Analysis
-
max time kernel
159s -
max time network
178s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
30-01-2022 16:18
Static task
static1
Behavioral task
behavioral1
Sample
14d643a2174df3249796ce1cc447f2997426b5c5b3779bf1c0f2e4b700b39de5.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
14d643a2174df3249796ce1cc447f2997426b5c5b3779bf1c0f2e4b700b39de5.dll
Resource
win10-en-20211208
General
-
Target
14d643a2174df3249796ce1cc447f2997426b5c5b3779bf1c0f2e4b700b39de5.dll
-
Size
498KB
-
MD5
d43437b20910ef7e91c657caf77bb9d7
-
SHA1
4d04202e81650ec5233290505c531d7507c9192f
-
SHA256
14d643a2174df3249796ce1cc447f2997426b5c5b3779bf1c0f2e4b700b39de5
-
SHA512
c23fd24f55c0f21837f9c5928c9c0caf94aa132ea1cab408764a0b1000d548fdf53de55f29329a9a11be435015832d59bc999b685bf515e5f4cbe0188b2f0f43
Malware Config
Extracted
squirrelwaffle
http://acdlimited.com/2u6aW9Pfe
http://jornaldasoficinas.com/ZF8GKIGVDupL
http://orldofjain.com/lMsTA7tSYpe
http://altayaralsudani.net/SSUsPgb7PHgC
http://hoteloaktree.com/QthLWsZsVgb
http://aterwellnessinc.com/U7D0sswwp
http://sirifinco.com/Urbhq9wO50j
http://ordpress17.com/5WG6Z62sKWo
http://mohsinkhanfoundation.com/pcQLeLMbur
http://lendbiz.vn/xj3BhHtMbf
http://geosever.rs/ObHP1CHt
http://nuevainfotech.com/xCNyTjzkoe
http://dadabhoy.pk/m6rQE94U
http://111
http://sjgrand.lk/zvMYuQqEZj
http://erogholding.com/GFM1QcCFk
http://armordetailing.rs/lgfrZb4Re6WO
http://lefrenchwineclub.com/eRUGdDox
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 2 IoCs
resource yara_rule behavioral2/memory/2748-119-0x00000000049B0000-0x00000000049C1000-memory.dmp squirrelwaffle behavioral2/memory/2748-120-0x00000000049E0000-0x00000000049F0000-memory.dmp squirrelwaffle -
Program crash 1 IoCs
pid pid_target Process procid_target 2396 2748 WerFault.exe 68 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2396 WerFault.exe 2396 WerFault.exe 2396 WerFault.exe 2396 WerFault.exe 2396 WerFault.exe 2396 WerFault.exe 2396 WerFault.exe 2396 WerFault.exe 2396 WerFault.exe 2396 WerFault.exe 2396 WerFault.exe 2396 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2396 WerFault.exe Token: SeBackupPrivilege 2396 WerFault.exe Token: SeDebugPrivilege 2396 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2748 2676 rundll32.exe 68 PID 2676 wrote to memory of 2748 2676 rundll32.exe 68 PID 2676 wrote to memory of 2748 2676 rundll32.exe 68
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14d643a2174df3249796ce1cc447f2997426b5c5b3779bf1c0f2e4b700b39de5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14d643a2174df3249796ce1cc447f2997426b5c5b3779bf1c0f2e4b700b39de5.dll,#12⤵PID:2748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 7043⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-