Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
30-01-2022 16:30
Static task
static1
Behavioral task
behavioral1
Sample
0e06c1bce2b49a11964e25346fc07332120ebe7038a3a72435ab241ad8147a0a.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0e06c1bce2b49a11964e25346fc07332120ebe7038a3a72435ab241ad8147a0a.dll
Resource
win10-en-20211208
General
-
Target
0e06c1bce2b49a11964e25346fc07332120ebe7038a3a72435ab241ad8147a0a.dll
-
Size
325KB
-
MD5
16180fed991e26365d502214f9535cec
-
SHA1
63271433d8f5ff3fc8d2ab6e29362dcd01289def
-
SHA256
0e06c1bce2b49a11964e25346fc07332120ebe7038a3a72435ab241ad8147a0a
-
SHA512
0b4ab25ad9f383346ed2498ff87d3de5971a949db396818411e9a31734289c4e294c5837dfbc6db939b75f1616b40662c7bd8f9685e03dd1ee4128d7fac1c0a4
Malware Config
Extracted
squirrelwaffle
http://atertreat.in/5iPPVRKPPX9
http://incentivaconsultores.com.co/55jHpKCc9DWy
http://cdelean.org/0qvbbmu9g
http://bazy.ps/M6SjrMSYC
http://sukmabali.com/ZXxcLYs3rzRQ
http://bugwilliam.tk/cbB56YrugdbW
http://bestbeatsgh.com/42D7OwuPen
http://krumaila.com/UZ4NdDoDh4Tu
http://razehub.com/NN70nExbtLO
http://arcb.ro/aHUUNxE3Me5
http://cfmi.tg/m40YS6gDO0
http://sweetlittle.mx/ZCXP0dT2h
http://alkimia-prod.com/nT0imyzmo
http://almexperts.co.za/fEoJ3pdWZbF
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle Payload 1 IoCs
resource yara_rule behavioral1/memory/744-57-0x0000000010000000-0x000000001004D000-memory.dmp squirrelwaffle -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1460 wrote to memory of 744 1460 rundll32.exe 27 PID 1460 wrote to memory of 744 1460 rundll32.exe 27 PID 1460 wrote to memory of 744 1460 rundll32.exe 27 PID 1460 wrote to memory of 744 1460 rundll32.exe 27 PID 1460 wrote to memory of 744 1460 rundll32.exe 27 PID 1460 wrote to memory of 744 1460 rundll32.exe 27 PID 1460 wrote to memory of 744 1460 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e06c1bce2b49a11964e25346fc07332120ebe7038a3a72435ab241ad8147a0a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e06c1bce2b49a11964e25346fc07332120ebe7038a3a72435ab241ad8147a0a.dll,#12⤵PID:744
-