Analysis
-
max time kernel
151s -
max time network
160s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21-01-2022 23:36
Static task
static1
Behavioral task
behavioral1
Sample
7f7d5db545a6695054a13b75a0572ac264b0e5c7dce966195c5fa0cbd6ca5072.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7f7d5db545a6695054a13b75a0572ac264b0e5c7dce966195c5fa0cbd6ca5072.dll
Resource
win10-en-20211208
General
-
Target
7f7d5db545a6695054a13b75a0572ac264b0e5c7dce966195c5fa0cbd6ca5072.dll
-
Size
256KB
-
MD5
3fcaf5c6eb5fb122867df85d9aceb241
-
SHA1
31e8cbdb151896138aaa5a265fb6d2c6f7192186
-
SHA256
7f7d5db545a6695054a13b75a0572ac264b0e5c7dce966195c5fa0cbd6ca5072
-
SHA512
1fbadd3b661dc080b9267a0ea604da134718ccfc716238c498d2fe6422105eb7b996b039adc3f3038a4608581568243c856741322f97c4d21e6d18874b3565a1
Malware Config
Extracted
squirrelwaffle
http://acdlimited.com/2u6aW9Pfe
http://jornaldasoficinas.com/ZF8GKIGVDupL
http://orldofjain.com/lMsTA7tSYpe
http://altayaralsudani.net/SSUsPgb7PHgC
http://hoteloaktree.com/QthLWsZsVgb
http://aterwellnessinc.com/U7D0sswwp
http://sirifinco.com/Urbhq9wO50j
http://ordpress17.com/5WG6Z62sKWo
http://mohsinkhanfoundation.com/pcQLeLMbur
http://lendbiz.vn/xj3BhHtMbf
http://geosever.rs/ObHP1CHt
http://nuevainfotech.com/xCNyTjzkoe
http://dadabhoy.pk/m6rQE94U
http://111
http://sjgrand.lk/zvMYuQqEZj
http://erogholding.com/GFM1QcCFk
http://armordetailing.rs/lgfrZb4Re6WO
http://lefrenchwineclub.com/eRUGdDox
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 2 IoCs
resource yara_rule behavioral2/memory/2368-120-0x0000000010000000-0x0000000010010000-memory.dmp squirrelwaffle behavioral2/memory/2368-121-0x0000000010000000-0x00000000100D6000-memory.dmp squirrelwaffle -
Blocklisted process makes network request 4 IoCs
flow pid Process 27 2368 rundll32.exe 30 2368 rundll32.exe 31 2368 rundll32.exe 33 2368 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2368 2152 rundll32.exe 68 PID 2152 wrote to memory of 2368 2152 rundll32.exe 68 PID 2152 wrote to memory of 2368 2152 rundll32.exe 68
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f7d5db545a6695054a13b75a0572ac264b0e5c7dce966195c5fa0cbd6ca5072.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f7d5db545a6695054a13b75a0572ac264b0e5c7dce966195c5fa0cbd6ca5072.dll,#12⤵
- Blocklisted process makes network request
PID:2368
-