Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/01/2025, 23:41
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_412fdeeaa926ada702cd351049516139.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_412fdeeaa926ada702cd351049516139.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_412fdeeaa926ada702cd351049516139.dll
-
Size
528KB
-
MD5
412fdeeaa926ada702cd351049516139
-
SHA1
717815a409b374922e7d140d97e796d5eac4732f
-
SHA256
ab0a3f2c0b0bace7e066433d4c3e8ad1dc253bb4b394ce504e50f15f43499ac8
-
SHA512
4503abfac1e018860f98a4e0b45d1d2d1e0650d1532bc24603c0555e2b4533fd98d2c79c0905db7d76f4bca8eadd4f3476bc696a684f62c7178e03c71d005869
-
SSDEEP
12288:snygddonnhXo7TDSfLLeSlDH7g+BppSH9K1XB7LenS1LrumKV/8:0onhb1lDE+Bg9K99e+umKV/
Malware Config
Extracted
squirrelwaffle
http://bostoncarservice.us/ttv8fU9U19
http://payparq-cloud-3513-01.com/bON7gU8BpvAU
http://luckysoxs.com/3FbCi7ej09p
http://payparq-cloud-8799-02.com/0yXFxtYs0Z
http://rjmholding.com/JKu3ByhTE
http://centroparquekrahmer.cl/iXIdCvMk5TD7
http://capaxion.cl/xigRVxm0X
http://bimcrea.cl/CRUKqDjn
http://payparq-cloud-8899-00.com/yeoXYV97
http://18pixels.org/mDZYHjiJi
http://e2eprocess.cl/EUsDZTqM
http://payparq.com/1DT7hrizVB
http://sammlerstore.pe/KKFuUiXVI5
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle family
-
Squirrelwaffle payload 7 IoCs
resource yara_rule behavioral1/memory/2772-2-0x0000000073370000-0x0000000073D00000-memory.dmp squirrelwaffle behavioral1/memory/2772-3-0x0000000073370000-0x0000000073D00000-memory.dmp squirrelwaffle behavioral1/memory/2772-4-0x0000000073370000-0x0000000073D00000-memory.dmp squirrelwaffle behavioral1/memory/2772-6-0x0000000073370000-0x0000000073D00000-memory.dmp squirrelwaffle behavioral1/memory/2772-10-0x0000000073370000-0x0000000073D00000-memory.dmp squirrelwaffle behavioral1/memory/2772-13-0x0000000073370000-0x0000000073D00000-memory.dmp squirrelwaffle behavioral1/memory/2772-15-0x0000000073370000-0x0000000073D00000-memory.dmp squirrelwaffle -
Blocklisted process makes network request 5 IoCs
flow pid Process 3 2772 rundll32.exe 7 2772 rundll32.exe 8 2772 rundll32.exe 10 2772 rundll32.exe 13 2772 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2772 2776 rundll32.exe 31 PID 2776 wrote to memory of 2772 2776 rundll32.exe 31 PID 2776 wrote to memory of 2772 2776 rundll32.exe 31 PID 2776 wrote to memory of 2772 2776 rundll32.exe 31 PID 2776 wrote to memory of 2772 2776 rundll32.exe 31 PID 2776 wrote to memory of 2772 2776 rundll32.exe 31 PID 2776 wrote to memory of 2772 2776 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_412fdeeaa926ada702cd351049516139.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_412fdeeaa926ada702cd351049516139.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2772
-