Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
183s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21/01/2022, 23:30
Static task
static1
Behavioral task
behavioral1
Sample
8ed766a294811e4b1f73ecdb4f2675b41cc50783b31e2c3b546715cbbf4ae5dc.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
8ed766a294811e4b1f73ecdb4f2675b41cc50783b31e2c3b546715cbbf4ae5dc.dll
Resource
win10-en-20211208
General
-
Target
8ed766a294811e4b1f73ecdb4f2675b41cc50783b31e2c3b546715cbbf4ae5dc.dll
-
Size
507KB
-
MD5
f3a8b9bbe9e0e7c8b1e47b241feb0ea1
-
SHA1
3aa5a1fefe4f4948dc578accb623c4fac5044820
-
SHA256
8ed766a294811e4b1f73ecdb4f2675b41cc50783b31e2c3b546715cbbf4ae5dc
-
SHA512
a843494ac8cb268adcb661f3a8e7c1b1c9b68aa001959c4e93b26cc356899da449e6c471b89694efdf351b47ddc64e763d72f053307539c1a54cc27816739837
Malware Config
Extracted
squirrelwaffle
http://acdlimited.com/2u6aW9Pfe
http://jornaldasoficinas.com/ZF8GKIGVDupL
http://orldofjain.com/lMsTA7tSYpe
http://altayaralsudani.net/SSUsPgb7PHgC
http://hoteloaktree.com/QthLWsZsVgb
http://aterwellnessinc.com/U7D0sswwp
http://sirifinco.com/Urbhq9wO50j
http://ordpress17.com/5WG6Z62sKWo
http://mohsinkhanfoundation.com/pcQLeLMbur
http://lendbiz.vn/xj3BhHtMbf
http://geosever.rs/ObHP1CHt
http://nuevainfotech.com/xCNyTjzkoe
http://dadabhoy.pk/m6rQE94U
http://111
http://sjgrand.lk/zvMYuQqEZj
http://erogholding.com/GFM1QcCFk
http://armordetailing.rs/lgfrZb4Re6WO
http://lefrenchwineclub.com/eRUGdDox
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 2 IoCs
resource yara_rule behavioral2/memory/2836-119-0x0000000005290000-0x00000000052A1000-memory.dmp squirrelwaffle behavioral2/memory/2836-120-0x00000000052B0000-0x00000000052C0000-memory.dmp squirrelwaffle -
Program crash 1 IoCs
pid pid_target Process procid_target 3372 2836 WerFault.exe 69 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3372 WerFault.exe 3372 WerFault.exe 3372 WerFault.exe 3372 WerFault.exe 3372 WerFault.exe 3372 WerFault.exe 3372 WerFault.exe 3372 WerFault.exe 3372 WerFault.exe 3372 WerFault.exe 3372 WerFault.exe 3372 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3372 WerFault.exe Token: SeBackupPrivilege 3372 WerFault.exe Token: SeDebugPrivilege 3372 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2836 2888 rundll32.exe 69 PID 2888 wrote to memory of 2836 2888 rundll32.exe 69 PID 2888 wrote to memory of 2836 2888 rundll32.exe 69
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ed766a294811e4b1f73ecdb4f2675b41cc50783b31e2c3b546715cbbf4ae5dc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ed766a294811e4b1f73ecdb4f2675b41cc50783b31e2c3b546715cbbf4ae5dc.dll,#12⤵PID:2836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 7003⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3372
-
-