Analysis
-
max time kernel
159s -
max time network
173s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21-01-2022 23:45
Static task
static1
Behavioral task
behavioral1
Sample
647e8c0f87b8325c6d9015253724643c077d7d5a21e2e15053ae94847d868c5a.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
647e8c0f87b8325c6d9015253724643c077d7d5a21e2e15053ae94847d868c5a.dll
Resource
win10-en-20211208
General
-
Target
647e8c0f87b8325c6d9015253724643c077d7d5a21e2e15053ae94847d868c5a.dll
-
Size
310KB
-
MD5
d78be1aaae573167680db8be2768b720
-
SHA1
6e4786485813ec70d6d4ae7585e4034e87b37991
-
SHA256
647e8c0f87b8325c6d9015253724643c077d7d5a21e2e15053ae94847d868c5a
-
SHA512
c481ebaffe97603fd6de7e44c3a1d0a6a42386ecdddf1b001ce63fe81a15b082a1d88decf54e17ec94c3830b20b5331b4e8fe2423f913e7e659396d374b16495
Malware Config
Extracted
squirrelwaffle
http://hutraders.com/0eeUtmJf8O
http://goodartishard.com/0JXDM9kMwx
http://now.byteinsure.com/tnjUrmlhN
http://asceaub.com/Xl8UCLSU
http://colchonesmanzur.com/GjVgBnKaNIC
http://sistemasati.com/0SzGNkx6P
http://maldivehost.net/zLIisQRWZI9
http://lrdgon.org/l7r96tjAJ
http://binnawaz.com.pk/jhSZGWS76C
http://fhstorse.com/vJlgdjJnpIop
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 2 IoCs
resource yara_rule behavioral2/memory/3148-117-0x0000000073620000-0x0000000073630000-memory.dmp squirrelwaffle behavioral2/memory/3148-118-0x0000000073620000-0x00000000736FF000-memory.dmp squirrelwaffle -
Blocklisted process makes network request 3 IoCs
flow pid Process 15 3148 rundll32.exe 29 3148 rundll32.exe 36 3148 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3840 wrote to memory of 3148 3840 rundll32.exe 69 PID 3840 wrote to memory of 3148 3840 rundll32.exe 69 PID 3840 wrote to memory of 3148 3840 rundll32.exe 69
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\647e8c0f87b8325c6d9015253724643c077d7d5a21e2e15053ae94847d868c5a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\647e8c0f87b8325c6d9015253724643c077d7d5a21e2e15053ae94847d868c5a.dll,#12⤵
- Blocklisted process makes network request
PID:3148
-