Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21-01-2022 23:43
Static task
static1
Behavioral task
behavioral1
Sample
6b5f6b2ea1830a26e585538167b38c14593adcfa5cd7d6546f0015cee5231ce7.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
6b5f6b2ea1830a26e585538167b38c14593adcfa5cd7d6546f0015cee5231ce7.dll
Resource
win10-en-20211208
General
-
Target
6b5f6b2ea1830a26e585538167b38c14593adcfa5cd7d6546f0015cee5231ce7.dll
-
Size
312KB
-
MD5
de0bd1784146cc76e4665f1143650ab1
-
SHA1
bd318e277e0154b3fac7210978f87082f988f87f
-
SHA256
6b5f6b2ea1830a26e585538167b38c14593adcfa5cd7d6546f0015cee5231ce7
-
SHA512
95468d5dd517788c6f331149fa2c5561c0f18650c2fecd97883f904f49544b6a5fa0df5b5ee2e2bee2c09fa32ccdd196d983cbb63f9f21e608fe5529ad39ed2a
Malware Config
Extracted
squirrelwaffle
http://atertreat.in/5iPPVRKPPX9
http://incentivaconsultores.com.co/55jHpKCc9DWy
http://cdelean.org/0qvbbmu9g
http://bazy.ps/M6SjrMSYC
http://sukmabali.com/ZXxcLYs3rzRQ
http://bugwilliam.tk/cbB56YrugdbW
http://bestbeatsgh.com/42D7OwuPen
http://krumaila.com/UZ4NdDoDh4Tu
http://razehub.com/NN70nExbtLO
http://arcb.ro/aHUUNxE3Me5
http://cfmi.tg/m40YS6gDO0
http://sweetlittle.mx/ZCXP0dT2h
http://alkimia-prod.com/nT0imyzmo
http://almexperts.co.za/fEoJ3pdWZbF
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
suricata: ET MALWARE SQUIRRELWAFFLE Loader Activity (POST)
suricata: ET MALWARE SQUIRRELWAFFLE Loader Activity (POST)
-
Squirrelwaffle Payload 1 IoCs
resource yara_rule behavioral2/memory/2504-116-0x0000000010000000-0x000000001004D000-memory.dmp squirrelwaffle -
Blocklisted process makes network request 5 IoCs
flow pid Process 17 2504 rundll32.exe 25 2504 rundll32.exe 29 2504 rundll32.exe 31 2504 rundll32.exe 33 2504 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2504 2428 rundll32.exe 68 PID 2428 wrote to memory of 2504 2428 rundll32.exe 68 PID 2428 wrote to memory of 2504 2428 rundll32.exe 68
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6b5f6b2ea1830a26e585538167b38c14593adcfa5cd7d6546f0015cee5231ce7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6b5f6b2ea1830a26e585538167b38c14593adcfa5cd7d6546f0015cee5231ce7.dll,#12⤵
- Blocklisted process makes network request
PID:2504
-