Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
30/01/2022, 15:38
Static task
static1
Behavioral task
behavioral1
Sample
2fd56c4de1db7097a3c2545e2ebb70f83d6c0ee9ebe3c70b80b8a3f29267c7a6.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2fd56c4de1db7097a3c2545e2ebb70f83d6c0ee9ebe3c70b80b8a3f29267c7a6.dll
Resource
win10-en-20211208
General
-
Target
2fd56c4de1db7097a3c2545e2ebb70f83d6c0ee9ebe3c70b80b8a3f29267c7a6.dll
-
Size
322KB
-
MD5
7838f2a7503355dfeaa7d097158a55d3
-
SHA1
94a0fc34b3220f40d9ba8cfc9a26eaf78305214a
-
SHA256
2fd56c4de1db7097a3c2545e2ebb70f83d6c0ee9ebe3c70b80b8a3f29267c7a6
-
SHA512
c9e3c966054f67f956f59ef19505a17b013635b23aebc54906cff476deffb8209372deef28a82ee5fc0c090b0046cb34c4b41ffbfcae3073f46d40fc270df35b
Malware Config
Extracted
squirrelwaffle
http://atertreat.in/5iPPVRKPPX9
http://incentivaconsultores.com.co/55jHpKCc9DWy
http://cdelean.org/0qvbbmu9g
http://bazy.ps/M6SjrMSYC
http://sukmabali.com/ZXxcLYs3rzRQ
http://bugwilliam.tk/cbB56YrugdbW
http://bestbeatsgh.com/42D7OwuPen
http://krumaila.com/UZ4NdDoDh4Tu
http://razehub.com/NN70nExbtLO
http://arcb.ro/aHUUNxE3Me5
http://cfmi.tg/m40YS6gDO0
http://sweetlittle.mx/ZCXP0dT2h
http://alkimia-prod.com/nT0imyzmo
http://almexperts.co.za/fEoJ3pdWZbF
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 1 IoCs
resource yara_rule behavioral2/memory/2800-116-0x0000000010000000-0x000000001004D000-memory.dmp squirrelwaffle -
Blocklisted process makes network request 5 IoCs
flow pid Process 17 2800 rundll32.exe 25 2800 rundll32.exe 29 2800 rundll32.exe 31 2800 rundll32.exe 33 2800 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2800 2740 rundll32.exe 68 PID 2740 wrote to memory of 2800 2740 rundll32.exe 68 PID 2740 wrote to memory of 2800 2740 rundll32.exe 68
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2fd56c4de1db7097a3c2545e2ebb70f83d6c0ee9ebe3c70b80b8a3f29267c7a6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2fd56c4de1db7097a3c2545e2ebb70f83d6c0ee9ebe3c70b80b8a3f29267c7a6.dll,#12⤵
- Blocklisted process makes network request
PID:2800
-