Analysis
-
max time kernel
157s -
max time network
157s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
30-01-2022 15:59
Static task
static1
Behavioral task
behavioral1
Sample
22e427d636088505aed35304009c2ac23ae4f39784fa95d0d9d3ca12c71d3834.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
22e427d636088505aed35304009c2ac23ae4f39784fa95d0d9d3ca12c71d3834.dll
Resource
win10-en-20211208
General
-
Target
22e427d636088505aed35304009c2ac23ae4f39784fa95d0d9d3ca12c71d3834.dll
-
Size
221KB
-
MD5
841480e5194b30eea811a0f9e8c33caf
-
SHA1
77e0043bfd1556a181f4dc23269e85eaa7858f4a
-
SHA256
22e427d636088505aed35304009c2ac23ae4f39784fa95d0d9d3ca12c71d3834
-
SHA512
7669cb2f7da65a3dc1b182b239d734c08b82549473a13f7f4b4b215d38faf8afb5184583cc69143d245547f026982a4152309b9f644f29205dcb8b4a0ef21f82
Malware Config
Extracted
squirrelwaffle
http://pop.vicamtaynam.com/VtyiHAft
http://snsvidyapeeth.in/aXmo2Dr3
http://trinitytesttubebaby.com/QR2JvfE3Sv
http://iconskw.com/cqdPtAbZ
http://ebookchuyennganh.com/v9PMvQDxHK8W
http://alsader.net/BHdQaiQ9rt
http://avyanshglobal.com/6pYjPlqf
http://primahills-online.com/ypCiZn7tMx
http://antoniocastroycia.com.co/WHe08obY
http://apexbiotech.net/VQgunQ4t5Ue
http://vscm.in/V3tYKxDz
http://sinaloworx.co.za/3GilA8Eo3r
http://dancongnghe.xyz/yRByhX6J3REI
http://trajesuniformes.com.br/qQofZMaJm
http://fiorenzapaes.com.br/PGYpETW7
http://astetinternational.com/arW5e44Y7vzO
http://razisystem.ir/MqvvkX0cWvn
http://krishnaiti.org.in/rWA02HQY4
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 1 IoCs
resource yara_rule behavioral2/memory/2284-119-0x0000000010000000-0x0000000014030000-memory.dmp squirrelwaffle -
Blocklisted process makes network request 5 IoCs
flow pid Process 23 2284 rundll32.exe 29 2284 rundll32.exe 38 2284 rundll32.exe 44 2284 rundll32.exe 52 2284 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3796 wrote to memory of 2284 3796 rundll32.exe 68 PID 3796 wrote to memory of 2284 3796 rundll32.exe 68 PID 3796 wrote to memory of 2284 3796 rundll32.exe 68
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\22e427d636088505aed35304009c2ac23ae4f39784fa95d0d9d3ca12c71d3834.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\22e427d636088505aed35304009c2ac23ae4f39784fa95d0d9d3ca12c71d3834.dll,#12⤵
- Blocklisted process makes network request
PID:2284
-