Analysis
-
max time kernel
147s -
max time network
158s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
30-01-2022 15:59
Static task
static1
Behavioral task
behavioral1
Sample
21f6d76a335c8c98e7d27e42f77c8bd167e79a02914cc4c7ea49c3600c48e57a.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
21f6d76a335c8c98e7d27e42f77c8bd167e79a02914cc4c7ea49c3600c48e57a.dll
Resource
win10-en-20211208
General
-
Target
21f6d76a335c8c98e7d27e42f77c8bd167e79a02914cc4c7ea49c3600c48e57a.dll
-
Size
300KB
-
MD5
a10379c50615514343a479c964554c37
-
SHA1
c292f39617bee5f26ab76db955851c78d1b26e9e
-
SHA256
21f6d76a335c8c98e7d27e42f77c8bd167e79a02914cc4c7ea49c3600c48e57a
-
SHA512
5241b736ba45b0e23f45f62a09a817c940e85d0a62bf4dd2943d9c81fdade4c3038bcc96d4c5f2d2a9ee1797eaf90d4d9541a0d6699950e413fc4ed1411174d9
Malware Config
Extracted
squirrelwaffle
http://hutraders.com/0eeUtmJf8O
http://goodartishard.com/0JXDM9kMwx
http://now.byteinsure.com/tnjUrmlhN
http://asceaub.com/Xl8UCLSU
http://colchonesmanzur.com/GjVgBnKaNIC
http://sistemasati.com/0SzGNkx6P
http://maldivehost.net/zLIisQRWZI9
http://lrdgon.org/l7r96tjAJ
http://binnawaz.com.pk/jhSZGWS76C
http://fhstorse.com/vJlgdjJnpIop
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
suricata: ET MALWARE SQUIRRELWAFFLE Loader Activity (POST)
suricata: ET MALWARE SQUIRRELWAFFLE Loader Activity (POST)
-
Squirrelwaffle Payload 2 IoCs
resource yara_rule behavioral2/memory/2476-117-0x00000000736E0000-0x00000000736F0000-memory.dmp squirrelwaffle behavioral2/memory/2476-118-0x00000000736E0000-0x00000000737BF000-memory.dmp squirrelwaffle -
Blocklisted process makes network request 4 IoCs
flow pid Process 27 2476 rundll32.exe 34 2476 rundll32.exe 37 2476 rundll32.exe 39 2476 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3240 wrote to memory of 2476 3240 rundll32.exe 69 PID 3240 wrote to memory of 2476 3240 rundll32.exe 69 PID 3240 wrote to memory of 2476 3240 rundll32.exe 69
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21f6d76a335c8c98e7d27e42f77c8bd167e79a02914cc4c7ea49c3600c48e57a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21f6d76a335c8c98e7d27e42f77c8bd167e79a02914cc4c7ea49c3600c48e57a.dll,#12⤵
- Blocklisted process makes network request
PID:2476
-