Analysis
-
max time kernel
130s -
max time network
130s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
30-01-2022 16:13
Static task
static1
Behavioral task
behavioral1
Sample
18118ae2e8512b453e445bb42be2c5cd8d375ae5f2d8a1c353a340777f1c44ed.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
18118ae2e8512b453e445bb42be2c5cd8d375ae5f2d8a1c353a340777f1c44ed.dll
Resource
win10-en-20211208
General
-
Target
18118ae2e8512b453e445bb42be2c5cd8d375ae5f2d8a1c353a340777f1c44ed.dll
-
Size
319KB
-
MD5
12ae4651b0976c12e65f2183a2aecba9
-
SHA1
f9a55bde96072a7fc071b0b6b2c4d3acacbf0f24
-
SHA256
18118ae2e8512b453e445bb42be2c5cd8d375ae5f2d8a1c353a340777f1c44ed
-
SHA512
7ff2953be31853f312e1d1e1419726aeb02abd798af3cbc99387520231558fa2a02920db3b2c2adf67d65ff0cae4dca46c9032d4ff982ed0b1c46ec5d5964efa
Malware Config
Extracted
squirrelwaffle
http://atertreat.in/5iPPVRKPPX9
http://incentivaconsultores.com.co/55jHpKCc9DWy
http://cdelean.org/0qvbbmu9g
http://bazy.ps/M6SjrMSYC
http://sukmabali.com/ZXxcLYs3rzRQ
http://bugwilliam.tk/cbB56YrugdbW
http://bestbeatsgh.com/42D7OwuPen
http://krumaila.com/UZ4NdDoDh4Tu
http://razehub.com/NN70nExbtLO
http://arcb.ro/aHUUNxE3Me5
http://cfmi.tg/m40YS6gDO0
http://sweetlittle.mx/ZCXP0dT2h
http://alkimia-prod.com/nT0imyzmo
http://almexperts.co.za/fEoJ3pdWZbF
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 1 IoCs
resource yara_rule behavioral2/memory/2736-119-0x0000000010000000-0x000000001004D000-memory.dmp squirrelwaffle -
Blocklisted process makes network request 5 IoCs
flow pid Process 17 2736 rundll32.exe 25 2736 rundll32.exe 29 2736 rundll32.exe 31 2736 rundll32.exe 33 2736 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2736 2564 rundll32.exe 68 PID 2564 wrote to memory of 2736 2564 rundll32.exe 68 PID 2564 wrote to memory of 2736 2564 rundll32.exe 68
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18118ae2e8512b453e445bb42be2c5cd8d375ae5f2d8a1c353a340777f1c44ed.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18118ae2e8512b453e445bb42be2c5cd8d375ae5f2d8a1c353a340777f1c44ed.dll,#12⤵
- Blocklisted process makes network request
PID:2736
-