Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2025, 23:41
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_412fdeeaa926ada702cd351049516139.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_412fdeeaa926ada702cd351049516139.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_412fdeeaa926ada702cd351049516139.dll
-
Size
528KB
-
MD5
412fdeeaa926ada702cd351049516139
-
SHA1
717815a409b374922e7d140d97e796d5eac4732f
-
SHA256
ab0a3f2c0b0bace7e066433d4c3e8ad1dc253bb4b394ce504e50f15f43499ac8
-
SHA512
4503abfac1e018860f98a4e0b45d1d2d1e0650d1532bc24603c0555e2b4533fd98d2c79c0905db7d76f4bca8eadd4f3476bc696a684f62c7178e03c71d005869
-
SSDEEP
12288:snygddonnhXo7TDSfLLeSlDH7g+BppSH9K1XB7LenS1LrumKV/8:0onhb1lDE+Bg9K99e+umKV/
Malware Config
Extracted
squirrelwaffle
http://bostoncarservice.us/ttv8fU9U19
http://payparq-cloud-3513-01.com/bON7gU8BpvAU
http://luckysoxs.com/3FbCi7ej09p
http://payparq-cloud-8799-02.com/0yXFxtYs0Z
http://rjmholding.com/JKu3ByhTE
http://centroparquekrahmer.cl/iXIdCvMk5TD7
http://capaxion.cl/xigRVxm0X
http://bimcrea.cl/CRUKqDjn
http://payparq-cloud-8899-00.com/yeoXYV97
http://18pixels.org/mDZYHjiJi
http://e2eprocess.cl/EUsDZTqM
http://payparq.com/1DT7hrizVB
http://sammlerstore.pe/KKFuUiXVI5
Signatures
-
SquirrelWaffle is a simple downloader written in C++.
SquirrelWaffle.
-
Squirrelwaffle family
-
Squirrelwaffle payload 7 IoCs
resource yara_rule behavioral2/memory/3388-2-0x00000000749C0000-0x0000000075350000-memory.dmp squirrelwaffle behavioral2/memory/3388-3-0x00000000749C0000-0x0000000075350000-memory.dmp squirrelwaffle behavioral2/memory/3388-4-0x00000000749C0000-0x0000000075350000-memory.dmp squirrelwaffle behavioral2/memory/3388-7-0x00000000749C0000-0x0000000075350000-memory.dmp squirrelwaffle behavioral2/memory/3388-9-0x00000000749C0000-0x0000000075350000-memory.dmp squirrelwaffle behavioral2/memory/3388-12-0x00000000749C0000-0x0000000075350000-memory.dmp squirrelwaffle behavioral2/memory/3388-15-0x00000000749C0000-0x0000000075350000-memory.dmp squirrelwaffle -
Blocklisted process makes network request 5 IoCs
flow pid Process 38 3388 rundll32.exe 44 3388 rundll32.exe 46 3388 rundll32.exe 54 3388 rundll32.exe 58 3388 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1928 wrote to memory of 3388 1928 rundll32.exe 83 PID 1928 wrote to memory of 3388 1928 rundll32.exe 83 PID 1928 wrote to memory of 3388 1928 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_412fdeeaa926ada702cd351049516139.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_412fdeeaa926ada702cd351049516139.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:3388
-