Analysis
-
max time kernel
117s -
max time network
140s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21-01-2022 23:44
Static task
static1
Behavioral task
behavioral1
Sample
67a63fdf13aa81b714cd3513b452afec88671ad5930535a158fa995c116e603b.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
67a63fdf13aa81b714cd3513b452afec88671ad5930535a158fa995c116e603b.dll
Resource
win10-en-20211208
General
-
Target
67a63fdf13aa81b714cd3513b452afec88671ad5930535a158fa995c116e603b.dll
-
Size
500KB
-
MD5
06c113520b7c6b424f9525a67769c4fb
-
SHA1
34d450fba9d83ee269fe1c3efe40e0fdd3e48375
-
SHA256
67a63fdf13aa81b714cd3513b452afec88671ad5930535a158fa995c116e603b
-
SHA512
0e88ac42465687b94b4a8a7a85a53a6aec87d66b87dffecead26edbcab4693fa02c6361f96f6d60fb70f82bc7fbda6c7ba405a46fb984e0444a9db76fa1722b5
Malware Config
Extracted
squirrelwaffle
http://acdlimited.com/2u6aW9Pfe
http://jornaldasoficinas.com/ZF8GKIGVDupL
http://orldofjain.com/lMsTA7tSYpe
http://altayaralsudani.net/SSUsPgb7PHgC
http://hoteloaktree.com/QthLWsZsVgb
http://aterwellnessinc.com/U7D0sswwp
http://sirifinco.com/Urbhq9wO50j
http://ordpress17.com/5WG6Z62sKWo
http://mohsinkhanfoundation.com/pcQLeLMbur
http://lendbiz.vn/xj3BhHtMbf
http://geosever.rs/ObHP1CHt
http://nuevainfotech.com/xCNyTjzkoe
http://dadabhoy.pk/m6rQE94U
http://111
http://sjgrand.lk/zvMYuQqEZj
http://erogholding.com/GFM1QcCFk
http://armordetailing.rs/lgfrZb4Re6WO
http://lefrenchwineclub.com/eRUGdDox
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 2 IoCs
resource yara_rule behavioral2/memory/3104-118-0x00000000036E0000-0x00000000036F1000-memory.dmp squirrelwaffle behavioral2/memory/3104-119-0x0000000003720000-0x0000000003730000-memory.dmp squirrelwaffle -
Program crash 1 IoCs
pid pid_target Process procid_target 636 3104 WerFault.exe 69 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 636 WerFault.exe Token: SeBackupPrivilege 636 WerFault.exe Token: SeDebugPrivilege 636 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1908 wrote to memory of 3104 1908 rundll32.exe 69 PID 1908 wrote to memory of 3104 1908 rundll32.exe 69 PID 1908 wrote to memory of 3104 1908 rundll32.exe 69
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\67a63fdf13aa81b714cd3513b452afec88671ad5930535a158fa995c116e603b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\67a63fdf13aa81b714cd3513b452afec88671ad5930535a158fa995c116e603b.dll,#12⤵PID:3104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 7003⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:636
-
-