Analysis
-
max time kernel
156s -
max time network
178s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21-01-2022 23:22
Static task
static1
Behavioral task
behavioral1
Sample
a669aa3f77aa5413dde1ef8763898419334a20782dc9d9511c28446b84be9dd3.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
a669aa3f77aa5413dde1ef8763898419334a20782dc9d9511c28446b84be9dd3.dll
Resource
win10-en-20211208
General
-
Target
a669aa3f77aa5413dde1ef8763898419334a20782dc9d9511c28446b84be9dd3.dll
-
Size
310KB
-
MD5
537a4c1e896045d158c7f0900056917d
-
SHA1
7b67ecb201e6f031687a3724befa17dd6f40765a
-
SHA256
a669aa3f77aa5413dde1ef8763898419334a20782dc9d9511c28446b84be9dd3
-
SHA512
dbae52be5a4fc9af111526dc4cce14edf75b184d5c439c337e68589e176ef28da0a3d007ec896d9d93b8feac72d128d3ad107fa6ea946648c3841a890e98e16c
Malware Config
Extracted
squirrelwaffle
http://atertreat.in/5iPPVRKPPX9
http://incentivaconsultores.com.co/55jHpKCc9DWy
http://cdelean.org/0qvbbmu9g
http://bazy.ps/M6SjrMSYC
http://sukmabali.com/ZXxcLYs3rzRQ
http://bugwilliam.tk/cbB56YrugdbW
http://bestbeatsgh.com/42D7OwuPen
http://krumaila.com/UZ4NdDoDh4Tu
http://razehub.com/NN70nExbtLO
http://arcb.ro/aHUUNxE3Me5
http://cfmi.tg/m40YS6gDO0
http://sweetlittle.mx/ZCXP0dT2h
http://alkimia-prod.com/nT0imyzmo
http://almexperts.co.za/fEoJ3pdWZbF
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
suricata: ET MALWARE SQUIRRELWAFFLE Loader Activity (POST)
suricata: ET MALWARE SQUIRRELWAFFLE Loader Activity (POST)
-
Squirrelwaffle Payload 1 IoCs
resource yara_rule behavioral2/memory/2344-119-0x0000000010000000-0x000000001004D000-memory.dmp squirrelwaffle -
Blocklisted process makes network request 5 IoCs
flow pid Process 23 2344 rundll32.exe 31 2344 rundll32.exe 35 2344 rundll32.exe 41 2344 rundll32.exe 43 2344 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3708 wrote to memory of 2344 3708 rundll32.exe 69 PID 3708 wrote to memory of 2344 3708 rundll32.exe 69 PID 3708 wrote to memory of 2344 3708 rundll32.exe 69
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a669aa3f77aa5413dde1ef8763898419334a20782dc9d9511c28446b84be9dd3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a669aa3f77aa5413dde1ef8763898419334a20782dc9d9511c28446b84be9dd3.dll,#12⤵
- Blocklisted process makes network request
PID:2344
-