Analysis
-
max time kernel
121s -
max time network
143s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
30-01-2022 15:20
Static task
static1
Behavioral task
behavioral1
Sample
3d6c14cf2ad05a9fd3ae82c699a2ae5701851bac04829ccc7459fbc96b468997.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
3d6c14cf2ad05a9fd3ae82c699a2ae5701851bac04829ccc7459fbc96b468997.dll
Resource
win10-en-20211208
General
-
Target
3d6c14cf2ad05a9fd3ae82c699a2ae5701851bac04829ccc7459fbc96b468997.dll
-
Size
489KB
-
MD5
1c4d98b8f4088fcd0acfad86d3dd66a2
-
SHA1
0c250ba26d5d86ac35888b405dbdd6977f5ef657
-
SHA256
3d6c14cf2ad05a9fd3ae82c699a2ae5701851bac04829ccc7459fbc96b468997
-
SHA512
bb2c486849d8b11de1caa4d128819a966e5fac859405e11a3608580fd3159d5ccaec86136ced5caab76fe20a7c04aad525b734d22b0739214c8e9dd614dc2e19
Malware Config
Extracted
squirrelwaffle
http://acdlimited.com/2u6aW9Pfe
http://jornaldasoficinas.com/ZF8GKIGVDupL
http://orldofjain.com/lMsTA7tSYpe
http://altayaralsudani.net/SSUsPgb7PHgC
http://hoteloaktree.com/QthLWsZsVgb
http://aterwellnessinc.com/U7D0sswwp
http://sirifinco.com/Urbhq9wO50j
http://ordpress17.com/5WG6Z62sKWo
http://mohsinkhanfoundation.com/pcQLeLMbur
http://lendbiz.vn/xj3BhHtMbf
http://geosever.rs/ObHP1CHt
http://nuevainfotech.com/xCNyTjzkoe
http://dadabhoy.pk/m6rQE94U
http://111
http://sjgrand.lk/zvMYuQqEZj
http://erogholding.com/GFM1QcCFk
http://armordetailing.rs/lgfrZb4Re6WO
http://lefrenchwineclub.com/eRUGdDox
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 2 IoCs
resource yara_rule behavioral2/memory/3704-116-0x0000000002BE0000-0x0000000002BF1000-memory.dmp squirrelwaffle behavioral2/memory/3704-117-0x0000000002C00000-0x0000000002C10000-memory.dmp squirrelwaffle -
Program crash 1 IoCs
pid pid_target Process procid_target 748 3704 WerFault.exe 69 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 748 WerFault.exe 748 WerFault.exe 748 WerFault.exe 748 WerFault.exe 748 WerFault.exe 748 WerFault.exe 748 WerFault.exe 748 WerFault.exe 748 WerFault.exe 748 WerFault.exe 748 WerFault.exe 748 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 748 WerFault.exe Token: SeBackupPrivilege 748 WerFault.exe Token: SeDebugPrivilege 748 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3420 wrote to memory of 3704 3420 rundll32.exe 69 PID 3420 wrote to memory of 3704 3420 rundll32.exe 69 PID 3420 wrote to memory of 3704 3420 rundll32.exe 69
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3d6c14cf2ad05a9fd3ae82c699a2ae5701851bac04829ccc7459fbc96b468997.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3d6c14cf2ad05a9fd3ae82c699a2ae5701851bac04829ccc7459fbc96b468997.dll,#12⤵PID:3704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 7003⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:748
-
-