Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
124s -
max time network
173s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
30/01/2022, 15:26
Static task
static1
Behavioral task
behavioral1
Sample
3a7fab640591f62eff86d47ae9ae92fe621895bb6f369ee13ff05c9a54e9c8fa.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
3a7fab640591f62eff86d47ae9ae92fe621895bb6f369ee13ff05c9a54e9c8fa.dll
Resource
win10-en-20211208
General
-
Target
3a7fab640591f62eff86d47ae9ae92fe621895bb6f369ee13ff05c9a54e9c8fa.dll
-
Size
498KB
-
MD5
b420ad4aebfc38a2091d253828f57a14
-
SHA1
30855bb558d1ab9282e38027b7b5b3e03882a041
-
SHA256
3a7fab640591f62eff86d47ae9ae92fe621895bb6f369ee13ff05c9a54e9c8fa
-
SHA512
fb5246d4c0c033b070f06e7086845e2e343db0cb346998d4526470f4e301b6ca1b1f4769ff08e331d021720ed9eb7ef0ea84455b17702d5c07e29adaaae4ccbd
Malware Config
Extracted
squirrelwaffle
http://acdlimited.com/2u6aW9Pfe
http://jornaldasoficinas.com/ZF8GKIGVDupL
http://orldofjain.com/lMsTA7tSYpe
http://altayaralsudani.net/SSUsPgb7PHgC
http://hoteloaktree.com/QthLWsZsVgb
http://aterwellnessinc.com/U7D0sswwp
http://sirifinco.com/Urbhq9wO50j
http://ordpress17.com/5WG6Z62sKWo
http://mohsinkhanfoundation.com/pcQLeLMbur
http://lendbiz.vn/xj3BhHtMbf
http://geosever.rs/ObHP1CHt
http://nuevainfotech.com/xCNyTjzkoe
http://dadabhoy.pk/m6rQE94U
http://111
http://sjgrand.lk/zvMYuQqEZj
http://erogholding.com/GFM1QcCFk
http://armordetailing.rs/lgfrZb4Re6WO
http://lefrenchwineclub.com/eRUGdDox
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 2 IoCs
resource yara_rule behavioral2/memory/2820-120-0x0000000004530000-0x0000000004540000-memory.dmp squirrelwaffle behavioral2/memory/2820-119-0x0000000002D50000-0x0000000002D61000-memory.dmp squirrelwaffle -
Program crash 1 IoCs
pid pid_target Process procid_target 3776 2820 WerFault.exe 68 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3776 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3776 WerFault.exe Token: SeBackupPrivilege 3776 WerFault.exe Token: SeDebugPrivilege 3776 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2820 3048 rundll32.exe 68 PID 3048 wrote to memory of 2820 3048 rundll32.exe 68 PID 3048 wrote to memory of 2820 3048 rundll32.exe 68
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3a7fab640591f62eff86d47ae9ae92fe621895bb6f369ee13ff05c9a54e9c8fa.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3a7fab640591f62eff86d47ae9ae92fe621895bb6f369ee13ff05c9a54e9c8fa.dll,#12⤵PID:2820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 7003⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3776
-
-