Analysis
-
max time kernel
172s -
max time network
197s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21-01-2022 23:39
Static task
static1
Behavioral task
behavioral1
Sample
777addf1e748572c3250cbaea20a1aafa19dad08d1e544d7e030e71a66a5ec82.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
777addf1e748572c3250cbaea20a1aafa19dad08d1e544d7e030e71a66a5ec82.dll
Resource
win10-en-20211208
General
-
Target
777addf1e748572c3250cbaea20a1aafa19dad08d1e544d7e030e71a66a5ec82.dll
-
Size
489KB
-
MD5
c241132a6549df034d28bb446fd02d38
-
SHA1
1741463c4659539643009436f436819ecdb8f008
-
SHA256
777addf1e748572c3250cbaea20a1aafa19dad08d1e544d7e030e71a66a5ec82
-
SHA512
bac2126cef2864230e039102a4ad89397dab0f1e9d8e7207b43c93259a3954147de43f355faf57a2b27b3f36d71b053ae26b3942f7bac466becf03cd5846a0e4
Malware Config
Extracted
squirrelwaffle
http://acdlimited.com/2u6aW9Pfe
http://jornaldasoficinas.com/ZF8GKIGVDupL
http://orldofjain.com/lMsTA7tSYpe
http://altayaralsudani.net/SSUsPgb7PHgC
http://hoteloaktree.com/QthLWsZsVgb
http://aterwellnessinc.com/U7D0sswwp
http://sirifinco.com/Urbhq9wO50j
http://ordpress17.com/5WG6Z62sKWo
http://mohsinkhanfoundation.com/pcQLeLMbur
http://lendbiz.vn/xj3BhHtMbf
http://geosever.rs/ObHP1CHt
http://nuevainfotech.com/xCNyTjzkoe
http://dadabhoy.pk/m6rQE94U
http://111
http://sjgrand.lk/zvMYuQqEZj
http://erogholding.com/GFM1QcCFk
http://armordetailing.rs/lgfrZb4Re6WO
http://lefrenchwineclub.com/eRUGdDox
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 2 IoCs
resource yara_rule behavioral2/memory/880-117-0x00000000045F0000-0x0000000004601000-memory.dmp squirrelwaffle behavioral2/memory/880-118-0x00000000041D0000-0x00000000041E0000-memory.dmp squirrelwaffle -
Program crash 1 IoCs
pid pid_target Process procid_target 1456 880 WerFault.exe 69 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1456 WerFault.exe 1456 WerFault.exe 1456 WerFault.exe 1456 WerFault.exe 1456 WerFault.exe 1456 WerFault.exe 1456 WerFault.exe 1456 WerFault.exe 1456 WerFault.exe 1456 WerFault.exe 1456 WerFault.exe 1456 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1456 WerFault.exe Token: SeBackupPrivilege 1456 WerFault.exe Token: SeDebugPrivilege 1456 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3700 wrote to memory of 880 3700 rundll32.exe 69 PID 3700 wrote to memory of 880 3700 rundll32.exe 69 PID 3700 wrote to memory of 880 3700 rundll32.exe 69
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\777addf1e748572c3250cbaea20a1aafa19dad08d1e544d7e030e71a66a5ec82.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\777addf1e748572c3250cbaea20a1aafa19dad08d1e544d7e030e71a66a5ec82.dll,#12⤵PID:880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 7003⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-