Analysis
-
max time kernel
120s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
30-01-2022 15:59
Static task
static1
Behavioral task
behavioral1
Sample
21f6d76a335c8c98e7d27e42f77c8bd167e79a02914cc4c7ea49c3600c48e57a.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
21f6d76a335c8c98e7d27e42f77c8bd167e79a02914cc4c7ea49c3600c48e57a.dll
Resource
win10-en-20211208
General
-
Target
21f6d76a335c8c98e7d27e42f77c8bd167e79a02914cc4c7ea49c3600c48e57a.dll
-
Size
300KB
-
MD5
a10379c50615514343a479c964554c37
-
SHA1
c292f39617bee5f26ab76db955851c78d1b26e9e
-
SHA256
21f6d76a335c8c98e7d27e42f77c8bd167e79a02914cc4c7ea49c3600c48e57a
-
SHA512
5241b736ba45b0e23f45f62a09a817c940e85d0a62bf4dd2943d9c81fdade4c3038bcc96d4c5f2d2a9ee1797eaf90d4d9541a0d6699950e413fc4ed1411174d9
Malware Config
Extracted
squirrelwaffle
http://hutraders.com/0eeUtmJf8O
http://goodartishard.com/0JXDM9kMwx
http://now.byteinsure.com/tnjUrmlhN
http://asceaub.com/Xl8UCLSU
http://colchonesmanzur.com/GjVgBnKaNIC
http://sistemasati.com/0SzGNkx6P
http://maldivehost.net/zLIisQRWZI9
http://lrdgon.org/l7r96tjAJ
http://binnawaz.com.pk/jhSZGWS76C
http://fhstorse.com/vJlgdjJnpIop
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 2 IoCs
resource yara_rule behavioral1/memory/1780-59-0x0000000074E70000-0x0000000074F4F000-memory.dmp squirrelwaffle behavioral1/memory/1780-58-0x0000000074E70000-0x0000000074E80000-memory.dmp squirrelwaffle -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1540 wrote to memory of 1780 1540 rundll32.exe 27 PID 1540 wrote to memory of 1780 1540 rundll32.exe 27 PID 1540 wrote to memory of 1780 1540 rundll32.exe 27 PID 1540 wrote to memory of 1780 1540 rundll32.exe 27 PID 1540 wrote to memory of 1780 1540 rundll32.exe 27 PID 1540 wrote to memory of 1780 1540 rundll32.exe 27 PID 1540 wrote to memory of 1780 1540 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21f6d76a335c8c98e7d27e42f77c8bd167e79a02914cc4c7ea49c3600c48e57a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21f6d76a335c8c98e7d27e42f77c8bd167e79a02914cc4c7ea49c3600c48e57a.dll,#12⤵PID:1780
-