cdfc143fec47fca3fdedf1ec312
-
SHA256
aa3ff385ea80149fddbc8dbec7b7a5cd4071da3dc6133dbe35efdc33a6db06b0
-
SHA512
8f7cf002d255ee20be5924be50c6e263a9cddc34d0c479a9ab0a3860b5ad4c114979bf7922ae755094a23546dd0f21f1d759742e3d8758cf987d67af4f47b6b0
Malware Config
Extracted
squirrelwaffle
http://atertreat.in/5iPPVRKPPX9
http://incentivaconsultores.com.co/55jHpKCc9DWy
http://cdelean.org/0qvbbmu9g
http://bazy.ps/M6SjrMSYC
http://sukmabali.com/ZXxcLYs3rzRQ
http://bugwilliam.tk/cbB56YrugdbW
http://bestbeatsgh.com/42D7OwuPen
http://krumaila.com/UZ4NdDoDh4Tu
http://razehub.com/NN70nExbtLO
http://arcb.ro/aHUUNxE3Me5
http://cfmi.tg/m40YS6gDO0
http://sweetlittle.mx/ZCXP0dT2h
http://alkimia-prod.com/nT0imyzmo
http://almexperts.co.za/fEoJ3pdWZbF
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 1 IoCs
resource yara_rule behavioral1/memory/852-57-0x0000000010000000-0x000000001004D000-memory.dmp squirrelwaffle -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1628 wrote to memory of 852 1628 rundll32.exe 27 PID 1628 wrote to memory of 852 1628 rundll32.exe 27 PID 1628 wrote to memory of 852 1628 rundll32.exe 27 PID 1628 wrote to memory of 852 1628 rundll32.exe 27 PID 1628 wrote to memory of 852 1628 rundll32.exe 27 PID 1628 wrote to memory of 852 1628 rundll32.exe 27 PID 1628 wrote to memory of 852 1628 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aa3ff385ea80149fddbc8dbec7b7a5cd4071da3dc6133dbe35efdc33a6db06b0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aa3ff385ea80149fddbc8dbec7b7a5cd4071da3dc6133dbe35efdc33a6db06b0.dll,#12⤵PID:852
-