Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 13:51
Static task
static1
Behavioral task
behavioral1
Sample
96f82a0546c17c93491b1eb18c03891707f44353bf64c9118271bd40e6e5d7ac.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
96f82a0546c17c93491b1eb18c03891707f44353bf64c9118271bd40e6e5d7ac.dll
Resource
win10v2004-20241007-en
General
-
Target
96f82a0546c17c93491b1eb18c03891707f44353bf64c9118271bd40e6e5d7ac.dll
-
Size
528KB
-
MD5
2932dab49222663e8e50e709a28aa485
-
SHA1
371d8713c2fd8e32ad6cf0e57dd49dc1ad5c601f
-
SHA256
96f82a0546c17c93491b1eb18c03891707f44353bf64c9118271bd40e6e5d7ac
-
SHA512
dd634f6321c03e1132bd9762867ce1536e0b2598f31c268a197376665a7bb5efa06f5f62a5dc4ecb2885a083aba113b60e9ba0c9a6dfe4c537b8fa5bea067415
-
SSDEEP
12288:snygddonnhXo7TDSfLLeSlDH7g+BppSH9K1XB7LenS1LrumKV/8q:0onhb1lDE+Bg9K99e+umKV/J
Malware Config
Extracted
squirrelwaffle
http://bostoncarservice.us/ttv8fU9U19
http://payparq-cloud-3513-01.com/bON7gU8BpvAU
http://luckysoxs.com/3FbCi7ej09p
http://payparq-cloud-8799-02.com/0yXFxtYs0Z
http://rjmholding.com/JKu3ByhTE
http://centroparquekrahmer.cl/iXIdCvMk5TD7
http://capaxion.cl/xigRVxm0X
http://bimcrea.cl/CRUKqDjn
http://payparq-cloud-8899-00.com/yeoXYV97
http://18pixels.org/mDZYHjiJi
http://e2eprocess.cl/EUsDZTqM
http://payparq.com/1DT7hrizVB
http://sammlerstore.pe/KKFuUiXVI5
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle family
-
Squirrelwaffle payload 5 IoCs
resource yara_rule behavioral1/memory/2788-2-0x0000000073420000-0x0000000073DB0000-memory.dmp squirrelwaffle behavioral1/memory/2788-3-0x0000000073420000-0x0000000073DB0000-memory.dmp squirrelwaffle behavioral1/memory/2788-4-0x0000000073420000-0x0000000073DB0000-memory.dmp squirrelwaffle behavioral1/memory/2788-6-0x0000000073420000-0x0000000073DB0000-memory.dmp squirrelwaffle behavioral1/memory/2788-12-0x0000000073420000-0x0000000073DB0000-memory.dmp squirrelwaffle -
Blocklisted process makes network request 3 IoCs
flow pid Process 3 2788 rundll32.exe 6 2788 rundll32.exe 9 2788 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2788 2700 rundll32.exe 31 PID 2700 wrote to memory of 2788 2700 rundll32.exe 31 PID 2700 wrote to memory of 2788 2700 rundll32.exe 31 PID 2700 wrote to memory of 2788 2700 rundll32.exe 31 PID 2700 wrote to memory of 2788 2700 rundll32.exe 31 PID 2700 wrote to memory of 2788 2700 rundll32.exe 31 PID 2700 wrote to memory of 2788 2700 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\96f82a0546c17c93491b1eb18c03891707f44353bf64c9118271bd40e6e5d7ac.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\96f82a0546c17c93491b1eb18c03891707f44353bf64c9118271bd40e6e5d7ac.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2788
-