Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21-01-2022 23:45
Static task
static1
Behavioral task
behavioral1
Sample
647e8c0f87b8325c6d9015253724643c077d7d5a21e2e15053ae94847d868c5a.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
647e8c0f87b8325c6d9015253724643c077d7d5a21e2e15053ae94847d868c5a.dll
Resource
win10-en-20211208
General
-
Target
647e8c0f87b8325c6d9015253724643c077d7d5a21e2e15053ae94847d868c5a.dll
-
Size
310KB
-
MD5
d78be1aaae573167680db8be2768b720
-
SHA1
6e4786485813ec70d6d4ae7585e4034e87b37991
-
SHA256
647e8c0f87b8325c6d9015253724643c077d7d5a21e2e15053ae94847d868c5a
-
SHA512
c481ebaffe97603fd6de7e44c3a1d0a6a42386ecdddf1b001ce63fe81a15b082a1d88decf54e17ec94c3830b20b5331b4e8fe2423f913e7e659396d374b16495
Malware Config
Extracted
squirrelwaffle
http://hutraders.com/0eeUtmJf8O
http://goodartishard.com/0JXDM9kMwx
http://now.byteinsure.com/tnjUrmlhN
http://asceaub.com/Xl8UCLSU
http://colchonesmanzur.com/GjVgBnKaNIC
http://sistemasati.com/0SzGNkx6P
http://maldivehost.net/zLIisQRWZI9
http://lrdgon.org/l7r96tjAJ
http://binnawaz.com.pk/jhSZGWS76C
http://fhstorse.com/vJlgdjJnpIop
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 2 IoCs
resource yara_rule behavioral1/memory/1224-59-0x0000000074D20000-0x0000000074DFF000-memory.dmp squirrelwaffle behavioral1/memory/1224-58-0x0000000074D20000-0x0000000074D30000-memory.dmp squirrelwaffle -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1224 2008 rundll32.exe 27 PID 2008 wrote to memory of 1224 2008 rundll32.exe 27 PID 2008 wrote to memory of 1224 2008 rundll32.exe 27 PID 2008 wrote to memory of 1224 2008 rundll32.exe 27 PID 2008 wrote to memory of 1224 2008 rundll32.exe 27 PID 2008 wrote to memory of 1224 2008 rundll32.exe 27 PID 2008 wrote to memory of 1224 2008 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\647e8c0f87b8325c6d9015253724643c077d7d5a21e2e15053ae94847d868c5a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\647e8c0f87b8325c6d9015253724643c077d7d5a21e2e15053ae94847d868c5a.dll,#12⤵PID:1224
-