Analysis
-
max time kernel
117s -
max time network
138s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
30-01-2022 16:13
Static task
static1
Behavioral task
behavioral1
Sample
18118ae2e8512b453e445bb42be2c5cd8d375ae5f2d8a1c353a340777f1c44ed.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
18118ae2e8512b453e445bb42be2c5cd8d375ae5f2d8a1c353a340777f1c44ed.dll
Resource
win10-en-20211208
General
-
Target
18118ae2e8512b453e445bb42be2c5cd8d375ae5f2d8a1c353a340777f1c44ed.dll
-
Size
319KB
-
MD5
12ae4651b0976c12e65f2183a2aecba9
-
SHA1
f9a55bde96072a7fc071b0b6b2c4d3acacbf0f24
-
SHA256
18118ae2e8512b453e445bb42be2c5cd8d375ae5f2d8a1c353a340777f1c44ed
-
SHA512
7ff2953be31853f312e1d1e1419726aeb02abd798af3cbc99387520231558fa2a02920db3b2c2adf67d65ff0cae4dca46c9032d4ff982ed0b1c46ec5d5964efa
Malware Config
Extracted
squirrelwaffle
http://atertreat.in/5iPPVRKPPX9
http://incentivaconsultores.com.co/55jHpKCc9DWy
http://cdelean.org/0qvbbmu9g
http://bazy.ps/M6SjrMSYC
http://sukmabali.com/ZXxcLYs3rzRQ
http://bugwilliam.tk/cbB56YrugdbW
http://bestbeatsgh.com/42D7OwuPen
http://krumaila.com/UZ4NdDoDh4Tu
http://razehub.com/NN70nExbtLO
http://arcb.ro/aHUUNxE3Me5
http://cfmi.tg/m40YS6gDO0
http://sweetlittle.mx/ZCXP0dT2h
http://alkimia-prod.com/nT0imyzmo
http://almexperts.co.za/fEoJ3pdWZbF
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 1 IoCs
resource yara_rule behavioral1/memory/1248-56-0x0000000010000000-0x000000001004D000-memory.dmp squirrelwaffle -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1248 1096 rundll32.exe 27 PID 1096 wrote to memory of 1248 1096 rundll32.exe 27 PID 1096 wrote to memory of 1248 1096 rundll32.exe 27 PID 1096 wrote to memory of 1248 1096 rundll32.exe 27 PID 1096 wrote to memory of 1248 1096 rundll32.exe 27 PID 1096 wrote to memory of 1248 1096 rundll32.exe 27 PID 1096 wrote to memory of 1248 1096 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18118ae2e8512b453e445bb42be2c5cd8d375ae5f2d8a1c353a340777f1c44ed.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18118ae2e8512b453e445bb42be2c5cd8d375ae5f2d8a1c353a340777f1c44ed.dll,#12⤵PID:1248
-